Open Access
ARTICLE
Machine Learning-Based Power Allocation for Covert Communication in LEO Satellite–UAV Cooperative Networks
1 Department of Electronics Engineering and Applied Communications Research Center, Hankuk University of Foreign Studies, Yongin, Republic of Korea
2 Department of Future Convergence Technology Engineering, Sungshin Women’s University, Seoul, Republic of Korea
* Corresponding Authors: Jung Hoon Lee. Email: ; Il-Gu Lee. Email:
(This article belongs to the Special Issue: Advanced Security and Privacy for Future Mobile Internet and Convergence Applications: A Computer Modeling Approach)
Computer Modeling in Engineering & Sciences 2026, 147(1), 48 https://doi.org/10.32604/cmes.2026.078247
Received 27 December 2025; Accepted 02 March 2026; Issue published 27 April 2026
Abstract
In next-generation non-terrestrial network environments, the increasing risk of detection by unauthorized observers has motivated extensive research on covert communication approaches that minimize the probability of detection. In particular, jamming-assisted cooperative covert communication has attracted significant attention as an effective approach to simultaneously ensure communication performance and security, leading to growing interest in cooperative architectures among heterogeneous platforms. This study investigates covert communication in Low Earth Orbit (LEO) satellite–unmanned aerial vehicle (UAV) cooperative networks, where the LEO satellite serves a legitimate user, while the UAV acts as a cooperative jammer to enhance covertness. A network that integrates a LEO satellite with wide service coverage and a UAV with high mobility offers flexible support for covert communication in diverse environments. However, the problem of optimally allocating power between the LEO satellite and UAV while satisfying the covert communication constraint inherently exhibits a non-convex structure, which commonly necessitates a discretized grid-search baseline over feasible candidate combinations. As the number of candidates increases, this approach suffers from rapidly increasing computational complexity. To address this computational burden, this study proposes a machine-learning (ML)–based power-allocation scheme. The proposed ML model leverages key channel-related and covertness-related features to efficiently select an effective pair of power scaling factors, while significantly reduced computational complexity. Simulation results demonstrate that the proposed scheme achieves comparable average covert rate to that of the discretized grid-search baseline while requiring substantially lower computational complexity. These results further indicate that the proposed scheme enables low-latency and efficient power control in LEO satellite–UAV cooperative networks. Finally, future work will extend the proposed scheme to more complex multi-LEO satellite–UAV cooperative scenarios through joint optimization of additional system parameters.Keywords
Security in wireless communication systems has been widely regarded as a fundamental research topic for protecting confidential information from unauthorized receivers. Accordingly, a wide range of security techniques based on physical-layer security (PLS) and encryption have been extensively investigated. However, most PLS schemes rely heavily on channel state information (CSI), and their security performance can be significantly degraded if adversaries obtain access to this information. Encryption-based approaches inherently suffer from a risk of secret key leakage, which cannot be entirely eliminated. These limitations highlight the need for a robust security paradigm that complements conventional security mechanisms.
Motivated by these limitations, covert communication, aiming to conceal the transmitted information, as well as the existence of wireless transmissions from unauthorized wardens, has emerged as a new paradigm for secure communication. Covert communication aims to reduce the reliability of a warden’s detection by increasing both false-alarm and miss-detection probabilities when determining the presence of a transmission [1]. These covert communication techniques have been extensively investigated in terrestrial wireless network environments. In particular, the authors in [2] showed that, in quasi-static fading environments with channel uncertainty, the detection performance of a warden becomes largely insensitive to the accuracy of CSI when the detection error probability is sufficiently high. Meanwhile, the authors in [3] proposed a scheme that employs full-duplex decode-and-forward user relaying to achieve perfect cancellation of covert signals at the warden. Moreover, the authors in [4] analyzed the covert transmission rate of a wireless relay system by optimizing the transmit power while jointly considering cooperative jamming and relay selection. In addition, the authors in [5] investigated covert communication in more complex scenarios, where the fundamental trade-off between covertness requirements and secrecy transmission rate was analyzed in the presence of untrusted relay nodes and multiple wardens through jamming-based power allocation. Similarly, the authors in [6] considered covert communication in multi-antenna amplify-and-forward relaying networks, where the relay was designed to simultaneously forward confidential signals and transmit artificial noise, and relay precoding and power allocation were optimized based on CSI to enhance covertness performance. Furthermore, covert communication schemes that leverage intelligent aerial platforms have been proposed. Specifically, the authors in [7] presented a covert communication framework that integrated an unmanned aerial vehicle (UAV) with an intelligent reflecting surface (IRS), where the transmit power, IRS phase shifts, and UAV location were jointly optimized to maximize the covert transmission rate under the worst-case detection conditions. Similarly, the authors in [8] proposed a covert communication framework for reconfigurable intelligent surface (RIS)-assisted cooperative networks, where power allocation was optimized to simultaneously enhance covertness and PLS by reducing both the detection error probability and the eavesdropping probability.
