{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:06:40Z","timestamp":1773882400065,"version":"3.50.1"},"reference-count":41,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056823","type":"journal-article","created":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T08:17:11Z","timestamp":1729498631000},"page":"2819-2843","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":9,"title":["Improved IChOA-Based Reinforcement Learning for Secrecy Rate Optimization in Smart Grid Communications"],"prefix":"10.32604","volume":"81","author":[{"given":"Mehrdad","family":"Shoeibi","sequence":"first","affiliation":[]},{"given":"Mohammad Mehdi Sharifi","family":"Nevisi","sequence":"additional","affiliation":[]},{"given":"Sarvenaz Sadat","family":"Khatami","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Mart\u00edn","sequence":"additional","affiliation":[]},{"given":"Sepehr","family":"Soltani","sequence":"additional","affiliation":[]},{"given":"Sina","family":"Aghakhani","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.comcom.2022.11.005","article-title":"Performance evaluation methodologies for smart grid substation communication networks: A survey","volume":"198","author":"Docquier","year":"2023","journal-title":"Comput. Commun."},{"key":"ref2","article-title":"An efficient authentication protocol for smart grid communication based on on-chip-error-correcting physical unclonable function","volume":"36","author":"Kaveh","year":"2023","journal-title":"Sustain. Energy, Grids Netw."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1109\/TCE.2024.3349618","article-title":"Privacy transmission via joint active and passive beamforming optimization for RIS-Aided NOMA-IoMT networks","volume":"70","author":"Li","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"74562","DOI":"10.1109\/ACCESS.2021.3080835","article-title":"An ultra-lightweight mutual authentication scheme for smart grid two-way communications","volume":"9","author":"Aghapour","year":"2021","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.3390\/s20082187","article-title":"Smart sensors for smart grid reliability","volume":"20","author":"Alonso","year":"2020","journal-title":"Sensors"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1080\/02564602.2023.2167741","article-title":"Cooperative secrecy techniques for improving physical layer security in NOMA-based PLC networks","volume":"40","author":"Hassan","year":"2023","journal-title":"IETE Tech. Rev."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1049\/ise2.12108","article-title":"On the security of an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller","volume":"17","author":"Miri","year":"2023","journal-title":"IET Inf. Secur."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"4093","DOI":"10.1109\/TVT.2020.2975539","article-title":"Pairing distance resolution and power control for massive connectivity improvement in NOMA systems","volume":"69","author":"Mounchili","year":"2020","journal-title":"IEEE Trans. Vehicular Technol."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TIV.2023.3337898","article-title":"Performance analysis of RIS\/STAR-IOS-aided V2V NOMA\/OMA communications over composite fading channels","volume":"9","author":"Ghadi","year":"2023","journal-title":"IEEE Trans. Intell. Veh."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"5119","DOI":"10.1109\/JIOT.2019.2896946","article-title":"Energy-efficient joint user-RB association and power allocation for uplink hybrid NOMA-OMA","volume":"6","author":"Zeng","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2020.101227","article-title":"Power allocation scheme for maximizing spectral efficiency and energy efficiency tradeoff for uplink NOMA systems in B5G\/6G","volume":"43","author":"Tian","year":"2020","journal-title":"Phys. Commun."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1109\/LWC.2019.2908912","article-title":"Optimal energy efficient power allocation with user fairness for uplink MC-NOMA systems","volume":"8","author":"Fang","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2022.108975","article-title":"A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future","volume":"215","author":"Ghiasi","year":"2023","journal-title":"Elect. Power Syst. Res."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1109\/TCCN.2021.3049475","article-title":"Deep learning based power optimizing for NOMA based relay aided D2D transmissions","volume":"7","author":"Ali","year":"2021","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4535","DOI":"10.1109\/JSYST.2019.2963235","article-title":"A lightweight mutual authentication for smart grid neighborhood area network communications based on physically unclonable function","volume":"14","author":"Kaveh","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"12296","DOI":"10.1109\/TVT.2020.3007521","article-title":"Secrecy performance analysis of RIS-aided wireless communication systems","volume":"69","author":"Yang","year":"2020","journal-title":"IEEE Trans. Vehicular Technol."