{"id":"https://openalex.org/W4392991680","doi":"https://doi.org/10.3390/fi16030105","title":"UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning","display_name":"UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning","publication_year":2024,"publication_date":"2024-03-20","ids":{"openalex":"https://openalex.org/W4392991680","doi":"https://doi.org/10.3390/fi16030105"},"language":"en","primary_location":{"id":"doi:10.3390/fi16030105","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16030105","pdf_url":"https://www.mdpi.com/1999-5903/16/3/105/pdf?version=1710936112","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/16/3/105/pdf?version=1710936112","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103137666","display_name":"Shui Jiang","orcid":"https://orcid.org/0000-0003-0718-1003"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shui Jiang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China;"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China;","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005860501","display_name":"Yanning Ge","orcid":"https://orcid.org/0009-0009-1682-5123"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanning Ge","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China;"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China;","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100691354","display_name":"Xu Yang","orcid":"https://orcid.org/0000-0001-5067-583X"},"institutions":[{"id":"https://openalex.org/I354108","display_name":"Minjiang University","ror":"https://ror.org/00s7tkw17","country_code":"CN","type":"education","lineage":["https://openalex.org/I354108"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Yang","raw_affiliation_strings":["College of Computer and Control Engineering, Minjiang University, Fuzhou 350108, China","College of Computer and Control Engineering, Minjiang University, Fuzhou 350108, China;"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Minjiang University, Fuzhou 350108, China","institution_ids":["https://openalex.org/I354108"]},{"raw_affiliation_string":"College of Computer and Control Engineering, Minjiang University, Fuzhou 350108, China;","institution_ids":["https://openalex.org/I354108"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064277907","display_name":"Wencheng Yang","orcid":"https://orcid.org/0000-0001-7800-2215"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wencheng Yang","raw_affiliation_strings":["School of Mathematics, Physics and Computing, University of Southern Queensland, Darling Heights, QLD 4350, Australia","School of Mathematics, Physics and Computing, University of Southern Queensland, Darling Heights, QLD 4350, Australia;"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Physics and Computing, University of Southern Queensland, Darling Heights, QLD 4350, Australia","institution_ids":["https://openalex.org/I185523456"]},{"raw_affiliation_string":"School of Mathematics, Physics and Computing, University of Southern Queensland, Darling Heights, QLD 4350, Australia;","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011853980","display_name":"Hui Cui","orcid":"https://orcid.org/0000-0002-5820-2233"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hui Cui","raw_affiliation_strings":["Department of Software Systems & Cybersecurity, Monash University, Melbourne, VIC 3800, Australia","Department of Software Systems & Cybersecurity, Monash University, Melbourne, VIC 3800, Australia;"],"affiliations":[{"raw_affiliation_string":"Department of Software Systems & Cybersecurity, Monash University, Melbourne, VIC 3800, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Department of Software Systems & Cybersecurity, Monash University, Melbourne, VIC 3800, Australia;","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103137666"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.7517,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91008319,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"16","issue":"3","first_page":"105","last_page":"105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10586","display_name":"Robotic Path Planning Algorithms","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9061962366104126},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8335338830947876},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.66322922706604},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6182748079299927},{"id":"https://openalex.org/keywords/imitation","display_name":"Imitation","score":0.5972923040390015},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5731679797172546},{"id":"https://openalex.org/keywords/meta-learning","display_name":"Meta learning (computer science)","score":0.5562818646430969},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.48512253165245056},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42914363741874695}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9061962366104126},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8335338830947876},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.66322922706604},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6182748079299927},{"id":"https://openalex.org/C126388530","wikidata":"https://www.wikidata.org/wiki/Q1131737","display_name":"Imitation","level":2,"score":0.5972923040390015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5731679797172546},{"id":"https://openalex.org/C2781002164","wikidata":"https://www.wikidata.org/wiki/Q6822311","display_name":"Meta learning (computer