| 1 |
LI B Y, HAO Q F, WU B, et al. An online robust resource allocation algorithm for mobile edge computing[J]. IEEE Wireless Communications Letters, 2024, 13 (7): 2013- 2017.
doi: 10.1109/LWC.2024.3401180
|
| 2 |
王海艳, 张霖, 骆健. 移动边缘计算场景下针对资源竞争的服务迁移优化方法[J]. 通信学报, 2024, 45 (8): 37- 50.
|
|
WANG H Y, ZHANG L, LUO J. Service migration optimization method for resource competition in mobile edge computing scenarios[J]. Journal on Communications, 2024, 45 (8): 37- 50.
|
| 3 |
GAO Y F, YUAN X P, YANG D C, et al. UAV-assisted MEC system with mobile ground terminals: DRL-based joint terminal scheduling and UAV 3D trajectory design[J]. IEEE Trans. on Vehicular Technology, 2024, 73 (7): 10164- 10180.
doi: 10.1109/TVT.2024.3367624
|
| 4 |
WANG Y W, FAN J C, LUO J, et al. Secure transmission in STAR-RIS-assisted cell-free networks: maximizing weighted sum secrecy rate[J]. IEEE Communications Letters, 2024, 28 (9): 2001- 2005.
doi: 10.1109/LCOMM.2024.3416529
|
| 5 |
ZHANG N, AI Y X, ZHANG D H, et al. Advances and challenges in physical layer security: a comprehensive review[C]// Proc. of the International Conference on Ubiquitous Communication, 2023: 83−87.
|
| 6 |
ZHANG W, CHEN J, KUO Y H, et al. Artificial-noise-aided optimal beamforming in layered physical layer security[J]. IEEE Communications Letters, 2019, 23 (1): 72- 75.
doi: 10.1109/LCOMM.2018.2881182
|
| 7 |
韩冰, 尹沛桐, 叶迎晖, 等. 区块链中基于数据压缩的移动边缘计算卸载策略[J]. 北京邮电大学学报, 2024, 47(5): 44−50, 106.
|
|
HAN B, YIN P T, YE Y H, et al. MEC offloading strategy based on data compression in blockchain[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(5): 44−50, 106.
|
| 8 |
WEN Y, CHEN G J, FANG S S, et al. RIS-assisted UAV secure communications with artificial noise-aware trajectory design against multiple colluding curious users[J]. IEEE Trans. on Information Forensics and Security, 2024, 19, 3064- 3076.
doi: 10.1109/TIFS.2024.3356166
|
| 9 |
LIU Z X, ZHU B, XIE Y A, et al. UAV-aided secure communication with imperfect eavesdropper location: robust design for jamming power and trajectory[J]. IEEE Trans. on Vehicular Technology, 2024, 73 (5): 7276- 7286.
doi: 10.1109/TVT.2023.3347769
|
| 10 |
WANG Q, CHEN Z, MEI W D, et al. Improving physical layer security using UAV-enabled mobile relaying[J]. IEEE Wireless Communications Letters, 2017, 6 (3): 310- 313.
doi: 10.1109/LWC.2017.2680449
|
| 11 |
XU Y, ZHANG T K, YANG D C, et al. Joint resource and trajectory optimization for security in UAV-assisted MEC systems[J]. IEEE Trans. on Communications, 2020, 69 (1): 573- 588.
|
| 12 |
LU W D, DING Y, GAO Y, et al. Secure NOMA-based UAV-MEC network towards a flying eavesdropper[J]. IEEE Trans. on Communications, 2022, 70 (5): 3364- 3376.
doi: 10.1109/TCOMM.2022.3159703
|
| 13 |
CHE B H, GAO C, MA R Q, et al. Covert wireless communication in multichannel systems[J]. IEEE Wireless Communications Letters, 2022, 11 (9): 1790- 1794.
doi: 10.1109/LWC.2022.3180993
|
| 14 |
ZHANG L, LI G, CHEN J, et al. Joint transmit power and trajectory optimization for UAV covert communication assisted by artificial noise[C]// Proc. of the International Conference on Ubiquitous Communication, 2023: 46−51.
|
| 15 |
ZHOU X B, YAN S H, SHU F, et al. UAV-enabled covert wireless data collection[J]. IEEE Journal on Selected Areas in Communications, 2021, 39 (11): 3348- 3362.
doi: 10.1109/JSAC.2021.3088688
|
| 16 |
CHEN X Y, SUN W, XING C W, et al. Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations[J]. IEEE Trans. on Wireless Communications, 2021, 20 (8): 5467- 5480.
