Machine learning-aided operations and communications of unmanned aerial vehicles: A contemporary survey

H Kurunathan, H Huang, K Li, W Ni… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Over the past decade, Unmanned Aerial Vehicles (UAVs) have provided pervasive, efficient,
and cost-effective solutions for data collection and communications. Their excellent mobility …

Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

Trajectory planning of cellular-connected UAV for communication-assisted radar sensing

S Hu, X Yuan, W Ni, X Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Being a key technology for beyond fifth-generation wireless systems, joint communication
and radar sensing (JCAS) utilizes the reflections of communication signals to detect foreign …

Joint optimization of trajectory, propulsion, and thrust powers for covert UAV-on-UAV video tracking and surveillance

S Hu, W Ni, X Wang, A Jamalipour… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous tracking of suspicious unmanned aerial vehicles (UAVs) by legitimate
monitoring UAVs (or monitors) can be crucial to public safety and security. It is non-trivial to …

Deep reinforcement learning-driven reconfigurable intelligent surface-assisted radio surveillance with a fixed-wing UAV

X Yuan, S Hu, W Ni, X Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) play a critical role in radio surveillance to decipher
malicious messages, thanks to their flexibility, mobility, and likely line-of-sight (LoS) to …

Data and model poisoning backdoor attacks on wireless federated learning, and the defense mechanisms: A comprehensive survey

Y Wan, Y Qu, W Ni, Y Xiang, L Gao… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the greatly improved capabilities of devices, massive data, and increasing concern
about data privacy, Federated Learning (FL) has been increasingly considered for …

Physical layer security for UAV communications: A comprehensive survey

J Wang, X Wang, R Gao, C Lei, W Feng… - China …, 2022 - ieeexplore.ieee.org
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing
unprecedented interest in both military and civil applications to enable agile and ubiquitous …

Online UAV trajectory planning for covert video surveillance of mobile targets

H Huang, AV Savkin, W Ni - IEEE Transactions on Automation …, 2021 - ieeexplore.ieee.org
This article considers the use of an unmanned aerial vehicle (UAV) for covert video
surveillance of a mobile target on the ground and presents a new online UAV trajectory …

Sensing-assisted secure uplink communications with full-duplex base station

X Wang, Z Fei, JA Zhang… - IEEE communications …, 2021 - ieeexplore.ieee.org
This letter proposes a sensing-assisted uplink communications framework between a single-
antenna user and a full-duplex (FD) base station (BS) against an aerial eavesdropper (AE) …

RIS-assisted jamming rejection and path planning for UAV-borne IoT platform: A new deep reinforcement learning framework

S Hu, X Yuan, W Ni, X Wang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
This article presents a new deep reinforcement learning (DRL)-based approach to the
trajectory planning and jamming rejection of an unmanned aerial vehicle (UAV) for the …