{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:59:38Z","timestamp":1775145578512,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1016\/j.comcom.2023.02.006","type":"journal-article","created":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T11:24:29Z","timestamp":1676287469000},"page":"154-165","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":17,"special_numbering":"C","title":["Intelligent and survivable resource slicing for 6G-oriented UAV-assisted edge computing networks"],"prefix":"10.1016","volume":"202","author":[{"given":"Guoquan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Bing","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0002-8811-0567","authenticated-orcid":false,"given":"Ya","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"16","key":"10.1016\/j.comcom.2023.02.006_b1","doi-asserted-by":"crossref","first-page":"14521","DOI":"10.1109\/JIOT.2021.3065357","article-title":"EdgeGO: a mobile resource-sharing framework for 6G edge computing in massive IoT systems","volume":"9","author":"Cong","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"10.1016\/j.comcom.2023.02.006_b2","doi-asserted-by":"crossref","first-page":"7145","DOI":"10.1109\/TII.2021.3052531","article-title":"A survey of computational intelligence for 6G: Key technologies, applications and trends","volume":"17","author":"Ji","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"4","key":"10.1016\/j.comcom.2023.02.006_b3","doi-asserted-by":"crossref","first-page":"2637","DOI":"10.1109\/JIOT.2021.3107490","article-title":"Slicing-based reliable resource orchestration for secure software-defined edge-cloud computing systems","volume":"9","author":"Tang","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.comcom.2023.02.006_b4","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/MWC.001.2100303","article-title":"Slicing-based software-defined mobile edge computing in the air","volume":"29","author":"Tang","year":"2022","journal-title":"IEEE Wirel. Commun."},{"issue":"9","key":"10.1016\/j.comcom.2023.02.006_b5","doi-asserted-by":"crossref","first-page":"6949","DOI":"10.1016\/j.jksuci.2021.08.014","article-title":"A review on 6G for space-air-ground integrated network: Key enablers, open challenges, and future direction","volume":"34","author":"Ray","year":"2021","journal-title":"J. King Saud Univ.-Comput. Inform. Sci."},{"key":"10.1016\/j.comcom.2023.02.006_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109133","article-title":"SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks","volume":"214","author":"Barakabitze","year":"2022","journal-title":"Comput. Netw."},{"issue":"9","key":"10.1016\/j.comcom.2023.02.006_b7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cja.2021.12.013","article-title":"6G service-oriented space-air-ground integrated network: A survey","volume":"35","author":"Cheng","year":"2021","journal-title":"Chin. J. Aeronaut."},{"issue":"4","key":"10.1016\/j.comcom.2023.02.006_b8","doi-asserted-by":"crossref","first-page":"4694","DOI":"10.1109\/JSYST.2020.2982857","article-title":"Autonomous resource slicing for virtualized vehicular networks with D2D communications based on deep reinforcement learning","volume":"14","author":"Sun","year":"2020","journal-title":"IEEE Syst. J."},{"issue":"4","key":"10.1016\/j.comcom.2023.02.006_b9","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1109\/LCOMM.2019.2900044","article-title":"EMBB-URLLC resource slicing: A risk-sensitive approach","volume":"23","author":"Alsenwi","year":"2019","journal-title":"IEEE Commun. Lett."},{"issue":"10","key":"10.1016\/j.comcom.2023.02.006_b10","doi-asserted-by":"crossref","first-page":"9896","DOI":"10.1109\/TVT.2018.2859740","article-title":"Dynamic radio resource slicing for a two-tier heterogeneous wireless network","volume":"67","author":"Ye","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"10.1016\/j.comcom.2023.02.006_b11","doi-asserted-by":"crossref","first-page":"3513","DOI":"10.1109\/TVT.2020.2975068","article-title":"Enhancing video streaming in vehicular networks via resource slicing","volume":"69","author":"Khan","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2023.02.006_b12","doi-asserted-by":"crossref","first-page":"74429","DOI":"10.1109\/ACCESS.2018.2881964","article-title":"Deep reinforcement learning for resource management in network slicing","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.comcom.2023.02.006_b13","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1109\/TWC.2021.3060514","article-title":"Intelligent resource slicing for eMBB and URLLC coexistence in 5g and beyond: A deep reinforcement learning based approach","volume":"20","author":"Alsenwi","year":"2021","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"7","key":"10.1016\/j.comcom.2023.02.006_b14","doi-asserted-by":"crossref","first-page":"7863","DOI":"10.1109\/TVT.2020.2992607","article-title":"Dynamic network slicing and resource allocation in mobile edge computing systems","volume":"69","author":"Feng","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2023.02.006_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.106987","article-title":"Network slicing-enabled RAN management for 5G: Cross layer control based on SDN and SDR","volume":"166","author":"Barmpounakis","year":"2020","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comcom.2023.02.006_b16","series-title":"Proceedings of the IEEE Global Communications Conference","first-page":"01","article-title":"One for all: Traffic prediction at heterogeneous 5G edge with data-efficient transfer learning","author":"Chen","year":"2021"},{"key":"10.1016\/j.comcom.2023.02.006_b17","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.future.2021.10.019","article-title":"Workload forecasting and energy state estimation in cloud data centres: ML-centric approach","volume":"128","author":"Khan","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comcom.2023.02.006_b18","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.ins.2020.07.012","article-title":"Self directed learning based workload forecasting model for cloud resource management","volume":"543","author":"Kumar","year":"2021","journal-title":"Inform. Sci."