{"id":"https://openalex.org/W4415970928","doi":"https://doi.org/10.1109/tccn.2025.3630007","title":"From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks","display_name":"From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W4415970928","doi":"https://doi.org/10.1109/tccn.2025.3630007"},"language":null,"primary_location":{"id":"doi:10.1109/tccn.2025.3630007","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3630007","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077862885","display_name":"Yuyang Zhou","orcid":"https://orcid.org/0000-0001-8626-0468"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuyang Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kang Du","orcid":"https://orcid.org/0009-0003-3601-1641"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang Du","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679784","display_name":"Zihan Chen","orcid":"https://orcid.org/0000-0001-5871-7766"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihan Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100393510","display_name":"Tian Qin","orcid":"https://orcid.org/0009-0003-5565-6744"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Qin","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007591898","display_name":"Yuyu Zhao","orcid":"https://orcid.org/0000-0001-8125-7171"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuyu Zhao","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5077862885"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":5.1063,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.95989268,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":null,"first_page":"3407","last_page":"3421"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.0071000000461936,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.0015999999595806003,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7318000197410583},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.6933000087738037},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.5921000242233276},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5163999795913696},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5138000249862671},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.47589999437332153},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.45559999346733093},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4523000121116638},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.4494999945163727}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8287000060081482},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7318000197410583},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.6933000087738037},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.5921000242233276},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5306000113487244},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5163999795913696},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5138000249862671},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.47589999437332153},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.45559999346733093},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4523000121116638},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.4494999945163727},{"id":"https://openalex.org/C17098449","wikidata":"https://www.wikidata.org/wiki/Q176814","display_name":"Partially observable Markov decision process","level":4,"score":0.4269999861717224},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.38499999046325684},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.38019999861717224},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.3695000112056732},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3626999855041504},{"id":"https://openalex.org/C62555980","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Emergency management","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C2775935494","wikidata":"https://www.wikidata.org/wiki/Q741964","display_name":"Search and rescue","level":3,"score":0.3603000044822693},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3601999878883362},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3483000099658966},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.3463999927043915},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3452000021934509},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30469998717308044},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C2778820799","wikidata":"https://www.wikidata.org/wiki/Q3454688","display_name":"Cost reduction","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.27390000224113464},{"id":"https://openalex.org/C7817414","wikidata":"https://www.wikidata.org/wiki/Q1779504","display_name":"Energy