{"id":"https://openalex.org/W4417052216","doi":"https://doi.org/10.1109/tnsm.2025.3640927","title":"VNF-FG Placement and Admission Control in SDN and NFV-Enabled IoT Networks: A Hierarchical Deep Reinforcement Learning Method","display_name":"VNF-FG Placement and Admission Control in SDN and NFV-Enabled IoT Networks: A Hierarchical Deep Reinforcement Learning Method","publication_year":2025,"publication_date":"2025-12-05","ids":{"openalex":"https://openalex.org/W4417052216","doi":"https://doi.org/10.1109/tnsm.2025.3640927"},"language":null,"primary_location":{"id":"doi:10.1109/tnsm.2025.3640927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3640927","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080018735","display_name":"Xi Xu","orcid":"https://orcid.org/0000-0001-6501-1876"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xi Xu","raw_affiliation_strings":["College of Computer and Information Science, Southwest University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Science, Southwest University, Chongqing, China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100397725","display_name":"Yang Yang","orcid":"https://orcid.org/0000-0003-0608-9408"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Yang","raw_affiliation_strings":["College of Computer and Information Science, Southwest University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Science, Southwest University, Chongqing, China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076730801","display_name":"Wei Huang","orcid":"https://orcid.org/0000-0002-4985-9911"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Huang","raw_affiliation_strings":["College of Computer and Information Science, Southwest University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Science, Southwest University, Chongqing, China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055813479","display_name":"Songtao Guo","orcid":"https://orcid.org/0000-0001-6741-4871"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songtao Guo","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101823816","display_name":"Guiyan Liu","orcid":"https://orcid.org/0000-0002-6491-9556"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guiyan Liu","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080018735"],"corresponding_institution_ids":["https://openalex.org/I142108993"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46185038,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"1465","last_page":"1478"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.0003000000142492354,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.0003000000142492354,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6644999980926514},{"id":"https://openalex.org/keywords/admission-control","display_name":"Admission control","score":0.6643000245094299},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.5449000000953674},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.5404000282287598},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5141000151634216},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.505299985408783},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5001000165939331},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.49790000915527344},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.44690001010894775},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.4196000099182129}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8858000040054321},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6644999980926514},{"id":"https://openalex.org/C2778234956","wikidata":"https://www.wikidata.org/wiki/Q4683813","display_name":"Admission control","level":3,"score":0.6643000245094299},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6115000247955322},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.5449000000953674},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.5404000282287598},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5141000151634216},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.505299985408783},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.49790000915527344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.492000013589859},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.44690001010894775},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.4196000099182129},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.40540000796318054},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.39640000462532043},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3937999904155731},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3887999951839447},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C2779618445","wikidata":"https://www.wikidata.org/wiki/Q1640628","display_name":"Network service","level":2,"score":0.376800000667572},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.36739999055862427},{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.3598000109195709},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3529999852180481},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3490000069141388},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.32739999890327454},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.31769999861717224},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.2989000082015991},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.2939999997615814},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2888999879360199},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.28290000557899475},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.2752000093460083},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.2637999951839447},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C5894958","wikidata":"https://www.wikidata.org/wiki/Q2297769","display_name":"Software agent","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C51675839","wikidata":"https://www.wikidata.org/wiki/Q1665681","display_name":"Intelligent Network","level":2,"score":0.2578999996185303}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3640927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3640927","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2038530381","https://openalex.org/W2109910161","https://openalex.org/W2132022337","https://openalex.org/W2403593353","https://openalex.org/W2500898769","https://openalex.org/W2591344039","https://openalex.org/W2734940663","https://openalex.org/W2765816777","https://openalex.org/W2792866491","https://openalex.org/W2890841063","https://openalex.org/W2964015378","https://openalex.org/W2975462639","https://openalex.org/W3005111087","https://openalex.org/W3006670753","https://openalex.org/W3017021688","https://openalex.org/W3084179282","https://openalex.org/W3109189483","https://openalex.org/W3112732217","https://openalex.org/W3156997004","https://openalex.org/W3162846605","https://openalex.org/W3205399833","https://openalex.org/W3208432307","https://openalex.org/W4319342119","https://openalex.org/W4320009700","https://openalex.org/W4379517499","https://openalex.org/W4385565343","https://openalex.org/W4385877748","https://openalex.org/W4386999082","https://openalex.org/W4391419102","https://openalex.org/W4402352647"],"related_works":[],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Networking":[2],"(SDN)":[3],"and":[4,15,69,106,130,138,146,166,182,199,244],"Network":[5,31,175,206],"Function":[6,32],"Virtualization":[7],"(NFV)":[8],"are":[9,150,221],"expected":[10],"to":[11,89,152],"provide":[12],"greater":[13],"flexibility":[14],"manageability":[16],"for":[17,44,192],"next-generation":[18],"IoT":[19],"networks.":[20],"In":[21,98],"this":[22,99],"context,":[23],"network":[24,47,68,165],"services":[25],"should":[26],"be":[27],"modeled":[28],"as":[29,53,78,80,213],"Virtual":[30],"Forwarding":[33],"Graphs":[34],"(VNF-FGs).":[35],"A":[36],"key":[37],"challenge":[38],"is":[39],"efficient":[40],"allocation":[41],"of":[42,121,161,239],"resources":[43,77,88],"sequentially":[45],"arriving":[46],"service":[48],"requests,":[49,91],"a":[50,73,81,103,123,139,171,203],"process":[51],"known":[52],"VNF-FG":[54,70,90,104],"placement.":[55],"Most":[56],"existing":[57,234],"algorithms":[58],"either":[59],"manually":[60],"or":[61,71],"partially":[62],"extract":[63],"features":[64,160],"from":[65],"the":[66,158,163,167,214,218,229],"physical":[67,164],"adopt":[72],"greedy":[74],"approach,":[75],"allocating":[76],"long":[79],"feasible":[82,135],"solution":[83],"exists,":[84],"which":[85],"may":[86],"over-allocate":[87],"ultimately":[92],"harming":[93],"infrastructure":[94],"providers\u2019":[95],"long-term":[96,153,245],"revenue.":[97,154,247],"paper,":[100],"we":[101,169,195],"propose":[102],"placement":[105,128,136],"admission":[107,144,193],"control":[108,145],"algorithm":[109,232],"based":[110],"on":[111],"hierarchical":[112],"reinforcement":[113],"learning,":[114],"called":[115],"EAC.":[116],"It":[117],"consists":[118],"two":[119],"levels":[120],"agents:":[122],"coarse-level":[124],"agent":[125,141],"that":[126,142,149,177,228],"generates":[127],"strategies":[129],"rejects":[131,147],"requests":[132,148],"with":[133],"no":[134],"strategies,":[137],"refine-level":[140],"implements":[143],"detrimental":[151],"To":[155,186],"fully":[156,187],"capture":[157],"topological":[159],"both":[162],"VNF-FG,":[168],"employ":[170],"customized":[172],"Graph":[173],"Attention":[174],"(GAT)":[176],"incorporates":[178],"link":[179],"feature":[180],"awareness":[181],"enables":[183],"deeper":[184],"exploration.":[185],"explore":[188],"historical":[189],"temporal":[190],"information":[191],"control,":[194],"construct":[196],"state":[197],"triples":[198],"feed":[200],"them":[201],"into":[202],"Recurrent":[204],"Neural":[205],"(RNN).":[207],"Using":[208],"Proximal":[209],"Policy":[210],"Optimization":[211],"(PPO)":[212],"foundational":[215],"training":[216],"algorithm,":[217],"corresponding":[219],"agents":[220],"trained":[222],"hierarchically.":[223],"Extensive":[224],"experimental":[225],"results":[226],"demonstrate":[227],"proposed":[230],"EAC":[231],"outperforms":[233],"state-of-the-art":[235],"solutions":[236],"in":[237],"terms":[238],"acceptance":[240],"rate,":[241],"revenue-to-cost":[242],"ratio,":[243],"average":[246]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-05T00:00:00"}