doi: 10.1109/TWC.2021.3068096
|
| 17 |
JIANG X, YANG Z T, ZHAO N, et al. Resource allocation and trajectory optimization for UAV-enabled multi-user covert communications[J]. IEEE Trans. on Vehicular Technology, 2021, 70 (2): 1989- 1994.
doi: 10.1109/TVT.2021.3053936
|
| 18 |
季薇, 杨许鑫, 李飞, 等. 无人机辅助MEC系统中基于最优SIC顺序的能耗优化方案[J]. 通信学报, 2024, 45 (2): 18- 30.
doi: 10.11959/j.issn.1000-436x.2024042
|
|
JI W, YANG Y X, LI F, et al. Energy consumption optimization scheme in UAV-assisted MEC system based on optimal SIC order[J]. Journal on Communications, 2024, 45 (2): 18- 30.
doi: 10.11959/j.issn.1000-436x.2024042
|
| 19 |
杨和林, 郑梦婷, 刘帅, 等. 恶意干扰下的无人机辅助边缘计算加权能耗与时延智能优化[J]. 电子与信息学报, 2024, 46(7): 2879−2887.
|
|
YANG H L, ZHENG M T, LIU S, et al. Intelligent weighted energy consumption and delay optimization for UAV-assisted MEC under malicious jamming[J]. Journal of Electronics & Information Technology, 2024, 46(7): 2879−2887.
|
| 20 |
WANG Y D, YAN S H, ZHOU X B, et al. Covert communication with energy replenishment constraints in UAV networks[J]. IEEE Trans. on Vehicular Technology, 2022, 71 (9): 10143- 10148.
doi: 10.1109/TVT.2022.3178021
|
| 21 |
LI M, TAO X F, LI N, et al. Energy-efficient covert communication with the aid of aerial reconfigurable intelligent surface[J]. IEEE Communications Letters, 2022, 26 (9): 2101- 2105.
doi: 10.1109/LCOMM.2022.3183637
|
| 22 |
WANG Y D, YAN S H, YANG W W, et al. Energy-efficient covert communications for bistatic backscatter systems[J]. IEEE Trans. on Vehicular Technology, 2021, 70 (3): 2906- 2911.
doi: 10.1109/TVT.2021.3061661
|
| 23 |
季薇, 杨许鑫, 李飞. 一种无人机辅助移动边缘计算系统中的隐蔽通信方法[P]. 中国: 2024100805432, 2024-01-19.
|
|
JI W, YANG Y X, LI F. A covert communication method in UAV-assisted MEC systems[P]. China: 2024100805432, 2024-01-19.
|
| 24 |
YAN S H, ZHOU X Y, YANG N, et al. Secret channel training to enhance physical layer security with a full-duplex receiver[J]. IEEE Trans. on Information Forensics and Security, 2018, 13 (11): 2788- 2800.
doi: 10.1109/TIFS.2018.2834301
|
| 25 |
CHENG Y Y, LU J Y, NIYATO D, et al. Performance analysis and power allocation for covert mobile edge computing with RIS-aided NOMA[J]. IEEE Trans. on Mobile Computing, 2024, 23 (5): 4212- 4227.
doi: 10.1109/TMC.2023.3302413
|
| 26 |
SOBER T V, BASH B A, GUHA S, et al. Covert communication in the presence of an uninformed jammer[J]. IEEE Trans. on Wireless Communications, 2017, 16 (9): 6193- 6206.
doi: 10.1109/TWC.2017.2720736
|
| 27 |
YUAN W H, NAHRSTEDT K. Energy-efficient CPU scheduling for multimedia applications[J]. ACM Trans. on Computer Systems, 2006, 24 (3): 292- 331.
doi: 10.1145/1151690.1151693
|
| 28 |
YANG Z H, PAN C H, WANG K Z, et al. Energy efficient resource allocation in UAV-enabled mobile edge computing networks[J]. IEEE Trans. on Wireless Communications, 2019, 18 (9): 4576- 4589.
doi: 10.1109/TWC.2019.2927313
|
| 29 |
SHEN K M, YU W. Fractional programming for communication systems—part I: power control and beamforming[J]. IEEE Trans. on Signal Processing, 2018, 66 (10): 2616- 2630.
doi: 10.1109/TSP.2018.2812733
|
| 30 |
ALI S, HOSSAIN E, KIM D I. Non-orthogonal multiple access (NOMA) for downlink multiuser MIMO systems: user clustering, beamforming, and power allocation[J]. IEEE Access, 2016, 5, 565- 577.
|
| 31 |
ALI M S, TABASSUM H, HOSSAIN E. Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems[J]. IEEE Access, 2017, 4, 6325- 6343.
|