management","level":3,"score":0.2630000114440918}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tccn.2025.3630007","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3630007","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1052238065","display_name":null,"funder_award_id":"2024T170143","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G1793682622","display_name":null,"funder_award_id":"62072100","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G498661955","display_name":null,"funder_award_id":"2022M710677","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G6188450572","display_name":null,"funder_award_id":"62202097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2745115605","https://openalex.org/W3158248996","https://openalex.org/W3164953938","https://openalex.org/W3176269432","https://openalex.org/W3180235942","https://openalex.org/W3183554430","https://openalex.org/W4210298858","https://openalex.org/W4226250616","https://openalex.org/W4281289204","https://openalex.org/W4285148832","https://openalex.org/W4285260764","https://openalex.org/W4292387502","https://openalex.org/W4313174306","https://openalex.org/W4320015942","https://openalex.org/W4321490422","https://openalex.org/W4361030036","https://openalex.org/W4362582226","https://openalex.org/W4366386430","https://openalex.org/W4381620970","https://openalex.org/W4386275697","https://openalex.org/W4386413518","https://openalex.org/W4386596944","https://openalex.org/W4390044127","https://openalex.org/W4391697032","https://openalex.org/W4393150251","https://openalex.org/W4396542138","https://openalex.org/W4396982201","https://openalex.org/W4399619747","https://openalex.org/W4400352538","https://openalex.org/W4400644893","https://openalex.org/W4402215194","https://openalex.org/W4403826817","https://openalex.org/W4405778572","https://openalex.org/W4406754674","https://openalex.org/W4406812282","https://openalex.org/W4406946912","https://openalex.org/W4407168453","https://openalex.org/W4407638316","https://openalex.org/W4410358938","https://openalex.org/W7101440898"],"related_works":[],"abstract_inverted_index":{"The":[0,128],"proliferation":[1],"of":[2,12,20,40,146,224,254],"unmanned":[3],"aerial":[4],"vehicles":[5],"(UAVs)":[6],"has":[7],"enabled":[8],"a":[9,18,84,134,156,173,211,218],"wide":[10],"range":[11],"mission-critical":[13],"applications":[14],"and":[15,28,37,53,108,117,124,168,193,228,233,241,268],"is":[16,131,153],"becoming":[17],"cornerstone":[19],"low-altitude":[21,43,102,261,270],"networks,":[22,262],"supporting":[23],"smart":[24],"cities,":[25],"emergency":[26],"response,":[27],"more.":[29],"However,":[30],"the":[31,70,143,252,264],"open":[32],"wireless":[33],"environment,":[34],"dynamic":[35],"topology,":[36],"resource":[38],"constraints":[39],"UAVs":[41,178],"expose":[42],"networks":[44],"to":[45,69,120,210,226,259],"severe":[46],"Denial-of-Service":[47],"(DoS)":[48],"threats,":[49],"undermining":[50],"their":[51,181],"reliability":[52],"security.":[54],"Traditional":[55],"defense":[56,94,129,234,257],"approaches,":[57],"which":[58],"rely":[59],"on":[60,165],"fixed":[61],"configurations":[62],"or":[63],"centralized":[64],"decision-making,":[65],"cannot":[66],"effectively":[67],"respond":[68],"rapidly":[71],"changing":[72],"conditions":[73],"in":[74,101,214,220,230],"UAV":[75,147,152],"swarm":[76],"environments.":[77],"To":[78],"address":[79],"these":[80],"challenges,":[81],"we":[82,105],"propose":[83],"novel":[85],"federated":[86],"multi-agent":[87,135],"deep":[88],"reinforcement":[89],"learning":[90,188],"(FMADRL)-driven":[91],"moving":[92],"target":[93],"(MTD)":[95],"framework":[96],"for":[97,266],"proactive":[98],"DoS":[99,246],"mitigation":[100,216],"networks.":[103],"Specifically,":[104],"design":[106],"lightweight":[107],"coordinated":[109],"MTD":[110,162],"mechanisms,":[111],"including":[112],"leader":[113],"switching,":[114],"route":[115],"mutation,":[116],"frequency":[118],"hopping,":[119],"disrupt":[121],"attacker":[122],"efforts":[123],"enhance":[125],"network":[126],"resilience.":[127],"problem":[130],"formulated":[132],"as":[133,237,239],"partially":[136],"observable":[137],"Markov":[138],"decision":[139],"process":[140],"(POMDP),":[141],"capturing":[142],"uncertain":[144],"nature":[145],"swarms":[148],"under":[149,244],"attack.":[150],"Each":[151],"equipped":[154],"with":[155],"policy":[157,174],"agent":[158],"that":[159,201],"autonomously":[160],"selects":[161],"actions":[163],"based":[164],"partial":[166],"observations":[167],"local":[169],"experiences.":[170],"By":[171],"employing":[172],"gradient-based":[175],"FMADRL":[176],"algorithm,":[177],"collaboratively":[179],"optimize":[180],"policies":[182],"via":[183],"reward-weighted":[184],"aggregation,":[185],"enabling":[186],"distributed":[187,256],"without":[189],"sharing":[190],"raw":[191],"data":[192],"thus":[194],"reducing":[195],"communication":[196],"overhead.":[197],"Extensive":[198],"simulations":[199],"demonstrate":[200],"our":[202],"approach":[203],"significantly":[204],"outperforms":[205],"state-of-the-art":[206],"baselines,":[207],"achieving":[208],"up":[209,225],"34.6%":[212],"improvement":[213],"attack":[215,247],"rate,":[217],"reduction":[219],"average":[221],"recovery":[222],"time":[223],"94.6%,":[227],"decreases":[229],"energy":[231],"consumption":[232],"cost":[235],"by":[236],"much":[238],"29.3%":[240],"98.3%,":[242],"respectively,":[243],"various":[245],"strategies.":[248],"These":[249],"results":[250],"highlight":[251],"potential":[253],"intelligent,":[255],"mechanisms":[258],"protect":[260],"paving":[263],"way":[265],"reliable":[267],"scalable":[269],"economy.":[271]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-06T00:00:00"}
