Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Covertness and timeliness of data collection in UAV-aided wireless-powered IoT
In this work, we aim to maximize the timeliness of data collection subject to a covertness
constraint in unmanned aerial vehicle (UAV)-aided Internet of Things (IoT) networks, where …
constraint in unmanned aerial vehicle (UAV)-aided Internet of Things (IoT) networks, where …
Cooperative jamming and relay selection for covert communications in wireless relay systems
C Gao, B Yang, D Zheng, X Jiang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates the covert communications via cooperative jamming and relay
selection in a wireless relay system, where a source intends to transmit a message to its …
selection in a wireless relay system, where a source intends to transmit a message to its …
Joint resource allocation and 3-D deployment for multi-UAV covert communications
Unmanned aerial vehicles (UAVs)-assisted wireless communication will play an important
role in the next-generation mobile communication network. However, the inherent open …
role in the next-generation mobile communication network. However, the inherent open …
UAV-enabled secure communications via collaborative beamforming with imperfect eavesdropper information
Unmanned aerial vehicles (UAVs) are playing a pivotal role in wireless networks due to their
high mobility and on-demand deployment advantages. However, the UAV-enabled …
high mobility and on-demand deployment advantages. However, the UAV-enabled …