DDQN-based trajectory and resource optimization for UAV-aided MEC secure communications

Y Ding, H Han, W Lu, Y Wang, N Zhao… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been emerged as cost-effective platforms to extend
the coverage of mobile edge computing (MEC) system. However, the broadcast and line-of …

Secure transmission for multi-UAV-assisted mobile edge computing based on reinforcement learning

W Lu, Y Mo, Y Feng, Y Gao, N Zhao… - … on Network Science …, 2022 - ieeexplore.ieee.org
UAV communication has received widespread attention in MEC systems due to its high
flexibility and line-of-sight transmission. Users can reduce their local computing pressures …

Joint resource and trajectory optimization for security in UAV-assisted MEC systems

Y Xu, T Zhang, D Yang, Y Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) has been widely applied in internet-of-things (IoT)
scenarios while the security for UAV communications remains a challenging problem due to …

Online edge learning offloading and resource management for UAV-assisted MEC secure communications

Y Ding, Y Feng, W Lu, S Zheng, N Zhao… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
The mobile and flexible unmanned aerial vehicle (UAV) with mobile edge computing (MEC)
can effectively relieve the computing pressure of the massive data traffic in 5G Internet of …

UAV-enabled secure communications: Joint trajectory and transmit power optimization

X Zhou, Q Wu, S Yan, F Shu, J Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies the physical layer security of an unmanned aerial vehicle (UAV) network,
where a UAV base station (UAV-B) transmits confidential information to multiple information …

Dinkelbach-guided deep reinforcement learning for secure communication in UAV-aided MEC networks

W Lu, Y Ding, Y Feng, G Huang, N Zhao… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicle-aided (UAV-aided) mobile edge computing (MEC) network can
greatly reduce the data growth pressure of Internet of Things (IoT) and expand the wireless …

A hybrid secure resource allocation and trajectory optimization approach for mobile edge computing using federated learning based on WEB 3.0

P Consul, I Budhiraja, D Garg - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The use of unmanned aerial vehicles (UAVs) in Internet-of-Things (IoT) has grown, but
security for UAV communications still a challenge due to the distributed nature of line-of …

Resource and trajectory optimization for UAV-relay-assisted secure maritime MEC

F Lu, G Liu, W Lu, Y Gao, J Cao, N Zhao… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the evolutional development of maritime networks, the explosive growth of maritime
data has put forward elevated demands for the computing capabilities of maritime devices …

UAV-enabled secure communications by multi-agent deep reinforcement learning

Y Zhang, Z Mou, F Gao, J Jiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) can be employed as aerial base stations to support
communication for the ground users (GUs). However, the aerial-to-ground (A2G) channel …

Offloading optimization for energy-minimization secure UAV-edge-computing systems

X Gu, G Zhang, J Gu - 2021 IEEE Wireless Communications …, 2021 - ieeexplore.ieee.org
This paper considers a mobile edge computing (MEC) system where an unmanned aerial
vehicle (UAV) offloads demanding computational tasks to the access point (AP), and AP …