[HTML][HTML] Survey on computation offloading in UAV-Enabled mobile edge computing
With the increasing growth of internet-of-things (IoT) devices, effective computation
performance has become a critical issue. Many services provided by IoT devices (eg …
performance has become a critical issue. Many services provided by IoT devices (eg …
Computing in the sky: A survey on intelligent ubiquitous computing for uav-assisted 6g networks and industry 4.0/5.0
Unmanned Aerial Vehicles (UAVs) are increasingly being used in a high-computation
paradigm enabled with smart applications in the Beyond Fifth Generation (B5G) wireless …
paradigm enabled with smart applications in the Beyond Fifth Generation (B5G) wireless …
Secure NOMA-based UAV-MEC network towards a flying eavesdropper
Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for
higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile …
higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile …
Online edge learning offloading and resource management for UAV-assisted MEC secure communications
The mobile and flexible unmanned aerial vehicle (UAV) with mobile edge computing (MEC)
can effectively relieve the computing pressure of the massive data traffic in 5G Internet of …
can effectively relieve the computing pressure of the massive data traffic in 5G Internet of …
UAV-enabled mobile edge-computing for IoT based on AI: A comprehensive review
Unmanned aerial vehicles (UAVs) are becoming integrated into a wide range of modern IoT
applications. The growing number of networked IoT devices generates a large amount of …
applications. The growing number of networked IoT devices generates a large amount of …
Secure transmission for multi-UAV-assisted mobile edge computing based on reinforcement learning
W Lu, Y Mo, Y Feng, Y Gao, N Zhao… - … on Network Science …, 2022 - ieeexplore.ieee.org
UAV communication has received widespread attention in MEC systems due to its high
flexibility and line-of-sight transmission. Users can reduce their local computing pressures …
flexibility and line-of-sight transmission. Users can reduce their local computing pressures …
Security of target recognition for UAV forestry remote sensing based on multi-source data fusion transformer framework
Abstract Unmanned Aerial Vehicle (UAV) remote sensing object recognition plays a vital
role in a variety of sectors including military, agriculture, forestry, and construction. Accurate …
role in a variety of sectors including military, agriculture, forestry, and construction. Accurate …
Distributed localization in dynamic networks via complex laplacian
Different from most existing distributed localization approaches in static networks where the
agents in a network are static, this paper addresses the distributed localization problem in …
agents in a network are static, this paper addresses the distributed localization problem in …
Security threats and mitigation techniques in UAV communications: A comprehensive survey
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …
applications and services, including military and rescue operations, aerial surveillance …
Secure UAV-aided mobile edge computing for IoT: A review
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …
demands with respect to latency will emerge. To handle computation-intensive tasks in a …