{"id":"https://openalex.org/W7128366316","doi":"https://doi.org/10.48550/arxiv.2602.06048","title":"Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks","display_name":"Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks","publication_year":2026,"publication_date":"2026-01-06","ids":{"openalex":"https://openalex.org/W7128366316","doi":"https://doi.org/10.48550/arxiv.2602.06048"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.06048","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113417720","display_name":"Yujie Ling","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ling, Yujie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125390793","display_name":"Zan Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Zan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125426752","display_name":"Lei Guan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guan, Lei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125425548","display_name":"Zheng Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Zheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125392883","display_name":"Shengyu Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Shengyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5125395541","display_name":"Tony Q. S. Quek","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Quek, Tony Q. S.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5113417720"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.9430000185966492,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.9430000185966492,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.008200000040233135,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.007199999876320362,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5837000012397766},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.46639999747276306},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46470001339912415},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4577000141143799},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.41589999198913574},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4043000042438507},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.3917999863624573},{"id":"https://openalex.org/keywords/cognitive-network","display_name":"Cognitive network","score":0.388700008392334},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.38449999690055847},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.36719998717308044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7849000096321106},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5837000012397766},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5605000257492065},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.46639999747276306},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46470001339912415},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4577000141143799},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.41589999198913574},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4043000042438507},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.3917999863624573},{"id":"https://openalex.org/C32542511","wikidata":"https://www.wikidata.org/wiki/Q5141225","display_name":"Cognitive network","level":4,"score":0.388700008392334},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.38449999690055847},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.36719998717308044},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.3605000078678131},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3546999990940094},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34619998931884766},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.34549999237060547},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.34049999713897705},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.33500000834465027},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3294000029563904},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3043000102043152},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.30410000681877136},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.2978000044822693},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.2603999972343445},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.2535000145435333}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.06048","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.06048","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.06048","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.06048","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Satellite-terrestrial":[0],"networks":[1,150],"(STNs)":[2],"have":[3],"emerged":[4],"as":[5],"a":[6,24,50,97,108,116],"promising":[7],"architecture":[8],"for":[9,16,167,198],"providing":[10],"seamless":[11],"wireless":[12],"coverage":[13],"and":[14,38,63,130,141,155,163,194],"connectivity":[15],"multiple":[17,57],"users.":[18],"However,":[19],"potential":[20],"malicious":[21],"eavesdroppers":[22,73],"pose":[23],"serious":[25],"threat":[26],"to":[27,34,40,87,96,124,137,151,160],"the":[28,70,89,126,131,173,182,201],"private":[29],"information":[30],"via":[31],"STNs":[32,199],"due":[33],"their":[35],"non-cooperative":[36],"behavior":[37],"ability":[39],"launch":[41],"intelligent":[42],"attacks.":[43],"To":[44,102],"address":[45],"this":[46,80,104],"challenge,":[47],"we":[48,82,106,114,146],"propose":[49,107],"cognitive":[51,202],"secure":[52,203],"communication":[53,204],"framework":[54],"driven":[55],"by":[56],"agents":[58],"that":[59,181],"coordinates":[60],"spectrum":[61,139],"scheduling":[62],"protection":[64,168],"through":[65],"real-time":[66],"sensing,":[67],"thereby":[68],"disrupting":[69],"judgment":[71],"of":[72,92,176,190],"while":[74],"preserving":[75],"reliable":[76,98],"data":[77],"transmission.":[78],"On":[79],"basis,":[81],"formulate":[83],"an":[84],"optimization":[85],"problem":[86],"maximize":[88],"secrecy":[90],"probability":[91,100],"legitimate":[93],"users,":[94],"subject":[95],"transmission":[99,143],"threshold.":[101],"tackle":[103],"problem,":[105],"two-layer":[109],"coordinated":[110],"defense":[111],"system.":[112],"First,":[113],"develop":[115],"foundation":[117],"layer":[118],"based":[119],"on":[120],"multi-agent":[121],"coordination":[122],"schedule":[123],"determine":[125],"satellite":[127],"operation":[128],"matrix":[129],"frequency":[132],"slot":[133],"occupation":[134],"matrices,":[135,154],"aiming":[136],"mitigate":[138],"congestion":[140],"enhance":[142],"reliability.":[144],"Then,":[145],"exploit":[147],"generative":[148],"adversarial":[149,153,164],"produce":[152],"employ":[156],"learning-aided":[157],"power":[158,196],"control":[159],"set":[161],"real":[162],"signal":[165],"powers":[166],"layer,":[169],"which":[170],"actively":[171],"degrades":[172],"inference":[174],"capability":[175],"eavesdroppers.":[177],"Simulation":[178],"results":[179],"demonstrate":[180],"proposed":[183],"method":[184],"outperforms":[185],"benchmark":[186],"methods":[187],"in":[188,200],"terms":[189],"enhancing":[191],"security":[192],"performance":[193],"reducing":[195],"overhead":[197],"scenario.":[205]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-10T00:00:00"}