With the expansion of wireless network coverage across terrestrial, aerial, and space domains, research on covert communication has extended beyond terrestrial and aerial networks to space–air integrated networks. Among these architectures, systems that integrate Low Earth Orbit (LEO) satellites with UAVs have attracted significant attention owing to their ability to provide wide service coverage and high operational flexibility [9]. In this context, the authors in [10] analyzed covert communication performance in space–air–ground integrated networks by accounting for practical impairments such as channel estimation errors, hardware imperfections, and co-channel interference, and highlighted the importance of power allocation and CSI accuracy. In addition, the authors in [11] studied covert communication in a space–air–ground integrated network with a dual-hop transmission structure, where finite block-length communication was considered and the covert outage probability was analyzed under artificial noise (AN)-assisted jamming, thereby revealing the impact of key system parameters on covertness performance. The authors in [12] proposed a game-theoretic approach for covert communication in large-scale multi-tier LEO satellite networks, where UAVs are considered service nodes supported by a satellite backhaul, thereby simultaneously improving transmission reliability and coverage while maintaining terrestrial wardens. Meanwhile, the authors in [13] investigated a covert communication system employing UAVs as relays from a practical system design perspective and proposed a scheme to optimize the effective covert transmission rate in Rician fading environments by leveraging full-duplex cooperative jamming. In a related line of work, the authors in [14] analytically investigated the uplink outage probability in full-duplex multiple-input multiple-output (MIMO)-based cooperative communications between autonomous aerial vehicles and intelligent connected vehicles by accounting for interference, and proposed low-complexity approximation methods. In addition, the authors of [15] studied channel prediction for UAV–LEO satellite links and proposed a lightweight channel prediction network based on multilayer perceptrons, which improves prediction accuracy while reducing computational complexity.
Machine learning (ML) has emerged as an effective tool for reducing the high computational complexity associated with resource allocation and signal processing problems in wireless and satellite networks. In [16], the authors employed a deep neural network (DNN) to predict the optimal decoding order for successive interference cancellation in multiuser multiple-input single-output (MISO) non-orthogonal multiple access systems, which significantly reduced the computational complexity of an exhaustive search while achieving near-optimal performance. In addition, the authors in [17] introduced a model-free actor–critic reinforcement learning–based resource allocation framework for satellite networks supporting the Internet of Remote Things, which jointly optimizes power allocation and data scheduling in dynamic channels and energy harvesting environments. Along similar lines, the authors in [18] proposed a resource allocation scheme for the non-terrestrial network uplink that combines long short-term memory–based channel prediction with deep reinforcement learning to cope with time-varying channels, thereby maximizing the uplink transmission rate while ensuring fairness and minimizing latency. In addition, the authors in [19] developed a deep Q-network–based scheduling algorithm for beam-hopping LEO satellite communication systems, which jointly optimizes time-slot allocation and power control to satisfy traffic demands while minimizing the total power consumption. Moreover, to address frequent handover issues in LEO satellite networks, the authors in [20] proposed a distributed multi-agent deep reinforcement learning-based handover strategy. Furthermore, Ref. [21] proposed a hybrid framework that combined convex optimization with deep learning for LEO satellite downlink networks, enabling efficient solutions to NP-hard joint channels and power allocation problems. Moreover, the authors in [22] presented a joint design for channel estimation, multiuser detection, and resource allocation based on deep learning for satellite NOMA systems, which significantly improved the bit error rate performance in time-varying channel environments. Finally, the authors in [23] proposed a joint optimization framework based on deep reinforcement learning for UAV–RIS–assisted Internet of Vehicles networks, aiming to maximize secrecy energy efficiency.
