{"id":"https://openalex.org/W7138850234","doi":"https://doi.org/10.1109/globecom59602.2025.11431800","title":"Optimization of Aerial Relay Placement and Antenna Selection in Untrusted UAV-Assisted Networks via PSO and Deep Learning","display_name":"Optimization of Aerial Relay Placement and Antenna Selection in Untrusted UAV-Assisted Networks via PSO and Deep Learning","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138850234","doi":"https://doi.org/10.1109/globecom59602.2025.11431800"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11431800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070885662","display_name":"Lefteris Tsipi","orcid":"https://orcid.org/0000-0002-2591-9289"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Lefteris Tsipi","raw_affiliation_strings":["University of the Aegean,Dept. of Information and Communication Systems Engineering,Samos,Greece,83200"],"affiliations":[{"raw_affiliation_string":"University of the Aegean,Dept. of Information and Communication Systems Engineering,Samos,Greece,83200","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060378506","display_name":"Emmanouel T. Michailidis","orcid":"https://orcid.org/0000-0002-1077-0047"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Emmanouel T. Michailidis","raw_affiliation_strings":["University of Piraeus,Dept. of Digital Systems,Piraeus,Greece,18534"],"affiliations":[{"raw_affiliation_string":"University of Piraeus,Dept. of Digital Systems,Piraeus,Greece,18534","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053675698","display_name":"Nektarios Moraitis","orcid":"https://orcid.org/0000-0001-9424-6762"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Nektarios Moraitis","raw_affiliation_strings":["National Technical University of Athens,School of Electrical and Computer Engineering,Athens,Greece"],"affiliations":[{"raw_affiliation_string":"National Technical University of Athens,School of Electrical and Computer Engineering,Athens,Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060127478","display_name":"Demosthenes Vouyioukas","orcid":"https://orcid.org/0000-0002-6649-6577"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Demosthenes Vouyioukas","raw_affiliation_strings":["University of Piraeus,Dept. of Digital Systems,Piraeus,Greece,18534"],"affiliations":[{"raw_affiliation_string":"University of Piraeus,Dept. of Digital Systems,Piraeus,Greece,18534","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070885662"],"corresponding_institution_ids":["https://openalex.org/I98805295"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.92374411,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1591","last_page":"1596"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9042999744415283,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9042999744415283,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.03720000013709068,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.026000000536441803,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8605999946594238},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.6103000044822693},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.6101999878883362},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.6010000109672546},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.576200008392334},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4887999892234802},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.47920000553131104},{"id":"https://openalex.org/keywords/antenna","display_name":"Antenna (radio)","score":0.4138000011444092}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8605999946594238},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7182999849319458},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.6103000044822693},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.6101999878883362},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6010000109672546},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.576200008392334},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4887999892234802},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.47920000553131104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4602000117301941},{"id":"https://openalex.org/C21822782","wikidata":"https://www.wikidata.org/wiki/Q131214","display_name":"Antenna (radio)","level":2,"score":0.4138000011444092},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39890000224113464},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.390500009059906},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3799999952316284},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.37549999356269836},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.36070001125335693},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.3449999988079071},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.31139999628067017},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3100000023841858},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2985000014305115},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2906000018119812},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.2858999967575073},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.27219998836517334},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11431800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2962874228","https://openalex.org/W2966728939","https://openalex.org/W2990204812","https://openalex.org/W4205161799","https://openalex.org/W4210291204","https://openalex.org/W4226057460","https://openalex.org/W4285143164","https://openalex.org/W4292264872","https://openalex.org/W4318261544","https://openalex.org/W4324066777","https://openalex.org/W4367042251","https://openalex.org/W4377969141","https://openalex.org/W4387872920","https://openalex.org/W4390659399","https://openalex.org/W4391020293","https://openalex.org/W4393032565","https://openalex.org/W4395468342","https://openalex.org/W4399149882","https://openalex.org/W4399390485"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"physical-layer":[3],"security":[4,150],"(PLS)":[5],"in":[6,154],"UAV-assisted":[7],"communication":[8],"networks":[9],"featuring":[10],"an":[11],"untrusted":[12,157],"amplify-and-forward":[13],"aerial":[14],"relay.":[15],"To":[16],"counter":[17],"potential":[18],"eavesdropping":[19],"threats,":[20],"a":[21,31,41,141],"destination-aided":[22],"jamming":[23],"strategy":[24],"is":[25,51,95],"employed.":[26],"The":[27,89,107],"proposed":[28,113,138],"solution":[29,146],"adopts":[30],"hybrid":[32],"framework":[33,114],"that":[34,111],"integrates":[35],"particle":[36],"swarm":[37],"optimization":[38],"(PSO)":[39],"and":[40,103,122,143],"dual-layer":[42],"deep":[43],"neural":[44],"network":[45],"(DNN).":[46],"In":[47],"this":[48],"framework,":[49],"PSO":[50],"responsible":[52],"for":[53,147],"optimizing":[54],"the":[55,60,65,71,74,81,85,92,112,137,149],"three-dimensional":[56],"(3-D)":[57],"placement":[58,101],"of":[59,91,151],"UAV":[61],"relay":[62,100],"by":[63,97],"minimizing":[64],"total":[66],"aggregate":[67],"path":[68],"loss,":[69],"while":[70],"DNN":[72],"tackles":[73],"transmit":[75],"antenna":[76,104],"selection":[77,105,127],"(TAS)":[78],"problem":[79],"at":[80],"source":[82],"to":[83],"maximize":[84],"average":[86],"secrecy":[87,131],"rate.":[88],"effectiveness":[90],"suggested":[93],"approach":[94],"assessed":[96],"comparing":[98],"diverse":[99],"techniques":[102],"methods.":[106],"simulation":[108],"results":[109],"demonstrate":[110],"consistently":[115],"outperforms":[116],"conventional":[117],"machine":[118],"learning":[119],"(ML)-based":[120],"approaches":[121],"random":[123],"baselines.":[124],"Interestingly,":[125],"single-antenna":[126],"achieves":[128],"slightly":[129],"better":[130],"rates":[132],"than":[133],"dual-antenna":[134],"configurations.":[135],"Overall,":[136],"method":[139],"provides":[140],"scalable":[142],"computationally":[144],"efficient":[145],"enhancing":[148],"UAV-enabled":[152],"communications":[153],"scenarios":[155],"involving":[156],"relays.":[158]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
