{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:06:48Z","timestamp":1730300808535,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/trustcom53373.2021.00173","type":"proceedings-article","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T20:30:55Z","timestamp":1646857855000},"page":"1265-1269","source":"Crossref","is-referenced-by-count":1,"title":["An axis extract method for rotational parts based on point cloud normal lines"],"prefix":"10.1109","author":[{"given":"Liu","family":"Huanlong","sequence":"first","affiliation":[{"name":"School of Mechanical Engineering, Southwest Jiaotong University,Chengdu,China"}]},{"given":"Wang","family":"Zhengjie","sequence":"additional","affiliation":[{"name":"Graduate School of Tangshan, Southwest Jiaotong University,Tangshan,China"}]},{"given":"Chen","family":"Yao","sequence":"additional","affiliation":[{"name":"Graduate School of Tangshan, Southwest Jiaotong University,Tangshan,China"}]},{"given":"Peng","family":"Hongyu","sequence":"additional","affiliation":[{"name":"Computer School Tangshan College,Tangshan,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.09.019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.926614"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0921-8890(97)00043-2"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/37.257890","article-title":"Acquiring robot skills via reinforcement learning","volume":"14","author":"gullapalli","year":"1994","journal-title":"IEEE Control Syst Mag"},{"key":"ref14","first-page":"623","article-title":"Reinforcement learning for CPG-driven biped robot","volume":"4","author":"mori","year":"2004","journal-title":"Assoc Adv Artif Intell"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.7210\/jrsj.24.820"},{"key":"ref16","first-page":"799","article-title":"Autonomous helicopter flight via reinforcement learning","author":"kim","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2007.11.026"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2006.282564"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/9781118122631"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00207720802095137"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2009.932261"},{"key":"ref5","first-page":"119","author":"sutton","year":"1998","journal-title":"Reinforcement Learning"},{"key":"ref8","first-page":"67","article-title":"A menu of designs for reinforcement learning over time","author":"werbos","year":"1991","journal-title":"Neural Network for Control"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1989.70114"},{"key":"ref2","first-page":"684","article-title":"Inverted pendulum system control based on nonlinear control method [J]","volume":"21","author":"chen","year":"2004","journal-title":"Control Theory & Applications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(01)00145-5"},{"key":"ref9","first-page":"39","article-title":"Linear quadratic regulation using reinforcement learning","author":"hagen","year":"0","journal-title":"Proc Belgian Dutch Conf Mech Learn"}],"event":{"name":"2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2021,10,20]]},"location":"Shenyang, China","end":{"date-parts":[[2021,10,22]]}},"container-title":["2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9724288\/9724267\/09724489.pdf?arnumber=9724489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:35:46Z","timestamp":1655238946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9724489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/trustcom53373.2021.00173","relation":{},"subject":[],"published":{"date-parts":[[2021,10]]}}}