Motivated by these studies, this study proposes an ML-based power allocation scheme for covert communication in LEO satellite–UAV cooperative networks. The proposed scheme leverages the wide coverage of LEO satellites and the mobility of UAVs to enhance covert communication performance, while employing an ML model to significantly reduce the computational complexity associated with power allocation. In the considered framework, the UAV acts as a cooperative jammer by transmitting AN, while the learning model adopts a DNN architecture to predict an effective pair of power scaling factors. Simulation results demonstrate that the proposed scheme achieves a performance comparable average covert rate to that of a discretized grid-search baseline, with substantially lower computational complexity.
The remainder of this paper is organized as follows. Section 3 describes the system model and formulates the covert communication problem. Section 4 presents the proposed ML-based power allocation scheme. Section 5 evaluates the performance through numerical simulations, and Section 6 concludes the paper.
Table 1 lists the main mathematical symbols used in this paper.

The considered system model is illustrated in Fig. 1. Specifically, we considered an LEO satellite–UAV cooperative network for covert communications comprising an LEO satellite (Alice) equipped with an

Figure 1: System model of the considered LEO satellite–UAV cooperative covert communication network.
The UPA at Alice consists of
The channels from Alice to Bob and Alice to Willie are as follows:
The Alice-Bob and Alice-Willie channels are characterized by the Rician K-factors
The LoS components of Alice are defined as follows:
Under the above assumptions, the NLoS components of Alice are expressed as:
Here,
The UPA steering vector is defined as:
where
where the inter-element spacing is set to
Furthermore, the channels from Charlie to Bob and Charlie to Willie are denoted by:
The channels associated with Charlie follow a structure similar to those of Alice, where
The LoS components of Charlie are defined as follows:
Similarly, the NLoS components associated with Charlie are given by:
Here,
The array steering vector is normalized to the unit norm.
The transmitted signals of Alice and Charlie can be expressed as:
where
Thus, the signals received by Bob and Willie are denoted by:
where
Alice employs maximum ratio transmission (MRT) beamforming to maximize the received signal power at Bob. Accordingly, the MRT beamforming vector at Alice is given by:
In contrast, Charlie adopts zero-forcing (ZF) beamforming for AN transmission, which is designed to lie in the null space of the Charlie–Bob channel in order to avoid causing interference to Bob. Since Charlie is equipped with a two-element ULA and Bob employs a single antenna, the null space of the Charlie–Bob channel is one-dimensional, which guarantees the existence of a non-trivial ZF beamforming vector. Specifically, Charlie’s ZF beamforming vector
Consequently, the ZF beamforming vector satisfies the following null-space constraint:
This ensures that the AN transmitted by Charlie is completely nulled at Bob’s receiver. Consequently, the interference term in (12) vanishes, and the SINR at Bob simplifies to:
Thus, the achievable covert rate at Bob’s end under the covert communication constraint is expressed as:
Willie used an energy detector and performs a binary hypothesis test over B observation samples (channel uses) to detect Alice’s transmissions. Accordingly, the detection problem is formulated as:
From (18), under
Specifically, Willie’s test statistic is denoted by:
which measures the average energy of the received signal over B observation samples (channel uses). Accordingly, the average received power at Willie under the two hypotheses can be expressed as:
By invoking the central limit theorem, when B is sufficiently large, the test statistic
Hence, the false alarm probability (i.e., Willie deciding
where
Willie is assumed to adopt an optimal detection threshold that minimizes
where
To transform the probabilistic covertness constraint in (23) as an equivalent covertness constraint expressed in terms of transmit power, Pinsker’s inequality is employed to lower bound the detection error probability in terms of the Kullback–Leibler (KL) divergence between the distributions under the two hypotheses [6]. Specifically, the optimal detection error probability satisfies
Accordingly, a sufficient condition to guarantee
Moreover, due to the Gaussianity and mutual independence of the transmitted signals and noise components, Willie’s received signal
In the covert communication regime, the impact of Alice’s transmission on Willie’s observation is sufficiently small, such that
Substituting (27) into (25), we obtain
Finally, by substituting (20) into (28), Alice’s transmit power is constrained to satisfy the following condition:
