UAV-Relaying-Assisted Secure Transmission With Caching
暂无分享,去创建一个
Yunfei Chen | Guan Gui | Nan Zhao | Hikmet Sari | Jie Tang | Fen Cheng | Guan Gui | Nan Zhao | Yunfei Chen | Jie Tang | H. Sari | Fen Cheng
[1] Victor C. M. Leung,et al. Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.
[2] Rui Zhang,et al. UAV-Aided Offloading for Cellular Hotspot , 2017, IEEE Transactions on Wireless Communications.
[3] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[4] Walid Saad,et al. Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience , 2016, IEEE Journal on Selected Areas in Communications.
[5] Victor C. M. Leung,et al. Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks , 2018, IEEE Journal on Selected Areas in Communications.
[6] Rui Zhang,et al. Placement Optimization of UAV-Mounted Mobile Base Stations , 2016, IEEE Communications Letters.
[7] Feng Shu,et al. Artificial-Noise-Aided Secure Multicast Precoding for Directional Modulation Systems , 2017, IEEE Transactions on Vehicular Technology.
[8] Arnulf Leuther,et al. mm-Wave SAR demonstrator as a test bed for advanced solutions in microwave imaging , 2014, IEEE Aerospace and Electronic Systems Magazine.
[9] Youngnam Han,et al. Optimal Resource Allocation for Packet Delay Minimization in Multi-Layer UAV Networks , 2017, IEEE Communications Letters.
[10] Xiaoli Xu,et al. Overcoming Endurance Issue: UAV-Enabled Communications With Proactive Caching , 2017, IEEE Journal on Selected Areas in Communications.
[11] Xiaoli Xu,et al. Trajectory Design for Completion Time Minimization in UAV-Enabled Multicasting , 2018, IEEE Transactions on Wireless Communications.
[12] Tharmalingam Ratnarajah,et al. A Minorization-Maximization Method for Optimizing Sum Rate in the Downlink of Non-Orthogonal Multiple Access Systems , 2015, IEEE Transactions on Signal Processing.
[13] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying Over Correlated Fading Channels , 2017, IEEE Transactions on Communications.
[14] Walid Saad,et al. Machine Learning for Wireless Connectivity and Security of Cellular-Connected UAVs , 2018, IEEE Wireless Communications.
[15] Lingyang Song,et al. Joint Trajectory and Power Optimization for UAV Relay Networks , 2018, IEEE Communications Letters.
[16] George K. Karagiannidis,et al. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.
[17] Zhi Chen,et al. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.
[18] Bin Xia,et al. Artificial Interference Aided Physical Layer Security in Cache-Enabled Heterogeneous Networks , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[19] Fumiyuki Adachi,et al. Transceiver Design and Multihop D2D for UAV IoT Coverage in Disasters , 2019, IEEE Internet of Things Journal.
[20] Mohamed-Slim Alouini,et al. A Survey of Channel Modeling for UAV Communications , 2018, IEEE Communications Surveys & Tutorials.
[21] Lajos Hanzo,et al. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.
[22] F. Richard Yu,et al. Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.
[23] Kaigui Bian,et al. UAV Relaying: Power Allocation and Trajectory Optimization Using Decode-and-Forward Protocol , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[24] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[25] Qingqing Wu,et al. Energy Tradeoff in Ground-to-UAV Communication via Trajectory Design , 2017, IEEE Transactions on Vehicular Technology.
[26] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[27] Victor C. M. Leung,et al. UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells , 2018, IEEE Transactions on Vehicular Technology.
[28] Rui Zhang,et al. Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.
[29] Qingqing Wu,et al. Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[30] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[31] Geoffrey Ye Li,et al. Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.
[32] Walid Saad,et al. Liquid State Machine Learning for Resource and Cache Management in LTE-U Unmanned Aerial Vehicle (UAV) Networks , 2018, IEEE Transactions on Wireless Communications.
[33] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[34] Qingqing Wu,et al. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[35] Rui Zhang,et al. Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.