DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yoo, Seonghoon | ko |
dc.contributor.author | Jeong, Seongah | ko |
dc.contributor.author | Kang, Joonhyuk | ko |
dc.date.accessioned | 2023-07-17T09:00:44Z | - |
dc.date.available | 2023-07-17T09:00:44Z | - |
dc.date.created | 2023-07-17 | - |
dc.date.created | 2023-07-17 | - |
dc.date.issued | 2023-06 | - |
dc.identifier.citation | IEEE WIRELESS COMMUNICATIONS LETTERS, v.12, no.6, pp.972 - 976 | - |
dc.identifier.issn | 2162-2337 | - |
dc.identifier.uri | http://hdl.handle.net/10203/310540 | - |
dc.description.abstract | In this letter, we consider a secure offloading system consisting of a unmanned aerial vehicle (UAV)-mounted edge server, ground user equipments (UEs) and a malicious eavesdropper UAV. With the aim of maximizing secrecy sum-rate, we propose an adaptation of a helper UAV to switch the mode between jamming and relaying. We jointly optimize the helper UAV's trajectory and mode and UEs' offloading decision under energy budget constraints and operational limitations of nodes. The proposed algorithm is developed based on a deep deterministic policy gradient (DDPG)-based method, whose superior performances are verified via numerical results, as compared to other benchmark schemes. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Hybrid UAV-Enabled Secure Offloading via Deep Reinforcement Learning | - |
dc.type | Article | - |
dc.identifier.wosid | 001006038300008 | - |
dc.identifier.scopusid | 2-s2.0-85149817197 | - |
dc.type.rims | ART | - |
dc.citation.volume | 12 | - |
dc.citation.issue | 6 | - |
dc.citation.beginningpage | 972 | - |
dc.citation.endingpage | 976 | - |
dc.citation.publicationname | IEEE WIRELESS COMMUNICATIONS LETTERS | - |
dc.identifier.doi | 10.1109/LWC.2023.3254554 | - |
dc.contributor.localauthor | Kang, Joonhyuk | - |
dc.contributor.nonIdAuthor | Jeong, Seongah | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Autonomous aerial vehicles | - |
dc.subject.keywordAuthor | Jamming | - |
dc.subject.keywordAuthor | Relays | - |
dc.subject.keywordAuthor | Wireless communication | - |
dc.subject.keywordAuthor | Servers | - |
dc.subject.keywordAuthor | Switches | - |
dc.subject.keywordAuthor | Reinforcement learning | - |
dc.subject.keywordAuthor | Unmanned aerial vehicle (UAV) | - |
dc.subject.keywordAuthor | offloading | - |
dc.subject.keywordAuthor | physical-layer security | - |
dc.subject.keywordAuthor | deep reinforcement learning | - |
dc.subject.keywordPlus | RESOURCE-ALLOCATION | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.