However, obtaining power scaling factors
Based on the discretized set
Under the above formulation, the covert rate is computed for all effective power scaling factor combinations. Specifically, when the covert constraint (29) is satisfied, the covert rate is evaluated in the usual manner, whereas it is defined as zero otherwise. This definition can be explicitly expressed as:
As the optimization of the effective power scaling factor combination is performed over a discretized set rather than a continuous domain via a grid search, the solution obtained from (31) is regarded as discretized grid-search baseline. Under ZF beamforming,
4 ML-Based Power Allocation Scheme
In this section, we describe the proposed power allocation scheme in detail. First, we explain the role of the ML model in the proposed scheme and then provide a detailed description of its architecture.
The objective of this study is to leverage an ML model to identify an effective power scaling factor combination that maximizes the covert rate while maintaining low computational complexity. In conventional grid search–based approaches, reducing the step size
To overcome this limitation, this study employs an ML model to select an effective power scaling factor combination using effective channel gains and covertness-related features as inputs. In the proposed scheme, training is performed in the offline phase using several channel realizations, while in the online phase, the trained model can directly select an effective power scaling factor combination without resorting to an exhaustive search. Consequently, the proposed scheme significantly reduces computational complexity while achieving a performance close to that of the discretized grid-search baseline, making it suitable for practical covert communication systems.
The architecture of the proposed ML model is shown in Fig. 2. In this study, we consider a classification-based DNN. The proposed DNN employs channel gains and a covertness-related feature as inputs and learns to select an effective power scaling factor combination from a predefined set of candidate combinations. Considering instantaneous effective channel gains and a covertness feature, the trained DNN directly predicts an effective power scaling factor combination that satisfies the covertness constraint with low computational complexity.

Figure 2: Architecture of the proposed ML-based power allocation model.
In LEO satellite communication environments, the channel conditions vary rapidly owing to the high mobility of LEO satellites. Therefore, it is crucial to select an effective power scaling factor combination that satisfies the covertness constraint with low computational complexity. As a result, instead of repeatedly solving complex continuous optimization problems, the proposed classification-based DNN provides an effective and practical solution for covert communication in LEO satellite systems. The input nodes consist of the signal-to-noise ratio (SNR), effective channel gain from Alice to Bob
In addition, the proposed DNN comprises L hidden layers, where the
where
In this section, we evaluate the performance of the proposed ML-based scheme for power allocation and compare it with that of the discretized grid-search baseline. The simulation parameters are summarized in Table 2. We consider a simulation environment where Alice is equipped with a

For training,
Figs. 3–5 compare the average covert rate of the proposed scheme with that of the discretized grid-search baseline, where the step size of the effective power scaling factor is set to

Figure 3: Average covert rate of different schemes under Rician fading with K-factor

Figure 4: Average covert rate of different schemes under Rician fading with K-factor

Figure 5: Average covert rate of different schemes under Rician fading with K-factor
Fig. 6 compares the average covert rate performance of the proposed scheme with that of the discretized grid-search baseline using a step size of

Figure 6: Average covert rate of different schemes under Rician fading with K-factor
This performance gap can be attributed to the simultaneous increase in the classification difficulty and the size of the search space as the effective power scaling factor discretization becomes finer. When the step size of the effective power scaling factors is relatively large, i.e.,
