UAV-Enabled Covert Wireless Data Collection
暂无分享,去创建一个
Feng Shu | Jun Li | Shihao Yan | Riqing Chen | Xiaobo Zhou | Jun Li | Shihao Yan | F. Shu | Xiaobo Zhou | Riqing Chen
[1] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[2] He Chen,et al. Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location , 2018, IEEE Transactions on Vehicular Technology.
[3] Jun Li,et al. UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.
[4] Geoffrey Ye Li,et al. Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.
[5] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[6] Qingqing Wu,et al. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[7] G. Laporte. The traveling salesman problem: An overview of exact and approximate algorithms , 1992 .
[8] Qian Yang,et al. Multi-Antenna Covert Communications in Random Wireless Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[9] Xiangyun Zhou,et al. Covert Communication in Backscatter Radio , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[10] Rui Zhang,et al. Energy-Efficient Data Collection in UAV Enabled Wireless Sensor Network , 2017, IEEE Wireless Communications Letters.
[11] Iain B. Collings,et al. Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[12] Jie Xu,et al. Capacity Characterization of UAV-Enabled Two-User Broadcast Channel , 2018, IEEE Journal on Selected Areas in Communications.
[13] Feng Shu,et al. Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.
[14] Qingqing Wu,et al. Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.
[15] Quang-Doanh Vu,et al. Weighted Max–Min Fairness for C-RAN Multicasting Under Limited Fronthaul Constraints , 2018, IEEE Transactions on Communications.
[16] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[17] Xiangyun Zhou,et al. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.
[18] Qingqing Wu,et al. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.
[19] Chao Shen,et al. Flight Time Minimization of UAV for Data Collection Over Wireless Sensor Networks , 2018, IEEE Journal on Selected Areas in Communications.
[20] W. Marsden. I and J , 2012 .
[21] Jun Li,et al. Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.
[22] Khurram Shahzad. Relaying via Cooperative Jamming in Covert Wireless Communications , 2018, 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS).
[23] Lingyang Song,et al. Joint Trajectory and Power Optimization for UAV Relay Networks , 2018, IEEE Communications Letters.
[24] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[25] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[26] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[27] Zhi Chen,et al. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.
[28] Stephen P. Boyd,et al. Variations and extension of the convex–concave procedure , 2016 .
[29] Xiangyun Zhou,et al. Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.
[30] Quang-Doanh Vu,et al. Max-Min Fairness for Multicast Multigroup Multicell Transmission under Backhaul Constraints , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[31] Xiangyun Zhou,et al. Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.
[32] Qingqing Wu,et al. Common Throughput Maximization in UAV-Enabled OFDMA Systems With Delay Consideration , 2018, IEEE Transactions on Communications.
[33] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[34] Mianxiong Dong,et al. UAV-assisted data gathering in wireless sensor networks , 2014, The Journal of Supercomputing.
[35] Jun Li,et al. Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.
[36] Feng Shu,et al. Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.
[37] Rui Zhang,et al. Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.