UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location
暂无分享,去创建一个
[1] Li Sun,et al. Physical layer security with its applications in 5G networks: A review , 2017, China Communications.
[2] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[3] An Li,et al. Mobile jammer-aided secure UAV communications via trajectory design and power control , 2018, China Communications.
[4] Qihui Wu,et al. Network-connected UAV communications , 2018 .
[5] Jin Chen,et al. Network-connected UAV communications: Potentials and challenges , 2018, China Communications.
[6] Meisam Razaviyayn,et al. Successive Convex Approximation: Analysis and Applications , 2014 .
[7] Symeon Chatzinotas,et al. Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations , 2018, 2018 IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM).
[8] Zhiyang Li,et al. Joint Trajectory and Communication Design for Secure UAV Networks , 2019, IEEE Communications Letters.
[9] Yunfei Chen,et al. Physical-Layer Security Over Non-Small-Scale Fading Channels , 2016, IEEE Transactions on Vehicular Technology.
[10] Irene A. Stegun,et al. Handbook of Mathematical Functions. , 1966 .
[11] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[12] Lingfeng Shen,et al. Iterative UAV Trajectory Optimization for Physical Layer Secure Mobile Relaying , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[13] Derrick Wing Kwan Ng,et al. Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.
[14] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[15] Shuowen Zhang,et al. Cellular-Enabled UAV Communication: A Connectivity-Constrained Trajectory Optimization Perspective , 2018, IEEE Transactions on Communications.
[16] Victor C. M. Leung,et al. UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells , 2018, IEEE Transactions on Vehicular Technology.
[17] Stephen P. Boyd,et al. Recent Advances in Learning and Control , 2008, Lecture Notes in Control and Information Sciences.
[18] Muhammad R. A. Khandaker,et al. Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers , 2015, IEEE Wireless Communications Letters.
[19] Yangyang Zhang,et al. Secure Full-Duplex Two-Way Relaying for SWIPT , 2018, IEEE Wireless Communications Letters.
[20] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[21] Qingqing Wu,et al. Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.
[22] Wei Yu,et al. Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.
[23] Qingqing Wu,et al. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.
[24] Baoqing Li,et al. Joint Trajectory and Power Design for UAV-Enabled Secure Communications With No-Fly Zone Constraints , 2019, IEEE Access.
[25] Jun Li,et al. UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.
[26] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[27] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[28] Mehdi Bennis,et al. A Speculative Study on 6G , 2019, IEEE Wireless Communications.
[29] Qingqing Wu,et al. Common Throughput Maximization in UAV-Enabled OFDMA Systems With Delay Consideration , 2018, IEEE Transactions on Communications.
[30] Rui Zhang,et al. Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.
[31] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[32] Yimin D. Zhang,et al. Multi-target Motion Parameter Estimation Exploiting Collaborative UAV Network , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[33] Rui Zhang,et al. Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.
[34] Zhiguo Ding,et al. Secure UAV-to-UAV Systems With Spatially Random UAVs , 2019, IEEE Wireless Communications Letters.