Mobile wireless rechargeable UAV networks: Challenges and solutions

Y Wang, Z Su, N Zhang, R Li - IEEE Communications Magazine, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) can help facilitate cost-effective and flexible service
provisioning in future smart cities. Nevertheless, UAV applications generally suffer severe …

Secure UAV (Drone) and the Great Promise of AI

B Zolfaghari, M Abbasmollaei, F Hajizadeh… - ACM Computing …, 2024 - dl.acm.org
UAVs have found their applications in numerous applications from recreational activities to
business in addition to military and strategic fields. However, research on UAVs is not going …

Incentive mechanisms for online task offloading with privacy-preserving in UAV-assisted mobile edge computing

R Zhang, R Zhou, Y Wang, H Tan… - IEEE/ACM Transactions …, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have emerged as a promising technology to provide low-
latency mobile edge computing (MEC) services. To fully utilize the potential of UAV-assisted …

Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing

R Zhou, R Zhang, Y Wang, H Tan, K He - Proceedings of the Twenty …, 2022 - dl.acm.org
Unmanned aerial vehicles (UAVs) have emerged as a promising technology to provide low-
latency mobile edge computing (MEC) services. To fully utilize the potential of UAV-assisted …

Enhancing Privacy and Security of Autonomous UAV Navigation

V Aggarwal, AR Kaushik, C Jutla, N Ratha - arXiv preprint arXiv …, 2024 - arxiv.org
Autonomous Unmanned Aerial Vehicles (UAVs) have become essential tools in defense,
law enforcement, disaster response, and product delivery. These autonomous navigation …

LSPSS: constructing lightweight and secure scheme for private data storage and sharing in aerial computing

H Wang, K Fan, C Yu, K Zhang, F Li, H Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Aerial computing is gradually playing an essential role in edge and fog computing
paradigms by virtue of mobility, availability, scalability, flexibility, and simultaneity, where the …

Towards Building Secure UAV Navigation with FHE-Aware Knowledge Distillation

AR Kaushik, C Jutla, N Ratha - International Conference on Pattern …, 2025 - Springer
In safeguarding mission-critical systems, such as Unmanned Aerial Vehicles (UAVs),
preserving the privacy of path trajectories during navigation is paramount. While the …

Security and Performance-Aware Cloud Computing with Homomorphic Encryption and Trusted Execution Environment

R Onishi, T Suzuki, S Sakai, H Yamana - Proceedings of the 12th …, 2023 - dl.acm.org
In recent years, cloud computing has been widely adopted due to its high scalability and low
development and operational costs; however, privacy and intellectual property concerns …

A Dynamic Multi-Attribute Resource Bidding Mechanism with Privacy Protection in Edge Computing

S Tian, W Ding, G Liu, Y Sun, S Long, J Zhu - Computers, Materials and …, 2023 - Elsevier
In edge computing, a reasonable edge resource bidding mechanism can enable edge
providers and users to obtain benefits in a relatively fair fashion. To maximize such benefits …

[PDF][PDF] Enhancing Privacy and Security in AI using Fully Homomorphic Encryption

AR Kaushik - 2024 - cse.buffalo.edu
Machine Learning (ML) can be broadly defined as empowering machines with large
datasets to analyze and make informed decisions. As ML is integrated into real-world …