},{"issue":"1","key":"10.1016\/j.comcom.2023.02.006_b19","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TNSE.2018.2848960","article-title":"Channel state information prediction for 5G wireless communications: A deep learning approach","volume":"7","author":"Luo","year":"2018","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.comcom.2023.02.006_b20","doi-asserted-by":"crossref","first-page":"102554","DOI":"10.1109\/ACCESS.2019.2926986","article-title":"A fast algorithm for network forecasting time series","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.comcom.2023.02.006_b21","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MNET.2018.1800104","article-title":"Improving traffic forecasting for 5G core network scalability: A machine learning approach","volume":"32","author":"Alawe","year":"2018","journal-title":"IEEE Netw."},{"key":"10.1016\/j.comcom.2023.02.006_b22","series-title":"Proceedings of the IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"End-to-end mobile network slice embedding leveraging edge computing","author":"Fendt","year":"2020"},{"key":"10.1016\/j.comcom.2023.02.006_b23","doi-asserted-by":"crossref","first-page":"104304","DOI":"10.1109\/ACCESS.2021.3099824","article-title":"Qos-forecasting-based intelligent flow-control scheme for multi-connectivity in 5G heterogeneous networks","volume":"9","author":"Ba","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2023.02.006_b24","series-title":"Proceedings of the International Conference on Distributed Computer and Communication Networks","first-page":"27","article-title":"SDN load prediction algorithm based on artificial intelligence","author":"Volkov","year":"2019"},{"issue":"11","key":"10.1016\/j.comcom.2023.02.006_b25","doi-asserted-by":"crossref","first-page":"8129","DOI":"10.1109\/TII.2022.3163558","article-title":"Time-varying-aware network traffic prediction via deep learning in iIoT","volume":"18","author":"Wang","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3\u20134","key":"10.1016\/j.comcom.2023.02.006_b26","first-page":"1","article-title":"Systematic scalability modeling of QoS-aware dynamic service composition","volume":"16","author":"Duboc","year":"2022","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"issue":"12","key":"10.1016\/j.comcom.2023.02.006_b27","doi-asserted-by":"crossref","first-page":"15947","DOI":"10.1109\/TVT.2020.3038918","article-title":"Preemptive SDN load balancing with machine learning for delay sensitive applications","volume":"69","author":"Filali","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2023.02.006_b28","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.eswa.2017.12.037","article-title":"An architecture for emergency event prediction using LSTM recurrent neural networks","volume":"97","author":"Cortez","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.comcom.2023.02.006_b29","series-title":"Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting","first-page":"1","article-title":"Failure prediction based VNF migration mechanism for multimedia services in power grid substation monitoring","author":"Mingshi","year":"2022"},{"issue":"4","key":"10.1016\/j.comcom.2023.02.006_b30","doi-asserted-by":"crossref","first-page":"2868","DOI":"10.1109\/TII.2021.3116529","article-title":"Local trajectory privacy protection in 5G enabled industrial intelligent logistics","volume":"18","author":"Yang","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"11","key":"10.1016\/j.comcom.2023.02.006_b31","doi-asserted-by":"crossref","first-page":"3444","DOI":"10.1109\/JSAC.2021.3088675","article-title":"A UAV-assisted ubiquitous trust communication system in 5G and beyond networks","volume":"39","author":"Huang","year":"2021","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comcom.2023.02.006_b32","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2021.107336","article-title":"Echo state network applied for classification of medium voltage insulators","volume":"134","author":"Stefenon","year":"2022","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.comcom.2023.02.006_b33","series-title":"Proceedings of the IEEE Global Communications Conference","first-page":"1","article-title":"Optimisation models for robust and survivable network slice design: A comparative analysis","author":"Baumgartner","year":"2017"},{"issue":"5","key":"10.1016\/j.comcom.2023.02.006_b34","doi-asserted-by":"crossref","first-page":"1453","DOI":"10.1007\/s00500-018-3152-7","article-title":"A heuristic survivable virtual network mapping algorithm","volume":"23","author":"Zheng","year":"2019","journal-title":"Soft Comput."},{"issue":"4","key":"10.1016\/j.comcom.2023.02.006_b35","doi-asserted-by":"crossref","first-page":"4277","DOI":"10.1109\/TNSM.2021.3102583","article-title":"Efficient VNF placement for Poisson arrived traffic","volume":"18","author":"Sun","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366423000439?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366423000439?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:42:33Z","timestamp":1758843753000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366423000439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":35,"alternative-id":["S0140366423000439"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2023.02.006","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Intelligent and survivable resource slicing for 6G-oriented UAV-assisted edge computing networks","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2023.02.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}