{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:56Z","timestamp":1774541696514,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001804","name":"Canada Research Chair Program Tier-II entitled \u201cTowards a Novel and Intelligent Framework for the Next Generations of IoT Networks\u201d","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001866","name":"Luxembourg National Research Fund (FNR) under the project SmartSpace","doi-asserted-by":"publisher","award":["C21\/IS\/16193290"],"award-info":[{"award-number":["C21\/IS\/16193290"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1109\/lcomm.2023.3240363","type":"journal-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T18:33:57Z","timestamp":1674844437000},"page":"951-955","source":"Crossref","is-referenced-by-count":12,"title":["Reinforcement Learning for Link Adaptation and Channel Selection in LEO Satellite Cognitive Communications"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6426-1267","authenticated-orcid":false,"given":"Muhammad Anjum","family":"Qureshi","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Bilkent University, Ankara, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9936-7245","authenticated-orcid":false,"given":"Eva","family":"Lagunas","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg City, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5025-6624","authenticated-orcid":false,"given":"Georges","family":"Kaddoum","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, ETS, Montreal, Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Rate splitting multiple access for next generation cognitive radio enabled LEO satellite networks","author":"Khan","year":"2022","journal-title":"arXiv:2208.03705"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1197"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2930976"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2361084"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2854758"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685524"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3015823"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2975440"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486206"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737610"},{"key":"ref11","first-page":"1","article-title":"Analysis of Thompson sampling for stochastic sleeping bandits","volume-title":"Proc. Conf. Uncertainty Artif. Intell.","author":"Chatterjee"},{"key":"ref12","first-page":"418","article-title":"Nearly optimal adaptive procedure with change detection for piecewise-stationary bandit","volume-title":"Proc. 22nd Int. Conf. Artif. Intell. Statist.","author":"Cao"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2941717"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.833474"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASMS-SPSC.2012.6333102"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885616"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5178-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155530"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/10064471\/10026820.pdf?arnumber=10026820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T04:30:47Z","timestamp":1712982647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10026820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":20,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2023.3240363","relation":{},"ISSN":["1089-7798","1558-2558","2373-7891"],"issn-type":[{"value":"1089-7798","type":"print"},{"value":"1558-2558","type":"electronic"},{"value":"2373-7891","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3]]}}}