{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:48:09Z","timestamp":1730238489076,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276047"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1109\/icde60146.2024.00356","type":"proceedings-article","created":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T17:38:03Z","timestamp":1721756283000},"page":"4685-4698","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Insight Trader: A Trading Approach Integrating Policies with Diverse Investment Horizons for Portfolio Management"],"prefix":"10.1109","author":[{"given":"Zetao","family":"Zheng","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China,Chengdu,China"}]},{"given":"Jie","family":"Shao","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,Chengdu,China"}]},{"given":"Shilong","family":"Deng","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,Chengdu,China"}]},{"given":"Anjie","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,Chengdu,China"}]},{"given":"Heng Tao","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,Chengdu,China"}]},{"given":"Xiaofang","family":"Zhou","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology,Hong Kong SAR,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2512962"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1143844.1143846"},{"key":"ref3","first-page":"345","article-title":"Can we learn to beat the best stock","author":"Borodin","year":"2003","journal-title":"Advances in Neural Information Processing Systems 16 Neural Information Processing Systems, NIPS 2003"},{"volume-title":"Proceedings of the 29th International Conference on Machine Learning, ICML 2012","year":"2012","author":"Li","article-title":"On-line portfolio selection with moving average reversion","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1287\/mnsc.2013.1838"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1609\/aaai.v34i01.5462"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3511808.3557363"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1609\/aaai.v35i1.16144"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TKDE.2020.2979700"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1038\/srep02857"},{"volume-title":"Fractal Market Analysis: Applying Chaos Theory to Investment and Economics","year":"1994","author":"Peters","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TKDE.2013.133"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SSCI.2017.8280883"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICDE51399.2021.00233"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s10489-022-03321-w"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.ins.2020.05.066"},{"key":"ref17","article-title":"A deep reinforcement learning frame-work for the financial portfolio management problem","volume":"abs\/1706.10059","author":"Jiang","year":"2017","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1111\/1467-9965.00058"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.eswa.2021.115889"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/10719839_19"},{"issue":"2","key":"ref21","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/0196-8858(86)90029-1","article-title":"On-line portfolio selection using multiplicative updates","volume":"7","author":"Cover","year":"1986","journal-title":"Adv. Appl. Math."},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1023\/A:1007530728748"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/s10994-012-5281-z"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/2435209.2435213"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TKDE.2016.2563433"},{"key":"ref26","first-page":"952","article-title":"Optimal asset allocation using adaptive dynamic programming","author":"Neuneier","year":"1995","journal-title":"Advances in Neural Information Processing Systems 8, NIPS 1995"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s41019-022-00186-4"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.eswa.2023.119556"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.24963\/ijcai.2020\/641"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TNNLS.2016.2522401"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/CyberC55534.2022.00031"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.24963\/ijcai.2023\/441"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/s00521-022-08011-9"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.24963\/ijcai.2020\/623"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3490354.3494366"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/ICDE51399.2021.00079"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TBME.2014.2360101"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/j.ins.2018.07.015"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ICDE55515.2023.00046"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1016\/j.jksuci.2013.12.001"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.24963\/ijcai.2020\/628"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/BF00992696"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1023\/A:1022676722315"},{"key":"ref44","first-page":"538","article-title":"The optimal reward baseline for gradient-based reinforcement learning","volume-title":"UAI 01: Proceedings of the 17th Conference in Uncertainty in Artificial Intelligence","author":"Weaver","year":"2001"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/BF00115009"},{"volume-title":"4th International Conference on Learning Representations, ICLR 2016","year":"2016","author":"Yu","article-title":"Multi-scale context aggregation by dilated convolutions","key":"ref46"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1007\/s41019-023-00233-8"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.48550\/ARXIV.1706.03762"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1142\/S0219525901000188"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1609\/aaai.v32i1.11794"},{"key":"ref52","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","author":"Sutton","year":"1999","journal-title":"Advances in Neural Information Processing Systems 12, NIPS 1999"},{"volume-title":"4th International Conference on Learning Representations, ICLR 2016","year":"2016","author":"Lillicrap","article-title":"Continuous control with deep reinforcement learning","key":"ref53"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.48550\/ARXIV.1707.06347"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/ICDE48307.2020.00039"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1609\/aaai.v28i1.8902"},{"key":"ref57","first-page":"1008","article-title":"Actor-critic algorithms","volume-title":"Advances in Neural Information Processing Systems 12, [NIPS Conference 1999]","author":"Konda","year":"1999"}],"event":{"name":"2024 IEEE 40th International Conference on Data Engineering (ICDE)","start":{"date-parts":[[2024,5,13]]},"location":"Utrecht, Netherlands","end":{"date-parts":[[2024,5,16]]}},"container-title":["2024 IEEE 40th International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10597630\/10597390\/10597980.pdf?arnumber=10597980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T07:21:22Z","timestamp":1721805682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10597980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":57,"URL":"http:\/\/dx.doi.org\/10.1109\/icde60146.2024.00356","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]}}}