{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:32:27Z","timestamp":1759365147641,"version":"build-2065373602"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,8]]},"DOI":"10.1109\/icufn65838.2025.11169895","type":"proceedings-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T17:36:39Z","timestamp":1759253799000},"page":"181-186","source":"Crossref","is-referenced-by-count":0,"title":["Toward End-to-End Deep Learning for Autonomous Management in Next-Generation Networks"],"prefix":"10.1109","author":[{"given":"Jos\u00e9","family":"Moura","sequence":"first","affiliation":[{"name":"ISCTE&#x2014;University Institute of Lisbon,Lisbon,Portugal"}]},{"given":"Pedro","family":"Santana","sequence":"additional","affiliation":[{"name":"ISCTE&#x2014;University Institute of Lisbon,Lisbon,Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3560035"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3249835"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3057679"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104041"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3568035"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3535554"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.15348"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2023.3336538"},{"volume-title":"Error control coding: Fundamentals and Applications","year":"1983","author":"Lin","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1984.1091865"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(94)90068-X"},{"issue":"5","key":"ref15","doi-asserted-by":"crossref","DOI":"10.3390\/a16050233","article-title":"A bayesian multi-armed bandit algorithm for dynamic end-to-end routing in sdn-based networks with piecewise-stationary rewards","volume":"16","author":"Santana","year":"2023","journal-title":"Algorithms"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1561\/2200000068"},{"key":"ref17","article-title":"The epoch-greedy algorithm for multi-armed bandits with side information","volume":"20","author":"Langford","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"ref19","article-title":"Deepseek-inspired exploration of rl-based $l l m s$ and synergy with wireless networks: A survey","author":"Qiao","year":"2025","journal-title":"arXiv preprint"},{"key":"ref20","first-page":"22","article-title":"Constrained policy optimization","volume-title":"International conference on machine learning","author":"Achiam","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.07.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09996-w"},{"issue":"178","key":"ref23","first-page":"1","article-title":"Monotonic value function factorisation for deep multi-agent reinforcement learning","volume":"21","author":"Rashid","year":"2020","journal-title":"Journal of Machine Learning Research"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3616864"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57321-8_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3431437"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1214\/21-SS133"},{"key":"ref28","first-page":"5045","article-title":"Programmatically interpretable reinforcement learning","volume-title":"International conference on machine learning","author":"Verma","year":"2018"},{"key":"ref29","article-title":"From llm reasoning to autonomous ai agents: A comprehensive review","author":"Ferrag","year":"2025","journal-title":"arXiv preprint"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.111.2100206"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3486088"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3077737"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3568496"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3662006.3662067"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3420755"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/wacvw60836.2024.00108"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3524255"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2025.3562362"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3353265"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3356178"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300246"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-023-00980-9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3438379"}],"event":{"name":"2025 Sixteenth International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2025,7,8]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2025,7,11]]}},"container-title":["2025 Sixteenth International Conference on Ubiquitous and Future Networks (ICUFN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11169739\/11169577\/11169895.pdf?arnumber=11169895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T05:32:16Z","timestamp":1759296736000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11169895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/icufn65838.2025.11169895","relation":{},"subject":[],"published":{"date-parts":[[2025,7,8]]}}}