{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T04:17:55Z","timestamp":1770956275777,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,9]]},"DOI":"10.1109\/icc51166.2024.10622302","type":"proceedings-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T15:34:42Z","timestamp":1724168082000},"page":"4786-4791","source":"Crossref","is-referenced-by-count":6,"title":["Deep Reinforcement Learning-Based Moving Target Defense for Multicast in Software-Defined Satellite Networks"],"prefix":"10.1109","author":[{"given":"Yibo","family":"Lian","sequence":"first","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing Jiaotong University"}]},{"given":"Changqiao","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications"}]},{"given":"Wei","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications"}]},{"given":"Minrui","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University"}]},{"given":"Zhenyu","family":"Xiahou","sequence":"additional","affiliation":[{"name":"Jiangxi Academy of Cyber Security"}]},{"given":"Jiawen","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology"}]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing Jiaotong University"}]},{"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3244674"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3287196"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3078433"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3322805"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2023.01.016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3301626"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176121"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3332895"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3072902"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3190556"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3314219"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3310072"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3144971"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800299"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2022.3169732"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0948-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s22197286"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3290769"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.52"},{"key":"ref20","first-page":"1","author":"Mnih","year":"2013","journal-title":"Playing Atari with Deep Reinforcement Learning"},{"key":"ref21","volume-title":"Ansys stk","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014119"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030518"}],"event":{"name":"ICC 2024 - IEEE International Conference on Communications","location":"Denver, CO, USA","start":{"date-parts":[[2024,6,9]]},"end":{"date-parts":[[2024,6,13]]}},"container-title":["ICC 2024 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10622104\/10622158\/10622302.pdf?arnumber=10622302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T20:39:08Z","timestamp":1724963948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10622302\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icc51166.2024.10622302","relation":{},"subject":[],"published":{"date-parts":[[2024,6,9]]}}}