Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems
暂无分享,去创建一个
Yong Ren | Lajos Hanzo | Tong Bai | Jingjing Wang | L. Hanzo | Yong Ren | Jingjing Wang | Tong Bai
[1] Chong-Yung Chi,et al. Joint transmit beamforming and artificial noise design for QoS discrimination inwireless downlink , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Risto Wichman,et al. In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.
[3] Harald Haas,et al. Analysis of TDD Cellular Interference Mitigation Using Busy-Bursts , 2007, IEEE Transactions on Wireless Communications.
[4] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[5] Elisa Bertino,et al. Robust Multi-Factor Authentication for Fragile Communications , 2014, IEEE Transactions on Dependable and Secure Computing.
[6] Sergio Barbarossa,et al. Communicating While Computing: Distributed mobile cloud computing over 5G heterogeneous networks , 2014, IEEE Signal Processing Magazine.
[7] Pingyi Fan,et al. To Smart City: Public Safety Network Design for Emergency , 2018, IEEE Access.
[8] Sergio Barbarossa,et al. Joint Optimization of Radio and Computational Resources for Multicell Mobile-Edge Computing , 2014, IEEE Transactions on Signal and Information Processing over Networks.
[9] Jerome Spanier,et al. The Incomplete Gamma Functions , 2008 .
[10] Zhi Chen,et al. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.
[11] Khaled Ben Letaief,et al. Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.
[12] Inkyu Lee,et al. UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.
[13] Arumugam Nallanathan,et al. Joint Blocklength and Location Optimization for URLLC-Enabled UAV Relay Systems , 2019, IEEE Communications Letters.
[14] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[15] Mehdi Bennis,et al. UAV-Assisted Heterogeneous Networks for Capacity Enhancement , 2016, IEEE Communications Letters.
[16] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[17] Rui Zhang,et al. Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.
[18] F. Richard Yu,et al. Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.
[19] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.
[20] Wenzhong Li,et al. Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.
[21] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[22] Evsen Yanmaz,et al. Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint , 2016, IEEE Communications Surveys & Tutorials.
[23] Kaibin Huang,et al. Energy-Efficient Resource Allocation for Mobile-Edge Computation Offloading , 2016, IEEE Transactions on Wireless Communications.
[24] Derrick Wing Kwan Ng,et al. Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.
[25] Huiming Wang,et al. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.
[26] Mohsen Guizani,et al. Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.
[27] Laurence T. Yang,et al. UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles , 2018, IEEE Network.
[28] Zhu Han,et al. Taking Drones to the Next Level: Cooperative Distributed Unmanned-Aerial-Vehicular Networks for Small and Mini Drones , 2017, IEEE Vehicular Technology Magazine.
[29] Xuemin Shen,et al. Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums , 2016, IEEE Journal on Selected Areas in Communications.
[30] Tony Q. S. Quek,et al. Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.
[31] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[32] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[33] Seung-Woo Seo,et al. Cooperative Unmanned Autonomous Vehicle Control for Spatially Secure Group Communications , 2012, IEEE Journal on Selected Areas in Communications.
[34] Shuowen Zhang,et al. Joint Altitude and Beamwidth Optimization for UAV-Enabled Multiuser Communications , 2017, IEEE Communications Letters.
[35] Tarik Taleb,et al. Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.
[36] Antonio Pascual-Iserte,et al. Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading , 2014, IEEE Transactions on Vehicular Technology.
[37] Yong Xiang,et al. Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System , 2017, IEEE Transactions on Emerging Topics in Computing.
[38] Lajos Hanzo,et al. Charging Unplugged: Will Distributed Laser Charging for Mobile Wireless Power Transfer Work? , 2016, IEEE Vehicular Technology Magazine.
[39] Tao Li,et al. A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[40] Gan Zheng,et al. Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.
[41] Min Sheng,et al. Mobile-Edge Computing: Partial Computation Offloading Using Dynamic Voltage Scaling , 2016, IEEE Transactions on Communications.
[42] Eugenio Cusumano,et al. Emptying the sea with a spoon? Non-governmental providers of migrants search and rescue in the Mediterranean , 2017 .
[43] James Nightingale,et al. A UAV-Cloud System for Disaster Sensing Applications , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[44] Rui Zhang,et al. Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.
[45] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[46] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[47] Tarik Taleb,et al. UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.
[48] Lajos Hanzo,et al. Beamforming-Aided NOMA Expedites Collaborative Multiuser Computational Offloading , 2018, IEEE Transactions on Vehicular Technology.