Nevertheless, the proposed scheme offers a notable computational advantage in terms of computational efficiency. To ensure a fair comparison, the runtime is evaluated only for the decision stage using pre-generated inputs, while preprocessing steps such as channel generation, beamforming, and effective channel gain computation are not included. This is because these operations are common to both the proposed scheme and the discretized grid-search baseline and are independent of the decision-making process. All runtime evaluations are conducted under the same batch size of 1024 on an Intel(R) Core(TM) i7-9700 CPU @ 3.00 GHz using TensorFlow 2.4.1, ensuring a fair comparison of the inference complexity. Both the proposed scheme and the discretized grid-search baseline are evaluated under the same runtime evaluation protocol. Therefore, the real-time practicality claim is limited to the inference stage under the validated experimental configuration described above. Under this setting, the proposed scheme achieves an average inference time of approximately 0.069 ms per sample, whereas the discretized grid-search baseline with
To further quantify this advantage, the computational complexity of the proposed scheme can be expressed as:
For the discretized grid-search baseline, the computational complexity scales with the number of candidate effective power scaling factor combinations and can be expressed as:
Fig. 7 illustrates the impact of the allowable detection error probability on the average covert rate, where the detection error probability is varied with a step size of 0.01 and the SNR is fixed at 15 dB under Rician fading with K-factor =

Figure 7: Average covert rate of the detection error probability, varied from
To assess robustness against random initialization, experiments were conducted over five independent random seeds. Table 3 summarizes the mean and standard deviation (SD) of the average covert rate across SNR values, while Table 4 reports the classification accuracy for each seed. The reported statistics show only minor variation across different seeds.


In this study, we proposed an ML–based power allocation scheme for covert communication in LEO satellite–UAV cooperative networks. By utilizing the cooperation between the LEO satellite and the UAV, the proposed scheme effectively enhances the covert transmission performance while significantly reducing the computational complexity associated with power allocation. Numerical results demonstrate that, with a moderate step size of the effective power scaling factors, the proposed scheme achieves a comparable average covert rate to that of the discretized grid-search baseline, while significantly reducing the computational complexity. As the step size decreases, the performance gap between the proposed scheme and the discretized grid-search baseline becomes more pronounced, revealing an inherent scalability trade-off in learning-based approaches as the action space expands. Despite this trade-off, the proposed scheme provides a notable computational advantage under the considered operating regimes, achieving several-fold speedup over exhaustive grid search. This study is conducted based on a simplified LEO satellite–UAV cooperative network environment. Future work will extend the proposed framework to more practical scenarios by considering multiple wardens and multiple UAVs, the energy consumption of UAVs, the effects of channel estimation errors and delays, and learning frameworks that explicitly exploit temporal correlation in time-varying LEO channels with Doppler effects, as well as scalable learning architectures to address the scalability and accuracy challenges arising from large action spaces.
Acknowledgement: This manuscript is a supplementary and extended version of the paper presented at the 9th International Symposium on Mobile Internet Security (MobiSec’25) Conference. Building upon the conference version, it adopts a more realistic channel model, improves the resolution of the power allocation search, and further extends the analysis and numerical evaluation of the detection performance and covert communication constraints, thereby significantly enhancing the analytical and experimental completeness of the study.
Funding Statement: This work was supported by the MSIT under the ICAN (ICT Challenge and Advanced Network of HRD) Program (No. IITP-2022-RS-2022-00156310) supervised by the Institute of Information & Communication Technology Planning & Evaluation (IITP). The work of Jung Hoon Lee was supported in part by Hankuk University of Foreign Studies Research Fund.
Author Contributions: The authors confirm contribution to the paper as follows: Conceptualization, Minjeong Kang and Jung Hoon Lee; methodology, Minjeong Kang; software, Minjeong Kang; validation, Minjeong Kang, Jung Hoon Lee and Il-Gu Lee; formal analysis, Minjeong Kang; investigation, Minjeong Kang; resources, Il-Gu Lee; data curation, Minjeong Kang; writing—original draft preparation, Minjeong Kang; writing—review and editing, Jung Hoon Lee and Il-Gu Lee; visualization, Minjeong Kang; supervision, Jung Hoon Lee and Il-Gu Lee; project administration, Il-Gu Lee; funding acquisition, Il-Gu Lee. All authors reviewed and approved the final version of the manuscript.
