Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance …
Unmanned aerial vehicles (UAVs) have attracted a lot of research attention because of their high mobility and low cost in serving as temporary aerial base stations (BSs) and providing …
X Chen, M Sheng, N Zhao, W Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Owing to the ever increasing of information privacy requirement, covert communication has gained more and more attention, whose effective range is limited by the trade-off between …
X Lu, W Yang, S Yan, Z Li… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this work, we aim to maximize the timeliness of data collection subject to a covertness constraint in unmanned aerial vehicle (UAV)-aided Internet of Things (IoT) networks, where …
H Mao, Y Liu, Z Xiao, Z Han… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs)-assisted wireless communication will play an important role in the next-generation mobile communication network. However, the inherent open …
X Zhou, S Yan, DWK Ng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work tackles the joint optimization of a unmanned aerial vehicle's (UAV's) three- dimensional (3D) placement and transmit power for covert communications with the …
S Feng, X Lu, S Sun, D Niyato - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
In this paper, we study a covert Internet of Things (IoT) system. Compared with conventional IoT systems that apply cryptography and information-theoretic secrecy approaches to secure …
D Deng, S Dang, X Li, DWK Ng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, we investigate the design of the trajectory of an unmanned aerial vehicle (UAV) and the transmit power of ground users to improve covert communications against a …
J Bai, J He, Y Chen, Y Shen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Communication performance relies largely on the availability of channel state information (CSI). This paper investigates the impact of outdated CSI on the achievable covert …