{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:27:57Z","timestamp":1774466877635,"version":"3.50.1"},"reference-count":95,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62361011"],"award-info":[{"award-number":["62361011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271424"],"award-info":[{"award-number":["62271424"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["DXGA [2025] 003"],"award-info":[{"award-number":["DXGA [2025] 003"]}]},{"name":"Guiyang Science and Technology Plan Project","award":["[2023]13-3"],"award-info":[{"award-number":["[2023]13-3"]}]},{"name":"Shanghai Pujiang Programme","award":["24PJD117"],"award-info":[{"award-number":["24PJD117"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2025.3589594","type":"journal-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T17:40:01Z","timestamp":1752687601000},"page":"1026-1042","source":"Crossref","is-referenced-by-count":3,"title":["Intent-Driven Cognitive xDFC Bridge in Endogenous Intelligent IIoT: A Systematic Review and S$^{2}$Croft Architecture With Bayesian-CRO-Fuzzy Synergy"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0564-063X","authenticated-orcid":false,"given":"Dongbo","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Public Big Data, College of Big Data and Information Engineering, Guizhou University, Guiyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1430-2555","authenticated-orcid":false,"given":"Sai","family":"Zou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Public Big Data, College of Big Data and Information Engineering, Guizhou University, Guiyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1289-0130","authenticated-orcid":false,"given":"Minghui","family":"Liwang","sequence":"additional","affiliation":[{"name":"Department of Control Science and Engineering, Shanghai Institute of Intelligent Science and Technology, State Key Laboratory of Autonomous Intelligent Unmanned Systems, Shanghai Key Laboratory of Intelligent Autonomous Systems, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4933-594X","authenticated-orcid":false,"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4890-0748","authenticated-orcid":false,"given":"Xianbin","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Western University, London, Ontario, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3123971"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s23115199"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209592"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3391318"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INDIS56561.2022.00007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3465605"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.10239351"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3413958"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/JSTP-04-2017-0070"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49870.2020.9289515"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3465570"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2100226"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2023.06.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098331"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2768402"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2978472"},{"key":"ref17","article-title":"Robust and energy-efficient RPL optimization algorithm with scalable deep reinforcement learning for IIoT","volume-title":"Comput. Netw.","volume":"255","author":"Wang","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3123406"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110910"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2023.3244671"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2024.3382392"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-017-9485-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108427"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3417338"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PuneCon50868.2020.9362416"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/buildings13051351"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269118"},{"issue":"08","key":"ref28","first-page":"2574","article-title":"Intent-based network research review","volume":"31","author":"Fuliang","year":"2020","journal-title":"J. Softw."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588897"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3589339"},{"key":"ref31","article-title":"Intent-driven data link network intelligent translation technology","volume-title":"College of Commun. Eng. Xidian Univ.","author":"Xianglin","year":"2024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9128422"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft57336.2023.10175491"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3534880"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265894"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987279"},{"key":"ref37","first-page":"1","article-title":"INDIRA: Application intent network assistant to configure SDN-based high performance scientific networks","volume-title":"Proc. 2017 Opt. Fiber Commun. Conf. Exhib.","author":"Mercian","year":"2017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100194"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft57336.2023.10175400"},{"issue":"01","key":"ref40","first-page":"60","article-title":"Study on intent-driven network service resilience mechanism","volume":"51","author":"Pengcheng","year":"2024","journal-title":"J. Xidian Univ."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342088"},{"key":"ref42","article-title":"Design and implementation of an intent-based blockchain selection framework","volume-title":"M.S. thesis, Dept. of Infor., Univ. Zrich","author":"Widmer","year":"2020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129990"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN60470.2024.10494458"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3534282"},{"key":"ref46","first-page":"625","article-title":"Hey, Lumi! Using natural language for intent-based network management","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Jacobs","year":"2021"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3391812.3396269"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3338189"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2025.3529260"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622342"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969208"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108880"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1108\/K-02-2023-0221"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2006.21318923"},{"issue":"11","key":"ref55","first-page":"3052","article-title":"Service chain deployment method based on software-defined security function","volume":"42","author":"Yin","year":"2021","journal-title":"Comput. Eng. Des."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.036"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3131355"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986871"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3131757"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986592"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2025.3532304"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3306737"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3087838"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft54395.2022.9844088"},{"key":"ref65","first-page":"311","article-title":"Resource orchestration in 5G and beyond: Challenges and opportunities","volume-title":"Comput. Commun.","volume":"192","author":"Velasquez","year":"2022"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3118058"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000146"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ITOEC53115.2022.9734573"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013129"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2930059"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2016.1180817"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2020.121660"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3196831"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1080\/019697298125470"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.033598"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087244"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2895233"},{"key":"ref78","first-page":"1833","article-title":"Large-scale fuzzy multiple-medoid clustering method","volume-title":"J. Intell. Fuzzy Syst.","volume":"32","author":"Chen","year":"2017"},{"key":"ref79","article-title":"Evaluating edge artificial intelligence-driven supply chain management platforms using collaborative large-scale fuzzy information fusion","volume-title":"Appl. Soft Comput.","volume":"159","author":"Zhang","year":"2024"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3583133.3590590"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.3009727"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2363878"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072199"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2786782"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971060"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2861717"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3075563"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04335-4"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-023-09771-y"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2021.12.006"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3232582"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3087349"},{"key":"ref93","article-title":"Network Security Practice Guide","volume":"TC260-PG-20191A","year":"2019","journal-title":"Nat. Inf. Secur. Standardization Technical Commitiee"},{"key":"ref94","first-page":"39","article-title":"A survey on future networks: Application scenarios and requirements analysis","volume":"35","author":"Dai","year":"2019","journal-title":"Telecommun. Sci."},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107674"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11081434.pdf?arnumber=11081434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T05:39:35Z","timestamp":1763789975000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11081434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":95,"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3589594","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}