参考文献/References:
[1] ZENG Yong,ZHANG Rui.Cellular-connected UAV: Potential, challenges, and promising technologies[J].IEEE Wireless Communications,2019,26(1):120-127.DOI:10.1109/MWC.2018.1800023.
[2] ZENG Yong,ZHANG Rui.Throughput maximization for UAV-enabled mobile relaying systems[J].IEEE Transactions on Communications,2016,64(12):4983-4996.DOI:10.1109/TCOMM.2016.2611512.
[3] ZHANG Shuhang,ZHANG Hongliang,DI Boya.Joint trajectory and power optimization for UAV sensing over cellular networks[J].IEEE Communications Letters,2018,22(11):2382-2385.DOI:10.1109/LCOMM.2018.286 8075.
[4] FAN Wenlu,WU Yang,JU Shaohua,et al.Secure UAV communication with robust communication and trajectory design[C]//International Conference on Computer, Information and Telecommunication Systems(CITS).Beijing:IEEE Press,2019:28-31.DOI:10.1109/CITS.2019.8862090.
[5] LI Kai,KANHERE S S,NI Wei,et al.Proactive eavesdropping via lamming for trajectory tracking of UAVs[C]//15th International Wireless Communications & Mobile Computing Conference(IWCMC).Tangier:IEEE Pres-s,2019:24-28.DOI:10.1109/IWCMC.2019.8766696.
[6] ZHANG Mingzhu,YI Hongju,CHEN Yu,et al.Proactive eavesdropping via jamming for power-limited UAV communications[C]//IEEE International Conference on Communications Workshops(ICC Workshops).Shanghai:IEEE Press,2019:20-24.
[7] LU Haiquan,ZHANG Haiyang,DAI Haibo.Proactive eavesdropping in UAV-aided suspicious communication systems[J].IEEE Transactions on Vehicular Technology,2019,68(2):1993-1997.DOI:10.1109/TVT.2018.2889397.
[8] BOYD S L.Vandenberghe, convex optimization[M].Cambridge: Cambridge University Press,2004.
[9] ZHOU Xiaobo,WU Qingqing.UAV-enabled secure communications: Joint trajectory and transmit power optimization[J].IEEE Transactions on Vehicular Technology,2019,68(4):4069-4073.DOI:10.1109/TVT.2019.2900157.
[10] ZHANG Guangchi,WU Qingqing,CUI Miao.Securing UAV communications via joint trajectory and power control[J].IEEE Transactions on Wireless Communications,2019,18(2):1376-1389.DOI:10.1109/TWC.2019.2892 461.
[11] NNAMANI C O,KHANDAKER M R A,SELLATHURAI M.UAV-aided jamming for secure ground communication with unknown eavesdropper location[J].IEEE Access,2020,8:72881-72892.DOI:10.1109/ACCESS.2020.2986025.
[12] 潘雨龙.全双工无线通信系统中的自干扰消除方法研究[D].北京:北京邮电大学,2016.
[13] WU Qingqing,ZENG Yong,ZHANG Rui.Joint trajectory and communication design for multi-UAV enabled wireless networks[J].IEEE Transactions on Wireless Communications,2018,17(3):2109-2121.DOI:10.1109/TWC.2017.2789293.
[14] CUI Miao,ZHANG Guangchi,WU Qingqing.Robust trajectory and transmit power design for secure UAV communications[J].IEEE Transactions on Vehicular Technology,2018,67(9):9042-9046.DOI:10.1109/TVT.2018.2849644.
[15] MIAO Jiansong,ZHENG Ziyuan.Cooperative jamming for secure UAV-enabled mobile relay system[J].IEEE Access,2020,8:48943-48957.DOI:10.1109/ACCESS.2020.2980242.
相似文献/References:
[1]陶英杰,张维纬,马昕,等.面向无人机视频分析的车辆目标检测方法[J].华侨大学学报(自然科学版),2022,43(1):111.[doi:10.11830/ISSN.1000-5013.202011014]
TAO Yingjie,ZHANG Weiwei,MA Xin,et al.Vehicle Target Detection Method for Unmanned Aerial Vehicle Video Analysis[J].Journal of Huaqiao University(Natural Science),2022,43(2):111.[doi:10.11830/ISSN.1000-5013.202011014]