{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:46:17Z","timestamp":1775745977044,"version":"3.50.1"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2031"],"award-info":[{"award-number":["U22B2031"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62571058"],"award-info":[{"award-number":["62571058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Fund Haidian Original Innovation Joint Fund","award":["L232045"],"award-info":[{"award-number":["L232045"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2025.3627391","type":"journal-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:13:13Z","timestamp":1761930793000},"page":"5992-6009","source":"Crossref","is-referenced-by-count":1,"title":["Graph-Aware Diffusion Policy for Fault-Tolerant Agentic AI Service Migration in Edge Computing Power Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5028-0720","authenticated-orcid":false,"given":"Honglin","family":"Fang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0402-5390","authenticated-orcid":false,"given":"Peng","family":"Yu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4125-7365","authenticated-orcid":false,"given":"Xinxiu","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5524-2887","authenticated-orcid":false,"given":"Jice","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8153-9635","authenticated-orcid":false,"given":"Zhaowei","family":"Qu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1213-5642","authenticated-orcid":false,"given":"Ying","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3852-1007","authenticated-orcid":false,"given":"Wenjing","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2033-8431","authenticated-orcid":false,"given":"Shaoyong","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6853-5878","authenticated-orcid":false,"given":"Celimuge","family":"Wu","sequence":"additional","affiliation":[{"name":"Meta-Networking Research Center and the Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3180632"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3332740"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3296511"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2400185"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3448394"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3260566"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3580365"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.01325"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3701716.3717754"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103599"},{"key":"ref11","article-title":"Multi-agent collaboration mechanisms: A survey of LLMs","author":"Tran","year":"2025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3362912"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/890"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3556390"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3406204"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3323433"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2025.3583154"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS57970.2025.11073584"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2025.3541889"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3540413"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23579-5_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365880"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3328333"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2025.3598369"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2025.09.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3460063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3560003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796778"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229049"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.42"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3126677"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS61813.2024.10682885"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2025.3528331"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-025-4634-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3015805"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2500005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PAIS.2018.8598484"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES48979.2020.00031"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163048"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3290137"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW53611.2021.00064"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3629188.3629196"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2020.0080"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3281678"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3330679"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s23062913"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2025.101087"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00025"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3564333"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3526606"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620727"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/71.993206"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.081"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/6980514"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS55811.2022.00013"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3616374"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103791"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107627"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108361"},{"key":"ref61","article-title":"Accelerating AIGC services with latent action diffusion scheduling in edge networks","author":"Xu","year":"2024"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3470777"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN65040.2025.11046062"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3131040"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3135907"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.10.012"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111445"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3711896.3736923"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3241020"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref72","first-page":"214","article-title":"Wasserstein generative adversarial networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","volume":"70","author":"Arjovsky","year":"2017"},{"key":"ref73","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho","year":"2020"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1177\/02783649241273668"},{"key":"ref75","first-page":"9902","article-title":"Planning with diffusion for flexible behavior synthesis","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Janner","year":"2022"},{"key":"ref76","first-page":"1","article-title":"Diffusion policies as an expressive policy class for offline reinforcement learning","volume-title":"Proc. 11th Int. Conf. Learn. Representations","author":"Wang","year":"2023"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3639037"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3676870"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC61545.2025.10978581"},{"key":"ref80","first-page":"1","article-title":"Semi-Supervised classification with graph convolutional networks","volume-title":"Proc. 5th Int. Conf. Learn. Representations","author":"Kipf","year":"2017"},{"key":"ref81","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Hamilton","year":"2017"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3087349"},{"key":"ref83","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Paszke","year":"2019"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2567392"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03601-7"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11222958.pdf?arnumber=11222958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T21:04:42Z","timestamp":1769807082000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11222958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3627391","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}