Availability of Data and Materials: The data that support the findings of this study are available from the corresponding author upon reasonable request.
Ethics Approval: Not applicable.
Conflicts of Interest: The authors declare no conflicts of interest.
Abbreviations
| LEO | Low Earth Orbit |
| UAV | Unmanned Aerial Vehicle |
| UPA | Uniform Planar Array |
| ULA | Uniform Linear Array |
| LoS | Line-of-Sight |
| NLoS | Non-Line-of-Sight |
| AN | Artificial Noise |
| MRT | Maximum Ratio Transmission |
| ZF | Zero-Forcing |
| SNR | Signal-to-Noise Ratio |
| SINR | Signal-to-Interference-Plus-Noise Ratio |
| ML | Machine Learning |
| DNN | Deep Neural Network |
| PLS | Physical-Layer Security |
| IRS | Intelligent Reflecting Surface |
| RIS | Reconfigurable Intelligent Surface |
| CSI | Channel State Information |
| MIMO | Multiple-Input Multiple-Output |
| MISO | Multiple-Input Single-Output |
| SD | Standard Deviation |
References
1. Chen X, An J, Xiong Z, Xing C, Zhao N, Yu FR, et al. Covert communications: a comprehensive survey. IEEE Commun Surveys Tuts. 2023;25(2):1173–98. [Google Scholar]
2. Shahzad K, Zhou X. Covert wireless communications under quasi-static fading with channel uncertainty. IEEE Trans Inf Forensics Secur. 2021;16:1104–16. doi:10.1109/TIFS.2020.3029902. [Google Scholar] [CrossRef]
3. Ryu JY, Lee JH. Covert communications via full-duplex user relaying. Sensors. 2025;25(12):3614. doi:10.3390/s25123614. [Google Scholar] [PubMed] [CrossRef]
4. Gao C, Yang B, Zheng D, Jiang X, Taleb T. Cooperative jamming and relay selection for covert communications in wireless relay systems. IEEE Trans Commun. 2024;72(2):1020–32. doi:10.1109/twc.2009.090323. [Google Scholar] [CrossRef]
5. Forouzesh M, Azmi P, Kuhestani A, Yeoh PL. Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens. IEEE Trans Commun. 2020;68(6):3737–49. doi:10.1109/TCOMM.2020.2978206. [Google Scholar] [CrossRef]
6. Jin Q, Fan L, Lei X, Zhao J, Nallanathan A. Covert communication of multi-antenna AF relaying networks. IEEE Trans Commun. 2025;73(8):5699–714. doi:10.1109/TCOMM.2025.3534475. [Google Scholar] [CrossRef]
7. Wang C, Chen X, An J, Xiong Z, Xing C, Zhao N, et al. Covert communication assisted by UAV-IRS. IEEE Trans Commun. 2023;71(1):357–69. doi:10.1109/tcomm.2022.3220903. [Google Scholar] [CrossRef]
8. Li X, Liu M, Dang S, Luong NC, Yuen C, Nallanathan A, et al. Covert communications with enhanced physical layer security in RIS-assisted cooperative networks. IEEE Trans Wirel Commun. 2025;24(7):5605–19. doi:10.1109/TWC.2025.3548024. [Google Scholar] [CrossRef]
9. Jiang X, Chen X, Tang J, Zhao N, Zhang XY, Niyato D, et al. Covert communication in UAV-assisted air-ground networks. IEEE Wirel Commun. 2021;28(4):190–7. doi:10.1109/mwc.001.2000454. [Google Scholar] [CrossRef]
10. Wang Y, Guo K, Wu Z, Wu M, Nauman A, Cheng J, et al. Covert communication for satellite aerial-ground integrated networks under imperfect limitations. IEEE Internet Things J. 2026;13(1):296–307. doi:10.1109/JIOT.2025.3601506. [Google Scholar] [CrossRef]
