{"id":"https://openalex.org/W4417292807","doi":"https://doi.org/10.1186/s13677-025-00821-1","title":"Security-aware computation offloading in internet of vehicles: a multi-agent reinforcement learning algorithm with attention mechanism","display_name":"Security-aware computation offloading in internet of vehicles: a multi-agent reinforcement learning algorithm with attention mechanism","publication_year":2025,"publication_date":"2025-12-13","ids":{"openalex":"https://openalex.org/W4417292807","doi":"https://doi.org/10.1186/s13677-025-00821-1"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00821-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00821-1","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1186/s13677-025-00821-1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067587036","display_name":"Kai Peng","orcid":"https://orcid.org/0000-0003-4809-2234"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]},{"id":"https://openalex.org/I134687103","display_name":"Nanjing Tech University","ror":"https://ror.org/03sd35x91","country_code":"CN","type":"education","lineage":["https://openalex.org/I134687103"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kai Peng","raw_affiliation_strings":["College of Engineering, Huaqiao University, Quanzhou, Fujian, 362021, P. R. China","State Key Lab. for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, 210093, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Huaqiao University, Quanzhou, Fujian, 362021, P. R. China","institution_ids":["https://openalex.org/I119045251"]},{"raw_affiliation_string":"State Key Lab. for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, 210093, P. R. China","institution_ids":["https://openalex.org/I881766915","https://openalex.org/I134687103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119708919","display_name":"Kunkun Yue","orcid":null},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]},{"id":"https://openalex.org/I134687103","display_name":"Nanjing Tech University","ror":"https://ror.org/03sd35x91","country_code":"CN","type":"education","lineage":["https://openalex.org/I134687103"]},{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunkun Yue","raw_affiliation_strings":["College of Engineering, Huaqiao University, Quanzhou, Fujian, 362021, P. R. China","State Key Lab. for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, 210093, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Huaqiao University, Quanzhou, Fujian, 362021, P. R. China","institution_ids":["https://openalex.org/I119045251"]},{"raw_affiliation_string":"State Key Lab. for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, 210093, P. R. China","institution_ids":["https://openalex.org/I881766915","https://openalex.org/I134687103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070828591","display_name":"Peiyun Xiao","orcid":"https://orcid.org/0009-0003-3186-3503"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I134687103","display_name":"Nanjing Tech University","ror":"https://ror.org/03sd35x91","country_code":"CN","type":"education","lineage":["https://openalex.org/I134687103"]},{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiyun Xiao","raw_affiliation_strings":["College of Engineering, Huaqiao University, Quanzhou, Fujian, 362021, P. R. China","State Key Lab. for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, 210093, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Huaqiao University, Quanzhou, Fujian, 362021, P. R. China","institution_ids":["https://openalex.org/I119045251"]},{"raw_affiliation_string":"State Key Lab. for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, 210093, P. R. China","institution_ids":["https://openalex.org/I881766915","https://openalex.org/I134687103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035919267","display_name":"Victor C. M. Leung","orcid":"https://orcid.org/0000-0003-3529-2640"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Victor C. M. Leung","raw_affiliation_strings":["College of the Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, 518060, China","Department of Electrical and Computer Engineering, University of British Columbia, 5500-2332 Main Mall, Vancouver, British Columbia, V6T 1Z4, Canada"],"affiliations":[{"raw_affiliation_string":"College of the Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, 518060, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of British Columbia, 5500-2332 Main Mall, Vancouver, British Columbia, V6T 1Z4, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067587036"],"corresponding_institution_ids":["https://openalex.org/I119045251","https://openalex.org/I134687103","https://openalex.org/I881766915"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46591281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7799000144004822,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7799000144004822,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.06589999794960022,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.03999999910593033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computation-offloading","display_name":"Computation offloading","score":0.9023000001907349},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6083999872207642},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5267000198364258},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.49889999628067017},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4481000006198883},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4417000114917755},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.41999998688697815},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4156999886035919},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.40959998965263367},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.3921000063419342}],"concepts":[{"id":"https://openalex.org/C2781041963","wikidata":"https://www.wikidata.org/wiki/Q18348618","display_name":"Computation offloading","level":4,"score":0.9023000001907349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8525000214576721},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6083999872207642},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5267000198364258},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5066999793052673},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.49889999628067017},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4481000006198883},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4417000114917755},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.41999998688697815},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4156999886035919},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.40959998965263367},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40950000286102295},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.3921000063419342},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.36410000920295715},{"id":"https://openalex.org/C2775907273","wikidata":"https://www.wikidata.org/wiki/Q7805281","display_name":"Time