{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:36:56Z","timestamp":1763059016200,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_25","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"423-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Two-Stage Anomaly Detection in\u00a0LEO Satellite Network"],"prefix":"10.1007","author":[{"given":"Yipeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Peixian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Ai","sequence":"additional","affiliation":[]},{"given":"Weipeng","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Binjie","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Weichuan","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"25_CR1","first-page":"2962","volume":"34","author":"J Li","year":"2020","unstructured":"Li, J., Hu, X., Xiong, P., Zhou, W., et al.: The dynamic privacy-preserving mechanisms for online dynamic social networks. IEEE Trans. Knowl. Data Eng. 34, 2962\u20132974 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"7","key":"25_CR3","doi-asserted-by":"publisher","first-page":"3161","DOI":"10.1007\/s11227-017-2017-7","volume":"73","author":"Q Feng","year":"2017","unstructured":"Feng, Q., Zhang, Y., Li, C., Dou, Z., Wang, J.: Anomaly detection of spectrum in wireless communication via deep auto-encoders. J. Supercomput. 73(7), 3161\u20133178 (2017). https:\/\/doi.org\/10.1007\/s11227-017-2017-7","journal-title":"J. Supercomput."},{"key":"25_CR4","unstructured":"J, K. (n.d.). Shanghai wants law on radio spectrum. https:\/\/www.shine.cn\/news\/metro\/1803061282\/. Accessed Mar 2018"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Dong, J.: Hybrid electromagnetic signal feature extraction. Wirel. Commun. Mob. Comput. 2022 (2022)","DOI":"10.1155\/2022\/3693790"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"O\u2019Shea, T.J., Corgan, J., Clancy, T.C.: Unsupervised representation learning of structured radio communication signals. In: 2016 First International Workshop on Sensing, Processing and Learning for Intelligent Machines (SPLINE), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/SPLIM.2016.7528397"},{"key":"25_CR7","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv Preprint arXiv:1412.3555 (2014)"},{"key":"25_CR8","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-24797-2_4","volume-title":"Supervised Sequence Labelling with Recurrent Neural Networks","author":"A Graves","year":"2012","unstructured":"Graves, A.: Long short-term memory. In: Graves, A. (ed.) Supervised Sequence Labelling with Recurrent Neural Networks. SCI, vol. 385, pp. 37\u201345. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-24797-2_4"},{"issue":"4","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/TCOMM.2012.021712.100638","volume":"60","author":"Q Shi","year":"2012","unstructured":"Shi, Q., Karasawa, Y.: Automatic modulation identification based on the probability density function of signal phase. IEEE Trans. Commun. 60(4), 1033\u20131044 (2012)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"25_CR10","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/TSMCC.2010.2076347","volume":"41","author":"JL Xu","year":"2010","unstructured":"Xu, J.L., Su, W., Zhou, M.: Likelihood-ratio approaches to automatic modulation classification. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 41(4), 455\u2013469 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"issue":"8","key":"25_CR11","doi-asserted-by":"publisher","first-page":"4483","DOI":"10.1109\/TWC.2014.2320724","volume":"13","author":"Z Zhu","year":"2014","unstructured":"Zhu, Z., Nandi, A.K.: Blind digital modulation classification using minimum distance centroid estimator and non-parametric likelihood function. IEEE Trans. Wirel. Commun. 13(8), 4483\u20134494 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"25_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/0165-1684(84)90063-X","volume":"6","author":"F Liedtke","year":"1984","unstructured":"Liedtke, F.: Computer simulation of an automatic classification procedure for digitally modulated communication signals with unknown parameters. Signal Process. 6(4), 311\u2013323 (1984)","journal-title":"Signal Process."