{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:39:19Z","timestamp":1768516759521,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171481"],"award-info":[{"award-number":["62171481"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2019YFE0114000"],"award-info":[{"award-number":["2019YFE0114000"]}]},{"name":"Special Support Program of Guangdong","award":["2019TQ05X150"],"award-info":[{"award-number":["2019TQ05X150"]}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2021A1515011124"],"award-info":[{"award-number":["2021A1515011124"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/tnse.2022.3208857","type":"journal-article","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T20:04:43Z","timestamp":1663963483000},"page":"1417-1430","source":"Crossref","is-referenced-by-count":15,"title":["Joint Detection and Computation Offloading With Age of Information in Mobile Edge Networks"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6348-8662","authenticated-orcid":false,"given":"Jialiang","family":"Feng","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Guangdong Key Laboratory of Information Security Technology, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9670-6336","authenticated-orcid":false,"given":"Jie","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Guangdong Key Laboratory of Information Security Technology, Sun Yat-Sen University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700465"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812144"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195689"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2448520"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2821664"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2881191"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524497"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2699660"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref14","article-title":"Deep reinforcement learning in parameterized action space","author":"Hausknecht","year":"2015"},{"issue":"7553","key":"ref15","first-page":"436","article-title":"Deep learning","volume-title":"Nature","volume":"521","author":"LeCun","year":"2015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700246"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1177-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2890685"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876279"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2018.10.003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.32657\/10356\/90191"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2369591"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2017.7985409"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2014.2360652"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524342"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377178"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845223"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2974816"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3025201"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737437"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2019.8902529"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053740"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2545382"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1987.1093629"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1049\/el:19900074"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2328635"},{"key":"ref37","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1201\/9781420067194"},{"key":"ref39","volume-title":"Reinforcement learning for robots using neural networks.","author":"Lin","year":"1992"},{"key":"ref40","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2847291"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/10107645\/09900430.pdf?arnumber=9900430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:31:58Z","timestamp":1705962718000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9900430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2022.3208857","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}