{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:08:16Z","timestamp":1740100096079,"version":"3.37.3"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2017YFB0801801"],"award-info":[{"award-number":["2017YFB0801801"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007120","name":"STS (Science and Technology Service Network) Plan of Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["KFJ-STS-QYZD-2021-11-001"],"award-info":[{"award-number":["KFJ-STS-QYZD-2021-11-001"]}],"id":[{"id":"10.13039\/100007120","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.23919\/ifipnetworking52078.2021.9472841","type":"proceedings-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:09:00Z","timestamp":1625861340000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Network Automation for Path Selection: A New Knowledge Transfer Approach"],"prefix":"10.23919","author":[{"given":"Guozhi","family":"Lin","sequence":"first","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China,100049"}]},{"given":"Jingguo","family":"Ge","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China,100049"}]},{"given":"Yulei","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Engineering, Mathematics and Physical Sciences, University of Exeter,Exeter,UK,EX4 4QF"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093"}]},{"given":"Tong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China,100049"}]},{"given":"Wei","family":"Mi","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China,100049"}]},{"given":"Yuepeng","family":"E","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China,100049"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2959263"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2959185"},{"journal-title":"Schema networks Zero-shot transfer with a generative causal model of intuitive physics","year":"2017","author":"kansky","key":"ref12"},{"journal-title":"Methods and apparatus for optimum path selection in packet transmission networks","year":"1993","author":"ahmadi","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1106159"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogpsych.2018.05.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2020.01.011"},{"key":"ref17","article-title":"Human causal transfer: Challenges for deep reinforcement learning","author":"edmonds","year":"2018","journal-title":"CogSci"},{"key":"ref18","article-title":"Theory-based causal transfer: Integrating instance-level induction and abstract-level structure learning","author":"edmonds","year":"0","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogpsych.2005.05.004"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/90.554729"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref6","first-page":"1334","article-title":"End-to-end training of deep visuomotor policies","volume":"17","author":"levine","year":"2016","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1038\/nature16961","article-title":"Mastering the game of go with deep neural networks and tree search","volume":"529","author":"silver","year":"2016","journal-title":"Nature"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986662"},{"key":"ref7","article-title":"Continuous control with deep reinforcement learning","volume":"abs 1509 2971","author":"lillicrap","year":"2016","journal-title":"CoRR"},{"key":"ref2","first-page":"665","article-title":"Reinforcement learning","volume":"15","author":"sutton","year":"1998","journal-title":"A Bradford Book"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2959183"},{"journal-title":"What is Network Automation","year":"2021","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1037\/a0017201"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2008.04.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.05.009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref23","article-title":"Introduction to the dirichlet distribution and related processes","author":"frigyik","year":"0","journal-title":"The Spokesman-Review"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1304244"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1988.13032"}],"event":{"name":"2021 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2021,6,21]]},"location":"Espoo and Helsinki, Finland","end":{"date-parts":[[2021,6,24]]}},"container-title":["2021 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9472750\/9472195\/09472841.pdf?arnumber=9472841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:39:04Z","timestamp":1659483544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9472841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":27,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking52078.2021.9472841","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]}}}