{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:04Z","timestamp":1755882604153,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3673028","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"624-628","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-Strategy Improved Golden Jackal Optimization Algorithm Integrating the Golden Sine Mechanism"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2260-9717","authenticated-orcid":false,"given":"Zhenyu","family":"Li","sequence":"first","affiliation":[{"name":"SouthWest Jiaotong university, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6263-1869","authenticated-orcid":false,"given":"Zexi","family":"Hua","sequence":"additional","affiliation":[{"name":"SouthWest Jiaotong university, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7693-4916","authenticated-orcid":false,"given":"Yanjie","family":"Pang","sequence":"additional","affiliation":[{"name":"Sichuan Dory Cancon Technology Co., China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijins.v2i3.2072"},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"243","article-title":"Graph-based resource allocation algorithms for multiuser downlink MIMOOFDMA networks [J]","volume":"15","author":"AHMED N.","year":"2012","unstructured":"AHMED, N., ZAKI, Graph-based resource allocation algorithms for multiuser downlink MIMOOFDMA networks [J]. Wireless Communications and Mobile Computing, 2012, 15(2): 243-259","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04450-3"},{"issue":"01","key":"e_1_3_2_1_4_1","first-page":"34","volume":"27","author":"LIU","year":"2021","unstructured":"LIU Hui, LIU Zhenyu, JIA Weiqiang, Research Status and Challenges of Deep Learning in Equipment Residual Service Life Prediction Technology [J]. Computer Integrated Manufacturing Systems, 2021,27 (01): 34-52 (in Chinese).","journal-title":"Computer Integrated Manufacturing Systems"},{"key":"e_1_3_2_1_5_1","volume-title":"The whale optimization algorithm[J]. Advances in engineering software","author":"A.","year":"2016","unstructured":"Mirjalili S, Lewis A. The whale optimization algorithm[J]. Advances in engineering software, 2016, 95: 51-67."},{"key":"e_1_3_2_1_6_1","first-page":"1942","article-title":"Particle swarm optimization[C]\/\/ ICNN'95-international Conference on Neural Networks","volume":"4","year":"1995","unstructured":"Kennedy J, Eberhart R. Particle swarm optimization[C]\/\/ ICNN'95-international Conference on Neural Networks. IEEE, 1995, 4: 1942-1948.","journal-title":"IEEE"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.03.004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116924"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1069362310"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4316\/AECE.2017.02010"}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","acronym":"CSAIDE 2024","location":"Nanjing China"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3673028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3673028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:37:20Z","timestamp":1755880640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3673028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":11,"alternative-id":["10.1145\/3672919.3673028","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3673028","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}