A survey of UAV-based data collection: Challenges, solutions and future perspectives
Abstract Internet of Things (IoT) generates unlimited data, which should be collected and
forwarded towards a central controller (CC) for further processing and decision-making …
forwarded towards a central controller (CC) for further processing and decision-making …
A V2I and V2V collaboration framework to support emergency communications in ABS-aided Internet of Vehicles
Providing reliable and flexible emergency communications for the Internet of Vehicles (IoV)
is challenging in post-disaster scenarios, especially when communications infrastructures …
is challenging in post-disaster scenarios, especially when communications infrastructures …
Vehicle to everything (V2X) and edge computing: A secure lifecycle for UAV-assisted vehicle network and offloading with blockchain
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with
edge computing has gained increasingly more attention over the last few years. The …
edge computing has gained increasingly more attention over the last few years. The …
Privacy‐preserving remote sensing images recognition based on limited visual cryptography
D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023 - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT),
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …
Multi-UAV trajectory planning during cooperative tracking based on a Fusion Algorithm integrating MPC and standoff
In this paper, an intelligent algorithm integrating model predictive control and Standoff
algorithm is proposed to solve trajectory planning that UAVs may face while tracking a …
algorithm is proposed to solve trajectory planning that UAVs may face while tracking a …
Covert communication in uplink NOMA systems under channel distribution information uncertainty
Z Duan, X Yang, Y Gong, D Wang… - IEEE Communications …, 2023 - ieeexplore.ieee.org
It is challenging to covert communication under channel distribution information (CDI)
uncertainty caused by limited feedback and rapid-changing channels. This letter …
uncertainty caused by limited feedback and rapid-changing channels. This letter …
Metaheuristic algorithms for 6G wireless communications: Recent advances and applications
The widespread distribution of applications and devices, coupled with the vast array of
mobile data, technologies, and architectures within Sixth Generation (6G) networks …
mobile data, technologies, and architectures within Sixth Generation (6G) networks …
A lightweight privacy-preserving system for the security of remote sensing images on iot
The acquisition of massive remote sensing data makes it possible to deeply fuse remote
sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing …
sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing …
NOMA as the next-generation multiple access in nonterrestrial networks
BEY Belmekki, MS Alouini - Proceedings of the IEEE, 2024 - ieeexplore.ieee.org
Nonterrestrial networks (NTN) are pivotal, enabling technologies for achieving global and
ubiquitous connectivity in the sixth generation (6G) of wireless systems. On the other hand …
ubiquitous connectivity in the sixth generation (6G) of wireless systems. On the other hand …
Intelligent reflecting surface assisted untrusted NOMA transmissions: a secrecy perspective
In this paper, we investigate the intelligent reflecting surface (IRS) assisted secure
transmissions for the untrusted non-orthogonal multiple access (NOMA) network threatened …
transmissions for the untrusted non-orthogonal multiple access (NOMA) network threatened …