{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:33Z","timestamp":1750309593701,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T00:00:00Z","timestamp":1736467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,10]]},"DOI":"10.1145\/3727353.3727364","type":"proceedings-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T16:28:15Z","timestamp":1748363295000},"page":"60-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Single Chip Multiprocessor Intelligent Anti Attack Method Based on Deep Reinforcement Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1300-4362","authenticated-orcid":false,"given":"Yiyong","family":"Lei","sequence":"first","affiliation":[{"name":"China Southern Power Grid Company Limited, Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3050-0017","authenticated-orcid":false,"given":"Yanzhang","family":"Gu","sequence":"additional","affiliation":[{"name":"China Southern Power Grid Company Limited, Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1319-1023","authenticated-orcid":false,"given":"Xianzhi","family":"Yang","sequence":"additional","affiliation":[{"name":"Digital Power Grid Technology (Guangdong) Co., Ltd, China Southern Power Grid., Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0166-8934","authenticated-orcid":false,"given":"Jiayi","family":"Lin","sequence":"additional","affiliation":[{"name":"Digital Power Grid Technology (Guangdong) Co., Ltd, China Southern Power Grid., Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6291-1582","authenticated-orcid":false,"given":"Chun","family":"Xu","sequence":"additional","affiliation":[{"name":"Digital Power Grid Technology (Guangdong) Co., Ltd, China Southern Power Grid., Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,5,27]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3140896"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10080-x"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04273-7"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4443"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00844-w"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-024-09668-0"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09716-x"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6501\/acd01e"},{"key":"e_1_3_3_1_9_2","first-page":"448","article-title":"Research on Value Function Decomposition Method Based on UA-QMIX[J]","volume":"2022","author":"Ji Long","unstructured":"Ji Long, Miao Guoying, LI Tao, et al. Research on Value Function Decomposition Method Based on UA-QMIX[J]. Computer Simulation,2022, 39(11):448-452.","journal-title":"Computer Simulation"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1134\/S0012266123011006X"}],"event":{"name":"BDICN 2025: 2025 4th International Conference on Big Data, Information and Computer Network","acronym":"BDICN 2025","location":"Guangzhou China"},"container-title":["Proceedings of the 2025 4th International Conference on Big Data, Information and Computer Network"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727353.3727364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727353.3727364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:56Z","timestamp":1750298216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727353.3727364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,10]]},"references-count":10,"alternative-id":["10.1145\/3727353.3727364","10.1145\/3727353"],"URL":"https:\/\/doi.org\/10.1145\/3727353.3727364","relation":{},"subject":[],"published":{"date-parts":[[2025,1,10]]},"assertion":[{"value":"2025-05-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}