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1109\/TWC.2023.3292073","article-title":"Uplink secrecy performance of RIS-based RF\/FSO three-dimension heterogeneous networks","volume":"23","author":"Wang","year":"2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1109\/TII.2023.3333842","article-title":"Secrecy performance analysis of RIS-aided smart grid communications","volume":"20","author":"Kaveh","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"13181","DOI":"10.1109\/JIOT.2023.3261308","article-title":"Secrecy outage performance analysis for uplink CR-NOMA systems with hybrid SIC","volume":"10","author":"Lei","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3626","DOI":"10.1109\/TIFS.2022.3212198","article-title":"The impact of side information on physical layer security under correlated fading channels","volume":"17","author":"Ghadi","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TGCN.2024.3365692","article-title":"Secrecy performance analysis of RIS assisted ambient backscatter communication networks","volume":"8","author":"Pei","year":"2024","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.3390\/s23208358","article-title":"Secrecy performance analysis of backscatter communications with side information","volume":"23","author":"Kaveh","year":"2023","journal-title":"Sensors"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1007\/s11036-022-01929-3","article-title":"Secure communication for RF energy harvesting NOMA relaying networks with relay-user selection scheme and optimization","volume":"27","author":"Nguyen","year":"2022","journal-title":"Mob. Netw. Appl."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TGCN.2022.3219111","article-title":"Ensemble learning aided QPSO-based framework for secrecy energy efficiency in FD CR-NOMA systems","volume":"7","author":"Garcia","year":"2022","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1109\/TGCN.2024.3464241","article-title":"Secrecy performance optimization of SWIPT wireless networks in partial secrecy regime","author":"Thakur","year":"2024","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1109\/TIFS.2020.3038994","article-title":"Secrecy rate optimization for intelligent reflecting surface assisted MIMO system","volume":"16","author":"Chu","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TMBMC.2021.3054907","article-title":"Secrecy optimization for diffusion-based molecular timing channels","volume":"7","author":"Sharma","year":"2021","journal-title":"IEEE Trans. Mol., Biol. Multi-Scale Commun."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"5673","DOI":"10.1109\/TWC.2019.2938515","article-title":"Effective secrecy rate for a downlink NOMA network","volume":"18","author":"Yu","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2760","DOI":"10.1109\/JIOT.2018.2874377","article-title":"The complete and incomplete low-bit-rate hybrid PLC\/wireless channel models: Physical layer security analyses","volume":"6","author":"Camponogara","year":"2019","journal-title":"IEEE Internet Things"},{"key":"ref30","series-title":"2016 Int. Symp. Power Line Commun. App. (ISPLC)","first-page":"185","article-title":"Physical layer security of cooperative relaying power-line communication systems","author":"Salem","year":"2016"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"13909","DOI":"10.1109\/ACCESS.2017.2729784","article-title":"Physical layer security over correlated log-normal cooperative power line communication channels","volume":"5","author":"Salem","year":"2017","journal-title":"IEEE Access"},{"key":"ref32","article-title":"Secure transmission in smart grid dynamic wide area network by exploiting full-duplex jamming scheme","volume":"34","author":"Odeyemi","year":"2023, Art. no. e4657","journal-title":"Trans. Emerg. Telecomm. Technol."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1049\/iet-com.2018.5344","article-title":"Secrecy analysis of wireless sensor network in smart grid with destination assisted jamming","volume":"13","author":"Atallah","year":"2019","journal-title":"IET Commun."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"5678","DOI":"10.1109\/ACCESS.2017.2695520","article-title":"Impact of the wireless network\u2019s PHY security and reliability on demand-side management cost in the smart grid","volume":"5","author":"El-Shafie","year":"2017","journal-title":"IEEE Access"},{"key":"ref35","series-title":"2019 IEEE 90th Veh. Tech. Conf. (VTC2019-Fall)","first-page":"1","article-title":"Secrecy analysis of PLC system with channel gain and impulsive noise","author":"Mohan","year":"2019"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1049\/gtd2.13103","article-title":"A lightweight smart contracts framework for blockchain-based secure communication in smart grid applications","volume":"18","author":"Faheem","year":"2024","journal-title":"IET Gen., Trans. Distrib."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/TGCN.2021.3093821","article-title":"Gradient ascent algorithm for enhancing secrecy rate in wireless communications for smart grid","volume":"6","author":"Mensi","year":"2021","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1007\/s12559-021-09933-7","article-title":"Binary chimp optimization algorithm (BChOA): A new binary me-ta-heuristic for solving optimization problems","volume":"13","author":"Wang","year":"2021","journal-title":"Cognit. Comput."},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.3390\/s23084073","article-title":"Binary chimp optimization algorithm with ML based intrusion detection for secure IoT-assisted wireless sensor networks","volume":"23","author":"Aljebreen","year":"2023, Art. no. 4073","journal-title":"Sensors"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"4519","DOI":"10.1007\/s11063-022-11055-6","article-title":"Application of meta-heuristic algorithms for training neural networks and deep learning architectures: A comprehensive review","volume":"55","author":"Kaveh","year":"2022","journal-title":"Neural Process. Lett."},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120495","article-title":"Reinforcement learning algorithms: A brief survey","volume":"231","author":"Shakya","year":"2023, Art. no. 120495","journal-title":"Expert. Syst. Appl."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_56823\/TSP_CMC_56823.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:18:26Z","timestamp":1741321106000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":41,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056823","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}