[16] |
YAO Y J , ZHOU W Y , HUANG L . Joint antenna selection and cooperative communication design with physical layer security[C]// 2016 16th International Symposium on Communications and Information Technologies. Piscataway:IEEE Press, 2016: 514-519.
|
[17] |
LI B , FEI Z S , ZHOU C Q ,et al. Physical-layer security in space information networks:a survey[J]. IEEE Internet of Things Journal, 2020,7(1): 33-52.
|
[18] |
MA J , SHRESTHA R , ADELBERG J ,et al. Security and eavesdropping in terahertz wireless links[J]. Nature, 2018,563(7729): 89-93.
|
[19] |
MIAO J S , ZHENG Z Y . Cooperative jamming for secure UAV-enabled mobile relay system[J]. IEEE Access, 2020,8: 48943-48957.
|
[20] |
BAI T , WANG J J , REN Y ,et al. Energy-efficient computation offloading for secure UAV-edge-computing systems[J]. IEEE Transactions on Vehicular Technology, 2019,68(6): 6074-6087.
|
[21] |
ZHOU Y , PAN C H , YEOH P L ,et al. Secure communications for UAV-enabled mobile edge computing systems[J]. IEEE Transactions on Communications, 2020,68(1): 376-388.
|
[22] |
刘毅, 吴炯, 杨普 ,等. 面向OFDM的同时同频全双工双向高谱效中继方案[J]. 电子与信息学报, 2019,41(2): 402-408.
|
|
LIU Y , WU J , YANG P ,et al. High spectrum efficiency full-duplex two-way relay scheme for OFDM[J]. Journal of Electronics and Information Technology, 2019,41(2): 402-408.
|
[23] |
XU D , ZHU H B . Secure transmission for SWIPT IoT systems with full-duplex IoT devices[J]. IEEE Internet of Things Journal, 2019,6(6): 10915-10933.
|
[24] |
BECK A , TETRUASHVILI L . On the convergence of block coordinate descent type methods[J]. SIAM Journal on Optimization, 2013,23(4): 2037-2060.
|
[1] |
WU Q Q , MEI W D , ZHANG R . Safeguarding wireless network with UAVs:a physical layer security perspective[J]. IEEE Wireless Communications, 2019,26(5): 12-18.
|
[2] |
ALZENAD M , EL-KEYI A , LAGUM F ,et al. 3-D placement of an unmanned aerial vehicle base station (UAV-BS) for energy-efficient maximal coverage[J]. IEEE Wireless Communications Letters, 2017,6(4): 434-437.
|
[25] |
RAZAVIYAYN M . Successive convex approximation:analysis and applications[D]. Minnesota:University of Minnesota, 2014.
|
[26] |
WU Q Q , ZENG Y , ZHANG R . Joint trajectory and communication design for multi-UAV enabled wireless networks[J]. IEEE Transactions on Wireless Communications, 2018,17(3): 2109-2121.
|
[3] |
ZHANG B , LIU C H , TANG J ,et al. Learning-based energy-efficient data collection by unmanned vehicles in smart cities[J]. IEEE Transactions on Industrial Informatics, 2018,14(4): 1666-1676.
|
[4] |
ZHAN P C , YU K , SWINDLEHURST A L . Wireless relay communications with unmanned aerial vehicles:performance and optimization[J]. IEEE Transactions on Aerospace and Electronic Systems, 2011,47(3): 2068-2085.
|
[27] |
LI Z Y , CHEN M , PAN C H ,et al. Joint trajectory and communication design for secure UAV networks[J]. IEEE Communications Letters, 2019,23(4): 636-639.
|
[28] |
PLIATSIOS D , SARIGIANNIDIS P . Resource allocation combining heuristic matching and particle swarm optimization approaches:the case of downlink non-orthogonal multiple access[J]. Information, 2019,10(11): 336.
|
[5] |
PAN C H , REN H , DENG Y S ,et al. Joint blocklength and location optimization for URLLC-enabled UAV relay systems[J]. IEEE Communications Letters, 2019,23(3): 498-501.
|
[6] |
ZHOU F H , HU R Q , LI Z ,et al. Mobile edge computing in unmanned aerial vehicle networks[J]. IEEE Wireless Communications, 2020,27(1): 140-146.
|
[7] |
FAN L Y , YAN W , CHEN X H ,et al. An energy efficient design for UAV communication with mobile edge computing[J]. China Communications, 2019,16(1): 26-36.
|
[8] |
PATEL M , NAUGHTON B , CHAN C ,et al. Mobile-edge computing introductory technical white paper[R]. Mobile-edge Computing (MEC) Industry Initiative,(2014-09-18)[2020-08-28].
|
[29] |
EDELKAMP S , SCHRDL S . Heuristic search:theory and applications[M]. California: Morgan Kaufmann, 2011.
|
[30] |
BODINE-BARON E , LEE C , CHONG A ,et al. Peer effects and stability in matching markets[J]. Lecture Notes in Computer Science, 2011,6982: 117-129.
|
[9] |
ZENG Y , ZHANG R . Energy-efficient UAV communication with trajectory optimization[J]. IEEE Transactions on Wireless Communications, 2017,16(6): 3747-3760.
|
[10] |
ZENG F Z , HU Z Z , XIAO Z ,et al. Resource allocation and trajectory optimization for QoE provisioning in energy-efficient UAV-enabled wireless networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(7): 7634-7647.
|
[11] |
YANG Z H , PAN C H , WANG K Z ,et al. Energy efficient resource allocation in UAV-enabled mobile edge computing networks[J]. IEEE Transactions on Wireless Communications, 2019,18(9): 4576-4589.
|
[12] |
HU Q Y , CAI Y L , YU G D ,et al. Joint offloading and trajectory design for UAV-enabled mobile edge computing systems[J]. IEEE Internet of Things Journal, 2019,6(2): 1879-1892.
|
[13] |
YU Z , GONG Y M , GONG S M ,et al. Joint task offloading and resource allocation in UAV-enabled mobile edge computing[J]. IEEE Internet of Things Journal, 2020,7(4): 3147-3159.
|
[14] |
CENTONZE P . Security and privacy frameworks for access control big data systems[J]. Computers,Materials and Continua, 2019,59(2): 361-374.
|
[15] |
RAYAN R , RAMALAVANYA R . A survey on secure data offloading using auction based mechanism[C]// 2017 International Conference on Computation of Power,Energy Information and Communication. Piscataway:IEEE Press, 2017: 335-341.
|
[31] |
MOZAFFARI M , SAAD W , BENNIS M ,et al. Drone small cells in the clouds:design,deployment and performance analysis[C]// 2015 IEEE Global Communications Conference. Piscataway:IEEE Press, 2015: 1-6.
|