constraint","level":2,"score":0.35030001401901245},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3407999873161316},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.3375000059604645},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.3301999866962433},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.31200000643730164},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.28349998593330383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2797999978065491},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27970001101493835},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2793999910354614},{"id":"https://openalex.org/C108921912","wikidata":"https://www.wikidata.org/wiki/Q7834639","display_name":"Transmission delay","level":3,"score":0.27489998936653137},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25119999051094055},{"id":"https://openalex.org/C7345512","wikidata":"https://www.wikidata.org/wiki/Q209372","display_name":"Transport layer","level":3,"score":0.2502000033855438}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00821-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00821-1","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f0f6f783221448e18b608d5b899a0def","is_oa":true,"landing_page_url":"https://doaj.org/article/f0f6f783221448e18b608d5b899a0def","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1, Pp 1-15 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00821-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00821-1","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W2067398275","https://openalex.org/W2244651199","https://openalex.org/W2546773656","https://openalex.org/W2593834572","https://openalex.org/W2746553466","https://openalex.org/W2768629321","https://openalex.org/W2805210382","https://openalex.org/W2909977353","https://openalex.org/W2915771847","https://openalex.org/W2968424451","https://openalex.org/W3033229102","https://openalex.org/W3093793239","https://openalex.org/W3109858579","https://openalex.org/W3113024443","https://openalex.org/W3127181451","https://openalex.org/W3135863660","https://openalex.org/W3198982268","https://openalex.org/W4205434059","https://openalex.org/W4226018382","https://openalex.org/W4285203333","https://openalex.org/W4285820401","https://openalex.org/W4295934714","https://openalex.org/W4304687579","https://openalex.org/W4313535036","https://openalex.org/W4317815264","https://openalex.org/W4319993360","https://openalex.org/W4322704128","https://openalex.org/W4366147767","https://openalex.org/W4377862205","https://openalex.org/W4386275798","https://openalex.org/W4387520864","https://openalex.org/W4387831719","https://openalex.org/W4387871029","https://openalex.org/W4387885628","https://openalex.org/W4387917775","https://openalex.org/W4390204450","https://openalex.org/W4400243740","https://openalex.org/W4400943840","https://openalex.org/W4400975592","https://openalex.org/W4403095032","https://openalex.org/W4405055899","https://openalex.org/W4407354584","https://openalex.org/W4407900136"],"related_works":[],"abstract_inverted_index":{"Limited":[0],"by":[1,76,80,245],"the":[2,16,39,114,120,124,131,134,141,145,150,154,157,162,166,169,174,177,183,188,194,204,210,219,236,250],"finite":[3],"computation":[4,21,31,64,96],"resources":[5],"in":[6,59,119,168,259],"Internet":[7],"of":[8,18,30,41,68,140,147,190,203,221],"Vehicles":[9],"(IoV),":[10],"it":[11],"is":[12,127],"necessary":[13],"to":[14,35,112,129,186,247,255],"facilitate":[15],"capacity":[17],"vehicles":[19,142],"using":[20],"offloading.":[22],"The":[23,207],"traditional":[24],"approaches":[25],"focus":[26],"on":[27,161],"maximizing":[28],"utilities":[29],"offloading":[32,42,61,75,97,158,205,260],"while":[33],"fail":[34],"take":[36],"into":[37],"consideration":[38],"security":[40,151,170,220,251],"strategy,":[43],"which":[44],"cannot":[45],"be":[46],"used":[47],"for":[48],"IoV":[49],"environments":[50],"directly.":[51],"In":[52,66,149],"addition,":[53],"unsafe":[54],"strategies":[55],"can":[56,216],"cause":[57],"interruptions":[58,78],"task":[60,74,178],"and":[62,99,137,143,182,228,242],"waste":[63],"resources.":[65],"view":[67],"this,":[69],"this":[70,89,191],"paper":[71],"ensures":[72,200],"secure":[73,201],"mitigating":[77],"caused":[79],"communication":[81,135],"constraints":[82,181],"such":[83],"as":[84],"limited":[85],"transmission":[86],"distance.":[87],"To":[88],"end,":[90],"we":[91],"propose":[92],"a":[93,101,197,256],"two-layer":[94],"security-aware":[95],"framework":[98],"design":[100],"multi-agent":[102],"proximal":[103],"policy":[104],"optimization":[105],"algorithm":[106,167],"with":[107,209,224],"attention":[108,125],"mechanism":[109,126],"(named":[110],"MAPPOAM)":[111],"address":[113],"aforementioned":[115],"issue.":[116],"More":[117],"specifically,":[118],"feature":[121,146,185],"extraction":[122],"layer,":[123,153],"utilized":[128],"obtain":[130],"relationship":[132,175],"between":[133,176],"time":[136,180],"movement":[138],"data":[139],"extract":[144],"data.":[148],"decision":[152,252],"agents":[155],"output":[156],"strategy":[159,198],"based":[160],"observation":[163],"information.":[164],"Subsequently,":[165],"constraint":[171],"layer":[172,253],"analyzes":[173],"execution":[179],"extracted":[184],"evaluate":[187],"safety":[189],"strategy.":[192],"Eventually,":[193],"agent":[195],"outputs":[196],"that":[199,214],"completion":[202],"process.":[206],"experiments":[208],"real":[211],"dataset":[212],"show":[213],"MAPPOAM":[215,234],"effectively":[217],"ensure":[218],"decisions":[222],"compare":[223],"other":[225],"baseline":[226,237],"methods":[227],"provide":[229],"valuable":[230],"practical":[231],"applications.":[232],"Specifically,":[233],"outperforms":[235],"algorithms,":[238],"reducing":[239],"both":[240],"latency":[241],"energy":[243],"consumption":[244],"17.5%":[246],"63.1%.":[248],"Additionally,":[249],"contributes":[254],"60.4%":[257],"reduction":[258],"interruptions.":[261]},"counts_by_year":[],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-12-13T00:00:00"}