},{"issue":"2","key":"25_CR13","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/S0165-1684(99)00127-9","volume":"80","author":"BG Mobasseri","year":"2000","unstructured":"Mobasseri, B.G.: Digital modulation classification using constellation shape. Signal Process. 80(2), 251\u2013277 (2000)","journal-title":"Signal Process."},{"issue":"4","key":"25_CR14","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1049\/ip-rsn:20000492","volume":"147","author":"K Ho","year":"2000","unstructured":"Ho, K., Prokopiw, W., Chan, Y.: Modulation identification of digital signals by the wavelet transform. IEE Proc.-Radar Sonar Navig. 147(4), 169\u2013176 (2000)","journal-title":"IEE Proc.-Radar Sonar Navig."},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Wang, L., Guo, S., Jia, C.: Recognition of digital modulation signals based on wavelet amplitude difference. In: 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 627\u2013630. IEEE (2016)","DOI":"10.1109\/ICSESS.2016.7883147"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Lin, Y., Tu, Y., Dou, Z., Wu, Z.: The application of deep learning in communication signal modulation recognition. In: 2017 IEEE\/CIC International Conference on Communications in China (ICCC), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/ICCChina.2017.8330488"},{"issue":"3","key":"25_CR17","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.3390\/app10031166","volume":"10","author":"K Jiang","year":"2020","unstructured":"Jiang, K., Zhang, J., Wu, H., Wang, A., Iwahori, Y.: A novel digital modulation recognition algorithm based on deep convolutional neural network. Appl. Sci. 10(3), 1166 (2020)","journal-title":"Appl. Sci."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-45681-3_2","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"F Angiulli","year":"2002","unstructured":"Angiulli, F., Pizzuti, C.: Fast outlier detection in high dimensional spaces. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) PKDD 2002. LNCS, vol. 2431, pp. 15\u201327. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45681-3_2"},{"key":"25_CR20","unstructured":"Shyu, M.-L., Chen, S.-C., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier, Technical report, Miami University, Coral Gables Fl Department of Electrical and Computer Engineering (2003)"},{"issue":"7","key":"25_CR21","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Kumar, V.: Feature bagging for outlier detection. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 157\u2013166 (2005)","DOI":"10.1145\/1081870.1081891"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Kriegel, H.-P., Kr\u00f6ger, P., Schubert, E., Zimek, A.: Outlier detection in arbitrarily oriented subspaces. In: 2012 IEEE 12th International Conference on Data Mining, pp. 379\u2013388. IEEE (2012)","DOI":"10.1109\/ICDM.2012.21"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, C., et al.: A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 1409\u20131416 (2019)","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Deng, A., Hooi, B.: Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 4027\u20134035 (2021)","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Jiang, N., Jie, W., Li, J., Liu, X., Jin, D.: GATrust: a multi-aspect graph attention network model for trust assessment in OSNs. IEEE Trans. Knowl. Data Eng. (2022)","DOI":"10.1109\/TKDE.2022.3174044"},{"key":"25_CR27","unstructured":"Zong, B., et al.: Deep autoencoding Gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations (2018)"},{"key":"25_CR28","unstructured":"Dai, W., Xue, G.-R., Yang, Q., Yu, Y.: Transferring Naive Bayes classifiers for text classification. In: AAAI (2007)"},{"key":"25_CR29","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/978-3-540-87481-2_36","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"Z Wang","year":"2008","unstructured":"Wang, Z., Song, Y., Zhang, C.: Transferred dimensionality reduction. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008. LNCS (LNAI), vol. 5212, pp. 550\u2013565. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87481-2_36"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Dai, W., Yang, Q., Xue, G.