2021
DOI: 10.1109/tccn.2020.3014208
|View full text |Cite
|
Sign up to set email alerts
|

Resource Allocation and Trajectory Design in UAV-Assisted Jamming Wideband Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 43 publications
0
18
0
Order By: Relevance
“…Wang et al considered the secrecy performance of a CRN with multiple terrestrial CUs and PUs, and a terrestrial eavesdropper in [23]. An aerial-friendly jammer was utilized to enhance security.…”
Section: A Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Wang et al considered the secrecy performance of a CRN with multiple terrestrial CUs and PUs, and a terrestrial eavesdropper in [23]. An aerial-friendly jammer was utilized to enhance security.…”
Section: A Background and Related Workmentioning
confidence: 99%
“…The horizontal positions of S and J at the nth slot are expressed as q S (n) = [x S (n) , y S (n)] T and q J (n) = [x J (n) , y J (n)] T , respectively. In addition, w D k ∈ R 2×1 , w Ur ∈ R 2×1 , and w E ∈ R 2×1 denote the location coordinates of D k , U r , and E. Similar to [19] and [23], all the A2G links are assumed to be LoS links. For simplicity, it is assumed that the A2G links are dominated by the LoS links, where the channel quality depends only on Euclidean distance.…”
Section: A System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Interference is generally considered harmful in communication systems. However, interference can be appropriately exploited to improve the secrecy performance [10]- [15]. A joint beamforming for signal and artificial noise was proposed in [10] to ensure the secure communication of PN and SN.…”
Section: Introductionmentioning
confidence: 99%