1 |
Zewail A A, Yener A. Combination Networks with or without Secrecy Constraints: the Impact of Caching Relays[J]. IEEE Journal on Selected Areas in Communications (S0733-8716), 2018, 36(6): 1140-1152.
|
2 |
郭剑岚, 陈俞强, 刘怡俊. 无线传感网络中的物理层安全问题探讨[J]. 系统仿真学报, 2017, 29(8): 1815-1821.
|
|
Guo Jianlan, Chen Yuqiang, Liu Yijun. Study on Secrecy Capacity of Wireless Sensor Networks Based on Amplify-and-Forward Compressed Sensing Scheme[J]. Journal of System Simulation, 2017, 29(8): 1815-1821.
|
3 |
高喜俊, 陈自力, 胡永江, 等. 无人机MIMO信道的GBSBCER模型及特性分析[J]. 系统仿真学报, 2017, 29(3): 494-501.
|
|
Gao Xijun, Chen Zili, Hu Yongjiang, et al. UAV-MIMO Channel Characteristic Analysis Based on GBSBCS Model[J]. Journal of System Simulation, 2017, 29(3): 494-501.
|
4 |
Chen X, Hu X, Zhu Q, et al. Channel Modeling and Performance Analysis for UAV Relay Systems[J]. China Communications (S1673-5447), 2018, 15(12): 89-97.
|
5 |
Rahman S U, Kim G, Cho Y, et al. Positioning of UAVs for Throughput Maximization in Software-Defined Disaster Area UAV Communication Networks[J]. Journal of Communications and Networks (S1229-2370), 2018, 20(5): 452-463.
|
6 |
Zeng Y, Zhang R. Throughput Maximization for UAV-Enabled Mobile Relaying Systems[J]. IEEE Transactions on Communications (S0090-6778), 2016, 64(12): 4983-4996.
|
7 |
Zhang G, Wu Q, Cui M, et al. Securing UAV Communications Via Joint Trajectory and Power Control [J]. IEEE Transactions on Wireless Communications (S1536-1276), 2019, 18(2): 1376-1389.
|
8 |
Wang Q, Dai H, Wang H, et al. UAV-Enabled Friendly Jamming Scheme to Secure Industrial Internet of Things[J]. Journal of Communications and Networks (S1229-2370), 2019, 21(5): 481-490.
|
9 |
Li A, Zhang W. Mobile Jammer-Aided Secure UAV Communications Via Trajectory Design and Power Control[J]. China Communications (S1673-5447), 2018, 15(8): 141-151.
|
10 |
Zhou X, Wu Q, Yan S, et al. UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization[J]. IEEE Transactions on Vehicular Technology (S0018-9545), 2019, 68(4): 4069-4073.
|
11 |
陆海全, 王保云. 无人机辅助可疑中继系统下的主动窃听[J]. 南京邮电大学学报(自然科学版), 2019, 39(2): 35-40.
|
|
Lu Haiquan, Wang Baoyun. Proactive Eavesdropping in UAV-Aided Suspicious Relay Systems[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2019, 39(2): 35-40.
|
12 |
Sun G, Li N, Tao X, et al. Power Allocation in UAV-Enabled Relaying Systems for Secure Communications[J]. IEEE Access (S2169-3536), 2019, 7: 119009-119017.
|
13 |
Shen L F, Wang N, Mu X. Iterative UAV Trajectory Optimization for Physical Layer Secure Mobile Relaying[C]//2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (Cyber C). Zhengzhou, China: IEEE, 2018: 19-23.
|
14 |
Milan E, Enrico N, Kaushik R, et al. Help from the Sky: Leveraging UAVs for Disaster Management[J]. IEEE Pervasive Computing (S1536-1268), 2017, 16(1): 24-32.
|
15 |
Michael C, Stephan S, Mateusz M, et al. MM-Wave SAR Demonstrator as a Test Bed for Advanced Solutions in Microwave Imaging [J]. IEEE Aerospace and Electronic Systems Magazine (S0885-8985), 2014, 29(7): 8-15.
|
16 |
Lin X, Vijaya Y, Siva D M, et al. The Sky is not the Limit: LTE for Unmanned Aerial Vehicles[J]. IEEE Communications Magazine (S0163-6804), 2018, 56(4): 204-210.
|
17 |
Wang Q, Chen Z, Mei W, et al. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying[J]. IEEE Wireless Communications Letters (S2162-2337), 2017, 6(3): 310-313.
|
18 |
Grant M, Boyd S. Cvx: Matlab Software for Disciplined Convex Programming[EB/OL]. (2017-10-13) [2020-09-01]. .
|