A survey of UAV-based data collection: Challenges, solutions and future perspectives

K Messaoudi, OS Oubbati, A Rachedi, A Lakas… - Journal of network and …, 2023 - Elsevier
Abstract Internet of Things (IoT) generates unlimited data, which should be collected and
forwarded towards a central controller (CC) for further processing and decision-making …

A V2I and V2V collaboration framework to support emergency communications in ABS-aided Internet of Vehicles

Y He, D Wang, F Huang, R Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Providing reliable and flexible emergency communications for the Internet of Vehicles (IoV)
is challenging in post-disaster scenarios, especially when communications infrastructures …

Vehicle to everything (V2X) and edge computing: A secure lifecycle for UAV-assisted vehicle network and offloading with blockchain

AA Khan, AA Laghari, M Shafiq, SA Awan, Z Gu - Drones, 2022 - mdpi.com
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with
edge computing has gained increasingly more attention over the last few years. The …

Privacy‐preserving remote sensing images recognition based on limited visual cryptography

D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023 - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT),
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …

Multi-UAV trajectory planning during cooperative tracking based on a Fusion Algorithm integrating MPC and standoff

B Li, C Song, S Bai, J Huang, R Ma, K Wan, E Neretin - Drones, 2023 - mdpi.com
In this paper, an intelligent algorithm integrating model predictive control and Standoff
algorithm is proposed to solve trajectory planning that UAVs may face while tracking a …

Metaheuristic algorithms for 6G wireless communications: Recent advances and applications

AK Abasi, M Aloqaily, M Guizani, B Ouni - Ad Hoc Networks, 2024 - Elsevier
The widespread distribution of applications and devices, coupled with the vast array of
mobile data, technologies, and architectures within Sixth Generation (6G) networks …

Covert communication in uplink NOMA systems under channel distribution information uncertainty

Z Duan, X Yang, Y Gong, D Wang… - IEEE Communications …, 2023 - ieeexplore.ieee.org
It is challenging to covert communication under channel distribution information (CDI)
uncertainty caused by limited feedback and rapid-changing channels. This letter …

A lightweight privacy-preserving system for the security of remote sensing images on iot

D Zhang, L Ren, M Shafiq, Z Gu - Remote Sensing, 2022 - mdpi.com
The acquisition of massive remote sensing data makes it possible to deeply fuse remote
sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing …

Intelligent reflecting surface assisted untrusted NOMA transmissions: a secrecy perspective

D Wang, X Li, Y He, F Zhou, Q Wu - Science China Information Sciences, 2023 - Springer
In this paper, we investigate the intelligent reflecting surface (IRS) assisted secure
transmissions for the untrusted non-orthogonal multiple access (NOMA) network threatened …

Investigation of a HAP-UAV collaboration scheme for throughput maximization via joint user association and 3D UAV placement

H Goehar, AS Khwaja, AA Alnoman, A Anpalagan… - Sensors, 2023 - mdpi.com
In this paper, a collaboration scheme between a high-altitude platform (HAP) and several
unmanned aerial vehicles (UAVs) for wireless communication networks is investigated. The …