-R., Yu, Y.: Self-taught clustering. In: ICML 2008 (2008)","DOI":"10.1145\/1390156.1390182"},{"key":"25_CR31","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1109\/TKDE.2017.2669193","volume":"29","author":"Y Xu","year":"2017","unstructured":"Xu, Y., et al.: A unified framework for metric transfer learning. IEEE Trans. Knowl. Data Eng. 29, 1158\u20131171 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR32","unstructured":"Tzeng, E., Hoffman, J., Zhang, N., Saenko, K., Darrell, T.: Deep domain confusion: maximizing for domain invariance. arXiv abs\/1412.3474 (2014)"},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Oquab, M., Bottou, L., Laptev, I., Sivic, J.: Learning and transferring mid-level image representations using convolutional neural networks. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1717\u20131724 (2014)","DOI":"10.1109\/CVPR.2014.222"},{"key":"25_CR34","unstructured":"Ajakan, H., Germain, P., Larochelle, H., Laviolette, F., Marchand, M.: Domain-adversarial neural networks. arXiv abs\/1412.4446 (2014)"},{"key":"25_CR35","unstructured":"Luo, Z., Zou, Y., Hoffman, J., Fei-Fei, L.: Label efficient learning of transferable representations across domains and tasks. arXiv abs\/1712.00123 (2017)"},{"key":"25_CR36","doi-asserted-by":"crossref","unstructured":"Liu, D., Alnegheimish, S., Zytek, A., Veeramachaneni, K.: MTV: visual analytics for detecting, investigating, and annotating anomalies in multivariate time series. arXiv preprint arXiv:2112.05734 (2021)","DOI":"10.1145\/3512950"},{"issue":"2","key":"25_CR37","doi-asserted-by":"publisher","first-page":"1414","DOI":"10.1109\/JIOT.2021.3086910","volume":"9","author":"Z Tianqing","year":"2021","unstructured":"Tianqing, Z., Zhou, W., Ye, D., Cheng, Z., Li, J.: Resource allocation in IoT edge computing via concurrent federated reinforcement learning. IEEE Internet Things J. 9(2), 1414\u20131426 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"25_CR38","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1109\/JAS.2019.1911747","volume":"6","author":"HA Dau","year":"2019","unstructured":"Dau, H.A., et al.: The UCR time series archive. IEEE\/CAA J. Automatica Sinica 6(6), 1293\u20131305 (2019)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"25_CR39","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-981-15-3442-3_23","volume-title":"Space Information Networks","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Xiao, Y., Hu, M., Liu, L.: Wireless signal recognition based on deep learning for LEO constellation satellite. In: Yu, Q. (ed.) SINC 2019. CCIS, vol. 1169, pp. 275\u2013285. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-3442-3_23"},{"key":"25_CR40","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/S0925-2312(01)00702-0","volume":"50","author":"G Zhang","year":"2003","unstructured":"Zhang, G.: Time series forecasting using a hybrid ARIMA and neural network model. Neurocomputing 50, 159\u2013175 (2003)","journal-title":"Neurocomputing"},{"key":"25_CR41","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/00031305.2017.1380080","volume":"72","author":"S Taylor","year":"2018","unstructured":"Taylor, S., Letham, B.: Forecasting at scale. Am. Stat. 72, 37\u201345 (2018)","journal-title":"Am. Stat."},{"key":"25_CR42","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances In Neural Information Processing Systems, vol. 30 (2017)"},{"key":"25_CR43","doi-asserted-by":"crossref","unstructured":"Lai, G., Chang, W.-C., Yang, Y., Liu, H.: Modeling long-and short-term temporal patterns with deep neural networks. In: The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 95\u2013104 (2018)","DOI":"10.1145\/3209978.3210006"},{"key":"25_CR44","doi-asserted-by":"crossref","unstructured":"Li, H., Pan, S., Wang, S., Kot, A.: Domain generalization with adversarial feature learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5400\u20135409 (2018)","DOI":"10.1109\/CVPR.2018.00566"},{"key":"25_CR45","doi-asserted-by":"crossref","unstructured":"Yu, C., Wang, J., Chen, Y., Huang, M.: Transfer learning with dynamic adversarial adaptation network. In: 2019 IEEE International Conference On Data Mining (ICDM), pp. 778\u2013786 (2019)","DOI":"10.1109\/ICDM.2019.00088"},{"key":"25_CR46","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T06:56:34Z","timestamp":1730530594000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}