Management of positioning functions in cellular networks for time-sensitive transportation applications

Q Liu, R Liu, Y Zhang, Y Yuan, Z Wang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Device positioning has generally been recognized as an enabling technology for numerous
vehicular applications in intelligent transportation systems (ITS). The downlink time …

UAV-Assisted MEC System With Mobile Ground Terminals: DRL-Based Joint Terminal Scheduling and UAV 3D Trajectory Design

Y Gao, X Yuan, D Yang, Y Hu, Y Cao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Inthis paper, we investigate an unmanned aerial vehicle (UAV)-assisted edge computing
network in a sophisticated three-dimensional (3D) scenario, eg, a post-disaster urban area …

Jamming-aware optimization for UAV trajectory design and internet of things devices clustering

A Almasoud - Complex & Intelligent Systems, 2023 - Springer
Radio jamming represents a serious threat in wireless networks that can cause denial of
service (DoS) attacks for the network users. The jammer transmits jamming signals to disrupt …

A DL-based High-Precision Positioning Method in Challenging Urban Scenarios for B5G CCUAVs

K Gao, H Wang, H Lv, P Gao - IEEE Journal on Selected Areas …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) facilitate services in civilian and industrial fields but suffer
from a limited direct link operating range and unreliable satellite positioning in urban …

A pseudorange-based GPS spoofing detection using hyperbola equations

MÖ Demir, GK Kurt, AE Pusane - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Spoofing attacks are one of the most critical threats against secure global navigation satellite
system (GNSS) positioning. Since correct positioning is a must in many vehicle-to-everything …

GNSS spoofer localization for vehicles based on doppler and clock drift double difference

Z Wang, X Zhang, Z Zhou, M Lu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of vehicle navigation, autonomous driving and unmanned aerial
vehicles (UAV), increasing spoofing attacks of global navigation satellite systems (GNSS) …

Sensing-Communication Co-Design for UAV Swarm-Assisted Vehicular Network in Perspective of Doppler

Q Zhu, R Liu, Z Wang, Q Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Utilizing the unmanned aerial vehicle (UAV) swarm to realize sensing and communication
for ground vehicles (GVs) has been envisioned as a promising technology in harsh …

Cooperative Sensing Enhanced UAV Path-Following and Obstacle Avoidance with Variable Formation

C Wang, Z Wei, W Jiang, H Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The high mobility of unmanned aerial vehicles (UAVs) enables them to be used in various
civilian fields, such as rescue and cargo transport. Path-following is a crucial way to perform …

Ranging code design for UAV swarm self-positioning in green aerial IoT

Q Zhu, R Liu, Z Wang, Q Liu… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Utilizing the unmanned aerial vehicle (UAV) swarm to realize location awareness of ground
users (GUs) is a promising technology in green aerial Internet of Things (IoT) systems …

Selection of areas for effective GNSS spoofing attacks to a vehicle-mounted MSF system based on scenario classification models

J Chang, F Huang, L Zhang, D Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The inherent vulnerability of the Global Navigation Satellite System (GNSS) leads to the
ease of implementation of spoofing attacks. The latest GNSS spoofing attack schemes still …