Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges
Physical layer covert communication is a crucial secure communication technology that
enables a transmitter to convey information covertly to a recipient without being detected by …
enables a transmitter to convey information covertly to a recipient without being detected by …
Trajectory planning of cellular-connected UAV for communication-assisted radar sensing
Being a key technology for beyond fifth-generation wireless systems, joint communication
and radar sensing (JCAS) utilizes the reflections of communication signals to detect foreign …
and radar sensing (JCAS) utilizes the reflections of communication signals to detect foreign …
Joint optimization of trajectory, propulsion, and thrust powers for covert UAV-on-UAV video tracking and surveillance
Autonomous tracking of suspicious unmanned aerial vehicles (UAVs) by legitimate
monitoring UAVs (or monitors) can be crucial to public safety and security. It is non-trivial to …
monitoring UAVs (or monitors) can be crucial to public safety and security. It is non-trivial to …
Cardinality minimization, constraints, and regularization: a survey
We survey optimization problems that involve the cardinality of variable vectors in
constraints or the objective function. We provide a unified viewpoint on the general problem …
constraints or the objective function. We provide a unified viewpoint on the general problem …
Disguised tailing and video surveillance with solar-powered fixed-wing unmanned aerial vehicle
Disguised tailing and visual monitoring of suspicious mobile targets is a promising
application of security unmanned aerial vehicles (UAVs). But trajectory planning is non …
application of security unmanned aerial vehicles (UAVs). But trajectory planning is non …
Inexact block coordinate descent algorithms for nonsmooth nonconvex optimization
In this paper, we propose an inexact block coordinate descent algorithm for large-scale
nonsmooth nonconvex optimization problems. At each iteration, a particular block variable is …
nonsmooth nonconvex optimization problems. At each iteration, a particular block variable is …
Color image recovery using low-rank quaternion matrix completion algorithm
J Miao, KI Kou - IEEE Transactions on Image Processing, 2021 - ieeexplore.ieee.org
As a new color image representation tool, quaternion has achieved excellent results in color
image processing problems. In this paper, we propose a novel low-rank quaternion matrix …
image processing problems. In this paper, we propose a novel low-rank quaternion matrix …
Optimizing resource allocation with high-reliability constraint for multicasting automotive messages in 5g nr c-v2x networks
Cellular vehicle-to-everything (C-V2X) has been continuously evolving since Release 14 of
the 3rd Generation Partnership Project (3GPP) for future autonomous vehicles. Apart from …
the 3rd Generation Partnership Project (3GPP) for future autonomous vehicles. Apart from …
RMOCG: A Riemannian manifold optimization-based conjugate gradient method for phase-only beamforming synthesis
K Zhong, J Hu, Y Cong, G Cui… - IEEE Antennas and …, 2022 - ieeexplore.ieee.org
The phase-only null beamforming synthesis is widely used in communication, radar, and
sonar. Due to the phase-only constraint (constant modulus constraint), the problem is …
sonar. Due to the phase-only constraint (constant modulus constraint), the problem is …
Energy-efficient and secure power allocation and trajectory optimization for UAV-enabled data collection in wireless sensor networks
D Wang, Y Yang, X Li, C Wang, F Liu… - … of Communications and …, 2022 - ieeexplore.ieee.org
Using unmanned aerial vehicles (UAVs) to collect data in wireless sensor networks (WSNs)
has advantages of controllable mobility and flexible deployment. However, there are …
has advantages of controllable mobility and flexible deployment. However, there are …