science)","level":3,"score":0.5562818646430969},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.48512253165245056},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42914363741874695},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/fi16030105","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16030105","pdf_url":"https://www.mdpi.com/1999-5903/16/3/105/pdf?version=1710936112","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:monash.edu:publications/1f6b8c52-843b-47fa-9f20-1f3c94309928","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/1f6b8c52-843b-47fa-9f20-1f3c94309928","pdf_url":"https://researchmgt.monash.edu/ws/files/597517979/584317287_oa.pdf","source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Jiang, S, Ge, Y, Yang, X, Yang, W & Cui, H 2024, 'UAV control method combining reptile meta-reinforcement learning and generative adversarial imitation learning', Future Internet , vol. 16, no. 3, 105. https://doi.org/10.3390/fi16030105","raw_type":"article"},{"id":"pmh:oai:RePEc:gam:jftint:v:16:y:2024:i:3:p:105-:d:1360431","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/16/3/105/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:5201137c8987492b993a361b4cfccdc5","is_oa":true,"landing_page_url":"https://doaj.org/article/5201137c8987492b993a361b4cfccdc5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 16, Iss 3, p 105 (2024)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/16/3/105/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/fi16030105","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi16030105","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16030105","pdf_url":"https://www.mdpi.com/1999-5903/16/3/105/pdf?version=1710936112","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392991680.pdf"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W2045031658","https://openalex.org/W2604382266","https://openalex.org/W2604763608","https://openalex.org/W2755553401","https://openalex.org/W2766447205","https://openalex.org/W2962890638","https://openalex.org/W2968983352","https://openalex.org/W2969525674","https://openalex.org/W2981344907","https://openalex.org/W3004532089","https://openalex.org/W3020718655","https://openalex.org/W3042840230","https://openalex.org/W3091544144","https://openalex.org/W3125993419","https://openalex.org/W3127031155","https://openalex.org/W3131421420","https://openalex.org/W3153187775","https://openalex.org/W3176986586","https://openalex.org/W3205964802","https://openalex.org/W4224885329","https://openalex.org/W4226293448","https://openalex.org/W6718092244","https://openalex.org/W7016269222"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W3130669838","https://openalex.org/W2785397462","https://openalex.org/W4294873804","https://openalex.org/W4383109125","https://openalex.org/W2891227010"],"abstract_inverted_index":{"Reinforcement":[0],"learning":[1,198,207],"(RL)":[2],"is":[3,28],"pivotal":[4],"in":[5,61,73,183,208],"empowering":[6],"Unmanned":[7],"Aerial":[8],"Vehicles":[9],"(UAVs)":[10],"to":[11,141,199],"navigate":[12],"and":[13,17,21,41,70,94,104,131,196,212],"make":[14],"decisions":[15],"efficiently":[16],"intelligently":[18],"within":[19,164],"complex":[20,148],"dynamic":[22],"surroundings.":[23],"Despite":[24],"its":[25],"significance,":[26],"RL":[27,57,88,181],"hampered":[29],"by":[30,129,205],"inherent":[31],"limitations":[32],"such":[33],"as":[34],"low":[35],"sample":[36],"efficiency,":[37],"restricted":[38],"generalization":[39],"capabilities,":[40],"a":[42,86],"heavy":[43],"reliance":[44],"on":[45],"the":[46,62,99,123,145,154,191,201],"intricacies":[47],"of":[48,64,156,185,193],"reward":[49,149],"function":[50,150],"design.":[51],"These":[52],"challenges":[53,143],"often":[54],"render":[55],"single-method":[56,180],"approaches":[58],"inadequate,":[59],"particularly":[60],"context":[63],"UAV":[65,209],"operations":[66],"where":[67],"high":[68],"costs":[69],"safety":[71],"risks":[72],"real-world":[74],"applications":[75],"cannot":[76],"be":[77],"overlooked.":[78],"To":[79,152],"address":[80],"these":[81],"issues,":[82],"this":[83,119,128,157],"paper":[84],"introduces":[85],"novel":[87],"framework":[89,120],"that":[90,173],"synergistically":[91],"integrates":[92],"meta-learning":[93,103,195],"imitation":[95,197],"learning.":[96],"By":[97],"leveraging":[98,132],"Reptile":[100,176],"algorithm":[101],"from":[102],"Generative":[105],"Adversarial":[106],"Imitation":[107],"Learning":[108],"(GAIL),":[109],"coupled":[110],"with":[111],"state":[112,117],"normalization":[113],"techniques":[114],"for":[115,138,147],"processing":[116],"data,":[118],"significantly":[121],"enhances":[122],"model\u2019s":[124],"adaptability.":[125],"It":[126],"achieves":[127],"identifying":[130],"commonalities":[133],"across":[134],"various":[135],"tasks,":[136],"allowing":[137],"swift":[139],"adaptation":[140],"new":[142],"without":[144],"need":[146],"designs.":[151],"ascertain":[153],"efficacy":[155],"integrated":[158],"approach,":[159],"we":[160],"conducted":[161],"simulation":[162],"experiments":[163],"both":[165],"two-dimensional":[166],"environments.":[167],"The":[168],"empirical":[169],"results":[170],"clearly":[171],"indicate":[172],"our":[174],"GAIL-enhanced":[175],"method":[177],"surpasses":[178],"conventional":[179],"algorithms":[182],"terms":[184],"training":[186],"efficiency.":[187],"This":[188],"evidence":[189],"underscores":[190],"potential":[192],"combining":[194],"surmount":[200],"traditional":[202],"barriers":[203],"faced":[204],"reinforcement":[206],"trajectory":[210],"planning":[211],"decision-making":[213],"processes.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
