{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T21:03:36Z","timestamp":1774904616547,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62401313"],"award-info":[{"award-number":["62401313"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325108"],"award-info":[{"award-number":["62325108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62341131"],"award-info":[{"award-number":["62341131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62341109"],"award-info":[{"award-number":["62341109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62341106"],"award-info":[{"award-number":["62341106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Municipal Science and Technology Major Project"},{"name":"Tsinghua University Initiative Scientific Research Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Commun."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/jsac.2026.3669579","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T20:55:49Z","timestamp":1772484949000},"page":"4366-4381","source":"Crossref","is-referenced-by-count":0,"title":["STARDIS: Strategic Scheduling and Deceptive Signaling for Satellite Intrusion Detection System Deployment"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8795-7126","authenticated-orcid":false,"given":"Yuzhou","family":"Xiao","sequence":"first","affiliation":[{"name":"School of Automation, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1591-8749","authenticated-orcid":false,"given":"Linan","family":"Huang","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1355-5876","authenticated-orcid":false,"given":"Jiachen","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing, China"}]},{"given":"Peilong","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3703-121X","authenticated-orcid":false,"given":"Chunxiao","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8283-855X","authenticated-orcid":false,"given":"Linling","family":"Kuang","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365871"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365894"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00503-w"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.11959\/j.issn.2096-1081.2016.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3237701"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2964236"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670390"},{"key":"ref8","article-title":"Space threat assessment 2025","author":"Swope","year":"2025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103792"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3242700"},{"key":"ref11","volume-title":"New Developments and Advances in 5G and Non-Terrestrial Networks","year":"2025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365880"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.actaastro.2018.01.017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3460083"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s24175516"},{"key":"ref16","first-page":"58","article-title":"Lightweight intrusion detection system In IoT networks using raspberry Pi 3b+","volume-title":"Proc. CEUR Workshop","volume":"3080","author":"Sai"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF02341920"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/math11051232"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1257\/aer.101.6.2590"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1257\/aer.p20161046"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65048-3_13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/1913390"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9290"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_15"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3522558"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2025.3538738"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3317940"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.242"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3560828.3563995"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101660"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3118886"},{"key":"ref33","article-title":"Queue stability and probability 1 convergence via Lyapunov optimization","author":"Neely","year":"2010","journal-title":"arXiv:1008.3519"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1142\/S0219198917500335"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056569"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111680","article-title":"Computation offloading and resource allocation in satellite edge computing networks: A multi-agent reinforcement learning approach","volume":"272","author":"Xiu","year":"2025","journal-title":"Comput. Netw."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3530676"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3131332"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.811182"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195689"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3240366"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2024.000288"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/AERO55745.2023.10115682"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109246","article-title":"Satellite-based communications security: A survey of threats, solutions, and research challenges","volume":"216","author":"Tedeschi","year":"2022","journal-title":"Comput. Netw."},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2019.2927852"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1142\/WSSET"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1800365"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/49\/11372474\/11418680.pdf?arnumber=11418680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T20:07:06Z","timestamp":1774901226000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/jsac.2026.3669579","relation":{},"ISSN":["1558-0008","0733-8716"],"issn-type":[{"value":"1558-0008","type":"electronic"},{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]}}}