Energy-Constrained UAV-Assisted Secure Communications With Position Optimization and Cooperative Jamming
暂无分享,去创建一个
Octavia A. Dobre | Jie Tang | Wei Wang | Guoan Zhang | Kanapathippillai Cumanan | Xinrui Li | Miao Zhang | Derrick Wing Kwan Ng | Wei Wang | O. Dobre | Jie Tang | K. Cumanan | Guoan Zhang | Miao Zhang | Xinrui Li
[1] Xin Liu,et al. Resource Allocation for OFDM Relaying Wireless Power Transfer Based Energy-Constrained UAV Communication Network , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[2] Lav Gupta,et al. Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.
[3] Tony Q. S. Quek,et al. Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Transactions on Wireless Communications.
[4] Bruno Clerckx,et al. Communications and Signals Design for Wireless Power Transmission , 2016, IEEE Transactions on Communications.
[5] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[6] Fuhui Zhou,et al. Resource Allocation for Secure UAV-Assisted SWIPT Systems , 2019, IEEE Access.
[7] Wenbo Wang,et al. Relay Power Control for Two-Way Full-Duplex Amplify-and-Forward Relay Networks , 2016, IEEE Signal Processing Letters.
[8] Gregory D. Durgin,et al. Harvesting Wireless Power: Survey of Energy-Harvester Conversion Efficiency in Far-Field, Wireless Power Transfer Systems , 2014, IEEE Microwave Magazine.
[9] George K. Karagiannidis,et al. Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks , 2017, IEEE Access.
[10] F. Richard Yu,et al. Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.
[11] J. Bibby. Axiomatisations of the average and a further generalisation of monotonic sequences , 1974, Glasgow Mathematical Journal.
[12] Chunhua Liu,et al. Design of an effective wireless air charging system for electric unmanned aerial vehicles , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.
[13] Zheng Ma,et al. Design of wireless power transfer device for UAV , 2016, 2016 IEEE International Conference on Mechatronics and Automation.
[14] Qingqing Wu,et al. Energy Tradeoff in Ground-to-UAV Communication via Trajectory Design , 2017, IEEE Transactions on Vehicular Technology.
[15] George K. Karagiannidis,et al. Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.
[16] Hsiao-Hwa Chen,et al. Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.
[17] Quanzhong Li,et al. Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks , 2020, IEEE Transactions on Information Forensics and Security.
[18] Qi Zhang,et al. Joint Position and Time Allocation Optimization of UAV Enabled Time Allocation Optimization Networks , 2019, IEEE Transactions on Communications.
[19] Dong Han,et al. Sum Secrecy Rate Maximization for Full-Duplex Two-Way Relay Networks Using Alamouti-Based Rank-Two Beamforming , 2016, IEEE Journal of Selected Topics in Signal Processing.
[20] Derrick Wing Kwan Ng,et al. Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.
[21] Guoan Zhang,et al. Optimal Transceiver Designs for Wireless-Powered Full-Duplex Two-Way Relay Networks With SWIPT , 2017, IEEE Access.
[22] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[23] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[24] Shuowen Zhang,et al. Cellular-Enabled UAV Communication: A Connectivity-Constrained Trajectory Optimization Perspective , 2018, IEEE Transactions on Communications.
[25] Yongming Huang,et al. Throughput maximization for UAV-enabled wireless power transfer in relaying system , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).
[26] Yueming Cai,et al. Physical Layer Security in Millimeter Wave SWIPT UAV-Based Relay Networks , 2019, IEEE Access.
[27] Qingqing Wu,et al. Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.
[28] Fuhui Zhou,et al. Robust Secure Beamforming for SWIPT-Aided Relay Systems With Full-Duplex Receiver and Imperfect CSI , 2020, IEEE Transactions on Vehicular Technology.
[29] Mohsen Guizani,et al. Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges , 2018, IEEE Access.
[30] Dinh Chi-Nguyen,et al. Secrecy Performance of the UAV Enabled Cognitive Relay Network , 2018, 2018 IEEE 3rd International Conference on Communication and Information Systems (ICCIS).
[31] Derrick Wing Kwan Ng,et al. Optimal 3D-Trajectory Design and Resource Allocation for Solar-Powered UAV Communication Systems , 2018, IEEE Transactions on Communications.
[32] H. Vincent Poor,et al. Secrecy Rate Optimization for Secure Multicast Communications , 2016, IEEE Journal of Selected Topics in Signal Processing.
[33] Zhi Chen,et al. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.
[34] Rui Zhang,et al. Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.
[35] Qingqing Wu,et al. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.
[36] Derrick Wing Kwan Ng,et al. Physical Layer Security in UAV Systems: Challenges and Opportunities , 2019, IEEE Wireless Communications.
[37] Lihua Li,et al. UAV-Assisted Cooperative Communications with Time-Sharing SWIPT , 2018, 2018 IEEE International Conference on Communications (ICC).
[38] Caijun Zhong,et al. Wireless Information and Power Transfer With Full Duplex Relaying , 2014, IEEE Transactions on Communications.
[39] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[40] Meng Zhang,et al. Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.
[41] Hani Mehrpouyan,et al. Beamforming for Simultaneous Wireless Information and Power Transfer in Two-Way Relay Channels , 2016, IEEE Access.
[42] Walid Saad,et al. Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs , 2015, IEEE Transactions on Wireless Communications.
[43] Alister G. Burr,et al. Energy Efficiency Optimization for Secure Transmission in MISO Cognitive Radio Network With Energy Harvesting , 2019, IEEE Access.
[44] Qingqing Wu,et al. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[45] Rui Zhang,et al. Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.
[46] Qingqing Wu,et al. Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[47] Rui Zhang,et al. Energy-Efficient Data Collection in UAV Enabled Wireless Sensor Network , 2017, IEEE Wireless Communications Letters.
[48] Derrick Wing Kwan Ng,et al. Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems , 2015, IEEE Communications Letters.