[HTML][HTML] Survey on computation offloading in UAV-Enabled mobile edge computing

SMA Huda, S Moh - Journal of Network and Computer Applications, 2022 - Elsevier
With the increasing growth of internet-of-things (IoT) devices, effective computation
performance has become a critical issue. Many services provided by IoT devices (eg …

Computing in the sky: A survey on intelligent ubiquitous computing for uav-assisted 6g networks and industry 4.0/5.0

SH Alsamhi, AV Shvetsov, S Kumar, J Hassan… - Drones, 2022 - mdpi.com
Unmanned Aerial Vehicles (UAVs) are increasingly being used in a high-computation
paradigm enabled with smart applications in the Beyond Fifth Generation (B5G) wireless …

Secure NOMA-based UAV-MEC network towards a flying eavesdropper

W Lu, Y Ding, Y Gao, Y Chen, N Zhao… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for
higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile …

Online edge learning offloading and resource management for UAV-assisted MEC secure communications

Y Ding, Y Feng, W Lu, S Zheng, N Zhao… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
The mobile and flexible unmanned aerial vehicle (UAV) with mobile edge computing (MEC)
can effectively relieve the computing pressure of the massive data traffic in 5G Internet of …

UAV-enabled mobile edge-computing for IoT based on AI: A comprehensive review

Y Yazid, I Ez-Zazi, A Guerrero-González, A El Oualkadi… - Drones, 2021 - mdpi.com
Unmanned aerial vehicles (UAVs) are becoming integrated into a wide range of modern IoT
applications. The growing number of networked IoT devices generates a large amount of …

Secure transmission for multi-UAV-assisted mobile edge computing based on reinforcement learning

W Lu, Y Mo, Y Feng, Y Gao, N Zhao… - … on Network Science …, 2022 - ieeexplore.ieee.org
UAV communication has received widespread attention in MEC systems due to its high
flexibility and line-of-sight transmission. Users can reduce their local computing pressures …

Security of target recognition for UAV forestry remote sensing based on multi-source data fusion transformer framework

H Feng, Q Li, W Wang, AK Bashir, AK Singh, J Xu… - Information …, 2024 - Elsevier
Abstract Unmanned Aerial Vehicle (UAV) remote sensing object recognition plays a vital
role in a variety of sectors including military, agriculture, forestry, and construction. Accurate …

Distributed localization in dynamic networks via complex laplacian

X Fang, L **e, X Li - Automatica, 2023 - Elsevier
Different from most existing distributed localization approaches in static networks where the
agents in a network are static, this paper addresses the distributed localization problem in …

Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

Secure UAV-aided mobile edge computing for IoT: A review

ET Michailidis, K Maliatsos, DN Skoutas… - IEEE …, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …