2020 International Conference on Wireless Communications and Signal Processing (WCSP) 2020
DOI: 10.1109/wcsp49889.2020.9299705
|View full text |Cite
|
Sign up to set email alerts
|

A Radio Environment Mapping Based Spectrum Awareness for Cognitive Space Information Network with GEO and LEO Coexistence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…A heuristics-based Radio Resource Management (RRM) algorithm was designed for mitigating the interference between LEO and GEO satellites by Emiliano et al [49], which was tested in a software simulator. A novel spectrum usage between GEO and LEO satellites was proposed by Wang et al [50], which struck an attractive trade-off between the design complexity and the spectrum awareness accuracy. Ge et al [51] proposed a Non-orthogonal Multiple Access (NOMA)-based GEO and LEO satellite network and employed Successive Interference Cancellation (SIC) for mitigating the interference.…”
Section: Related Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…A heuristics-based Radio Resource Management (RRM) algorithm was designed for mitigating the interference between LEO and GEO satellites by Emiliano et al [49], which was tested in a software simulator. A novel spectrum usage between GEO and LEO satellites was proposed by Wang et al [50], which struck an attractive trade-off between the design complexity and the spectrum awareness accuracy. Ge et al [51] proposed a Non-orthogonal Multiple Access (NOMA)-based GEO and LEO satellite network and employed Successive Interference Cancellation (SIC) for mitigating the interference.…”
Section: Related Contributionsmentioning
confidence: 99%
“…Digital currency design for debris removal [61] Multi-sensor space debris tracking [62] Reinforcement learning for debris removal [63] Multibistatic radar [64] Space Debris Reconfiguration through remote uplink [56] Periodic reconfigura -tion [57] SEU TMR [58] Fault-tolerant Viterbi decoder [59] Fault-tolerant Turbo decoder [60] Robust constrained inverse BF [52] Jamming Anti-jamming based on IRS [54] DRL and stackelberg game [53] Satellite diversity [55] Coverageexpanding [48] Inter-system interference REM based spectrum sensing [50] Heuristics based RRM [49] SIC [51] Shortest path routing with risk control [44] Node compromise Stochastic blockchain [45] Artificial neural networks based intrusion detection [46] Physical unclonable password [47] Vulnerability intelligent early warning [41] Hijacking Big Data-aided intrusion detection [42] ROAchain based on blockchain [43] Robust BF [38] Wiretap Threshold-based Scheduling [39] IRS [40] Fig. 3: Development timeline of related works for solving security vulnerabilities.…”
Section: 2021mentioning
confidence: 99%