Non-orthogonal unmanned aerial vehicle (UAV)-aided secure downlink transmissions are investigated. A singleantenna UAV serves multiple ground users in the face of multiple colluding eavesdroppers (EVs) and only imperfect location information of the EVs is available. Specially, a power splitting based secure non-orthogonal downlink transmission scheme is considered, where the transmit power is divided into two parts for transmitting confidential information and artificial noise. Explicitly, we maximize the minimum average secrecy rate among all the users by optimizing the UAV trajectory, the transmit power and the power splitting ratio. In order to tackle this nonconvex optimization problem, we propose an iterative algorithm based on the blo...
To balance the information security and energy harvest for massive internet-of-things (IoT) devices,...
Due to strong survivability and flexible scheduling, multi-UAV (Unmanned Aerial Vehicle)-assisted co...
In this paper, we consider a wireless network setting where a base station (BS) employs a single unm...
An unmanned aerial vehicle (UAV)-aided secure communication system is conceived and investigated, wh...
Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search ...
Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information secu...
International audienceThis paper investigates a novel unmanned aerial vehicles (UAVs) secure communi...
Unmanned aerial vehicles (UAVs) are widely considered as key enablers for future wireless networks d...
Unmanned aerial vehicles (UAVs) are foreseen to constitute promising airborne communication devices ...
peer reviewedThis paper considers secure communications for an underlay cognitive radio network (CRN...
Unmanned aerial vehicles (UAVs) have attracted considerable attention, thanks to their high flexibil...
Low-altitude cellular-enabled Unmanned Aerial Vehicles (UAVs) provide potential supplementary platfo...
Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consi...
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated mul...
Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized...
To balance the information security and energy harvest for massive internet-of-things (IoT) devices,...
Due to strong survivability and flexible scheduling, multi-UAV (Unmanned Aerial Vehicle)-assisted co...
In this paper, we consider a wireless network setting where a base station (BS) employs a single unm...
An unmanned aerial vehicle (UAV)-aided secure communication system is conceived and investigated, wh...
Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search ...
Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information secu...
International audienceThis paper investigates a novel unmanned aerial vehicles (UAVs) secure communi...
Unmanned aerial vehicles (UAVs) are widely considered as key enablers for future wireless networks d...
Unmanned aerial vehicles (UAVs) are foreseen to constitute promising airborne communication devices ...
peer reviewedThis paper considers secure communications for an underlay cognitive radio network (CRN...
Unmanned aerial vehicles (UAVs) have attracted considerable attention, thanks to their high flexibil...
Low-altitude cellular-enabled Unmanned Aerial Vehicles (UAVs) provide potential supplementary platfo...
Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consi...
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated mul...
Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized...
To balance the information security and energy harvest for massive internet-of-things (IoT) devices,...
Due to strong survivability and flexible scheduling, multi-UAV (Unmanned Aerial Vehicle)-assisted co...
In this paper, we consider a wireless network setting where a base station (BS) employs a single unm...