[1]
Sheenu Singh, Meetu Kandpal, and H. B. . Bhadka, “Trust-Aware and Adaptive Malicious Node Detection in Fog Network using Independent DQN with Centralized Training”, JASTT, vol. 7, no. 1, pp. 47–66, Jan. 2026, doi: 10.38094/jastt71547.