11. Mu S, Lei H, Park KH, Pan G. Finite block-length covert communication in space-air–ground integrated networks. IEEE Internet Things J. 2026;13(1):1–12. doi:10.1109/JIOT.2025.3531881. [Google Scholar] [CrossRef]
12. Feng S, Lu X, Sun S, Hossain E, Wei G, Ni Z. Covert communication in large-scale multi-tier LEO satellite networks. IEEE Trans Mob Comput. 2024;23(12):11576–87. doi:10.1109/tmc.2024.3396793. [Google Scholar] [CrossRef]
13. Zhang R, Chen X, Liu M, Zhao N, Wang X, Nallanathan A. UAV relay assisted cooperative jamming for covert communications over Rician fading. IEEE Trans Veh Technol. 2022;71(7):7936–41. doi:10.1109/tvt.2022.3164051. [Google Scholar] [CrossRef]
14. He Y, Huang F, Wang D, Zhou X, Zhang R. Uplink outage probability analysis of AAV and intelligent connected vehicle cooperative communication using full-duplex MIMO. IEEE Commun Lett. 2025;29(9):2068–72. doi:10.1109/LCOMM.2025.3585337. [Google Scholar] [CrossRef]
15. Wang J, Gong S, Xiao J, Guo P, Wang J, Xie W, et al. A lightweight channel prediction network for UAV-LEO satellite communications. IEEE Wirel Commun Lett. 2025;14(1):113–7. doi:10.1109/lwc.2024.3489677. [Google Scholar] [CrossRef]
16. Kang MJ, Lee JH, Ryu JY. Machine learning-based NOMA for multiuser MISO broadcast channels. IEEE Commun Lett. 2024;28(1):93–7. doi:10.1109/lcomm.2023.3338475. [Google Scholar] [CrossRef]
17. Zhou D, Sheng M, Wang Y, Li J, Han Z. Machine learning-based resource allocation in satellite networks supporting Internet of Remote Things. IEEE Trans Wirel Commun. 2021;20(10):6606–21. doi:10.1109/twc.2021.3075289. [Google Scholar] [CrossRef]
18. Minani F, Kobayashi M, Fujihashi T, Alim MA, Saruwatari S, Nishi M, et al. Channel prediction and fair resource allocation for NTN uplinks by LSTM and deep reinforcement learning. IEEE Trans Wirel Commun. 2025;24(10):8311–30. doi:10.1109/TWC.2025.3565774. [Google Scholar] [CrossRef]
19. Kim D, Jung H, Lee IH. DQN-based scheduling algorithm for beam-hopping LEO satellite communication systems. IEEE Wirel Commun Lett. 2025;14(8):2401–5. doi:10.1109/LWC.2025.3570783. [Google Scholar] [CrossRef]
20. Lee C, Bang I, Kim T, Lee H, Jung BC, Chae SH. Multi-agent deep reinforcement learning based handover strategy for LEO satellite networks. IEEE Commun Lett. 2025;29(5):1117–21. doi:10.1109/LCOMM.2025.3554818. [Google Scholar] [CrossRef]
21. Sui X, Jiang Z, Lyu Y, Fan R, Hu H, Liu Z. Integrating convex optimization and deep learning for downlink resource allocation in LEO satellite networks. IEEE Trans Cogn Commun Netw. 2024;10(3):1104–18. doi:10.1109/tccn.2024.3361071. [Google Scholar] [CrossRef]
22. Sun M, Zhang Q, Yao H, Gao R, Zhao Y, Guizani M. Resource allocation and deep learning-based joint detection scheme in satellite NOMA systems. IEEE Trans Wirel Commun. 2025;24(1):526–39. doi:10.1109/twc.2024.3496089. [Google Scholar] [CrossRef]
23. Li J, Wang D, Zhao H, Jin Y, He Y, Zhou F, et al. Enhancing secrecy energy efficiency in UAV-RIS assisted mobile IoV networks through DRL. IEEE Trans Wirel Commun. 2026;25:2092–108. doi:10.1109/TWC.2025.3594691. [Google Scholar] [CrossRef]
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools