{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:06:52Z","timestamp":1773511612115,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1801105"],"award-info":[{"award-number":["2018YFB1801105"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61631005"],"award-info":[{"award-number":["61631005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1801261"],"award-info":[{"award-number":["U1801261"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Areas of Research and Development Program of Guangdong Province, China","award":["2018B010114001"],"award-info":[{"award-number":["2018B010114001"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2019Z022"],"award-info":[{"award-number":["ZYGX2019Z022"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012176","name":"Project 211","doi-asserted-by":"publisher","award":["B20064"],"award-info":[{"award-number":["B20064"]}],"id":[{"id":"10.13039\/501100012176","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003711","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["108-2221-E-194-020-MY3"],"award-info":[{"award-number":["108-2221-E-194-020-MY3"]}],"id":[{"id":"10.13039\/501100003711","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003711","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["110-2224-E-305 -001-"],"award-info":[{"award-number":["110-2224-E-305 -001-"]}],"id":[{"id":"10.13039\/501100003711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/twc.2021.3123500","type":"journal-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:27:41Z","timestamp":1635967661000},"page":"3721-3736","source":"Crossref","is-referenced-by-count":64,"title":["User Access Control in Open Radio Access Networks: A Federated Deep Reinforcement Learning Approach"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8061-4066","authenticated-orcid":false,"given":"Yang","family":"Cao","sequence":"first","affiliation":[{"name":"National Key Laboratory on Communications and Center for Intelligent Networking and Communications (CINC), University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4347-2871","authenticated-orcid":false,"given":"Shao-Yu","family":"Lien","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2671-5090","authenticated-orcid":false,"given":"Ying-Chang","family":"Liang","sequence":"additional","affiliation":[{"name":"Yangtze Delta Region Institute (Huzhou), University of Electronic Science and Technology of China, Huzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1024-6106","authenticated-orcid":false,"given":"Kwang-Cheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, University of South Florida, Tampa, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4140-287X","authenticated-orcid":false,"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"O-RAN: Towards an open and smart RAN","year":"2018"},{"key":"ref2","article-title":"O-RAN architecture description","volume-title":"O-RAN Alliance","year":"2020"},{"key":"ref3","article-title":"AI\/ML workflow description and requirements","volume-title":"O-RAN Alliance","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977606"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5493869"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2811047"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2012.6292642"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2642538"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0244-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2455337"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3065979"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.040413.120676"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2339313"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984798"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2612038"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2893168"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3018157"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2879370"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0776-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2984758"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933973"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3032991"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2933417"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500603"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800286"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986803"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2956472"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601107"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2702747"},{"issue":"2","key":"ref32","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"ref33","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2016","journal-title":"arXiv:1602.05629"},{"key":"ref34","first-page":"1","article-title":"Convergence of Q-learning: A simple proof","author":"Melo","year":"2001"},{"key":"ref35","article-title":"A theoretical analysis of deep Q-learning","author":"Fan","year":"2019","journal-title":"arXiv:1901.00137"},{"key":"ref36","first-page":"1","article-title":"Dueling network architectures for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.72"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1214\/09-ss054"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503908"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6213962"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/9792472\/09600616.pdf?arnumber=9600616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:38:50Z","timestamp":1705019930000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9600616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":40,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/twc.2021.3123500","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}