[HTML][HTML] Beyond encryption: Exploring the potential of physical layer security in UAV networks

F Xu, S Ahmad, M Ahmed, S Raza, F Khan, Y Ma… - Journal of King Saud …, 2023 - Elsevier
Unmanned aerial vehicles (UAVs) have attracted much attention for civil and military uses
because of their high mobility and adaptable deployment capabilities in open spaces. They …

Secure UAV (Drone) and the Great Promise of AI

B Zolfaghari, M Abbasmollaei, F Hajizadeh… - ACM Computing …, 2024 - dl.acm.org
UAVs have found their applications in numerous applications from recreational activities to
business in addition to military and strategic fields. However, research on UAVs is not going …

Cache-assisted mobile edge computing over space-air-ground integrated networks for extended reality applications

S Yoo, S Jeong, J Kim, J Kang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Extended reality-enabled Internet of Things (XRI) provides new user experiences and a
sense of immersion by adding virtual elements to the real world through Internet of Things …

ESCM: An efficient and secure communication mechanism for UAV networks

H Luo, Y Wu, G Sun, H Yu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
UAV (unmanned aerial vehicle) is rapidly gaining traction in various human activities and
has become an integral component of the satellite-air-ground-sea (SAGS) integrated …

[HTML][HTML] Energy minimization in reconfigurable intelligent surface-assisted unmanned aerial vehicle-enabled wireless powered mobile edge computing systems with …

J Kim, E Hong, J Jung, J Kang, S Jeong - Drones, 2023 - mdpi.com
In this study, a reconfigurable intelligent surface (RIS)-assisted wireless-powered mobile
edge computing (WP-MEC) system is proposed, where a single-antenna unmanned aerial …

A survey on computation offloading in edge systems: From the perspective of deep reinforcement learning approaches

P Peng, W Lin, W Wu, H Zhang, S Peng, Q Wu… - Computer Science …, 2024 - Elsevier
Driven by the demand of time-sensitive and data-intensive applications, edge computing
has attracted wide attention as one of the cornerstones of modern service architectures. An …

[HTML][HTML] Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers

G Su, M Dai, B Chen, X Lin - Journal of King Saud University-Computer and …, 2024 - Elsevier
Integrating unmanned aerial vehicles (UAVs) with wireless systems is widely anticipated to
bring enormous benefits to network users, and is considered as a key enabling technology …

Strategic Deployment of Swarm of UAVs for Secure IoT Networks

XAF Cabezas, DPM Osorio - IEEE Transactions on Aerospace …, 2024 - ieeexplore.ieee.org
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT)
is exacerbating the concerns for the design of future wireless networks. To unveil the full …

FIGARO: reinForcement learnInG mAnagement acRoss the computing cOntinuum

F Filippini, R Cavadini, D Ardagna… - Proceedings of the …, 2023 - dl.acm.org
The widespread adoption of Artificial Intelligence applications to analyze data generated by
Internet of Things sensors leads to the development of the edge computing paradigm …

Research on unmanned aerial vehicle-assisted communication and information security issues based on mobile edge computing

Y Tang, E Zhang, Y Cai, L Lu… - … Conference on Machine …, 2024 - spiedigitallibrary.org
Unmanned Aerial Vehicle (UAV)-assisted mobile edge computing (MEC) technology has
garnered extensive attention with the widespread adoption of 5G technology, owing to its …