{"id":"https://openalex.org/W4224990296","doi":"https://doi.org/10.1109/iccae55086.2022.9762433","title":"A Q-learning based Method f or Secure UAV Communication against Malicious Eavesdropping","display_name":"A Q-learning based Method f or Secure UAV Communication against Malicious Eavesdropping","publication_year":2022,"publication_date":"2022-03-25","ids":{"openalex":"https://openalex.org/W4224990296","doi":"https://doi.org/10.1109/iccae55086.2022.9762433"},"language":"en","primary_location":{"id":"doi:10.1109/iccae55086.2022.9762433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccae55086.2022.9762433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Computer and Automation Engineering (ICCAE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100409855","display_name":"Jian Zhang","orcid":"https://orcid.org/0000-0001-5418-0455"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Jian Zhang","raw_affiliation_strings":["University of New South Wales UNSW,School of Electrical Engineering and Telecommunications,Sydney,NSW,Australia,2052"],"affiliations":[{"raw_affiliation_string":"University of New South Wales UNSW,School of Electrical Engineering and Telecommunications,Sydney,NSW,Australia,2052","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100409855"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":0.549,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.62577302,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"168","last_page":"172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.994240403175354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7741061449050903},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.7034557461738586},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6768674850463867},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6275690197944641},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6028150916099548},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5664577484130859},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.561181902885437},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5354487895965576},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.4772729277610779},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4653976857662201},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4555242955684662},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4468555748462677},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.29428547620773315},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1733720898628235},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1671598255634308}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.994240403175354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7741061449050903},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.7034557461738586},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6768674850463867},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6275690197944641},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6028150916099548},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5664577484130859},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.561181902885437},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5354487895965576},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.4772729277610779},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4653976857662201},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4555242955684662},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4468555748462677},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.29428547620773315},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1733720898628235},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1671598255634308},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccae55086.2022.9762433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccae55086.2022.9762433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Computer and Automation Engineering (ICCAE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1970334960","https://openalex.org/W1982218468","https://openalex.org/W2002783129","https://openalex.org/W2043769961","https://openalex.org/W2084281464","https://openalex.org/W2095145682","https://openalex.org/W2156214717","https://openalex.org/W2162854795","https://openalex.org/W2551758879","https://openalex.org/W2569436968","https://openalex.org/W2586992378","https://openalex.org/W2890006332","https://openalex.org/W2911700632","https://openalex.org/W2957100171","https://openalex.org/W2964114200","https://openalex.org/W2991249497","https://openalex.org/W3006762012","https://openalex.org/W3015698455","https://openalex.org/W3041150006","https://openalex.org/W3045602721","https://openalex.org/W3047309862","https://openalex.org/W3092477929","https://openalex.org/W3103493968","https://openalex.org/W3138291074","https://openalex.org/W3169232562","https://openalex.org/W3174708786","https://openalex.org/W3210517370","https://openalex.org/W4211015650","https://openalex.org/W6671455032","https://openalex.org/W6792485146"],"related_works":["https://openalex.org/W2971760063","https://openalex.org/W4385638864","https://openalex.org/W2959329152","https://openalex.org/W2904430835","https://openalex.org/W1495060406","https://openalex.org/W2799200757","https://openalex.org/W4224990296","https://openalex.org/W4290096688","https://openalex.org/W2971220113","https://openalex.org/W4210369429"],"abstract_inverted_index":{"Due":[0],"to":[1,17,56,77],"the":[2,23,30,36,47,51,79,97],"advantages":[3],"such":[4],"as":[5],"excellent":[6],"mobility,":[7],"low-cost,":[8],"on-demand":[9],"deployment,":[10],"unmanned":[11],"aerial":[12],"vehicles":[13],"(UAVs)":[14],"are":[15],"expected":[16],"play":[18],"a":[19,62,72],"significant":[20],"role":[21],"in":[22,61],"future":[24],"wireless":[25,42,53],"communication":[26,43],"systems.":[27],"One":[28],"of":[29,40,50],"necessary":[31],"and":[32],"urgent":[33],"problems":[34],"is":[35],"physical":[37],"layer":[38],"security":[39,75],"this":[41,68],"system.":[44],"Specifically,":[45],"under":[46],"open":[48],"nature":[49],"UAV":[52],"channels,":[54],"how":[55],"convey":[57],"confidential":[58],"information":[59],"reliably":[60],"coexistence":[63],"environment":[64],"with":[65,96],"eavesdroppers.":[66],"In":[67],"paper,":[69],"we":[70],"investigate":[71],"Q-learning":[73],"based":[74],"scheme":[76],"maximize":[78],"average":[80],"secrecy":[81],"rate":[82],"(ASR)":[83],"against":[84],"intentional":[85],"or":[86],"unintentional":[87],"eavesdropping.":[88],"Simulation":[89],"results":[90],"show":[91],"comparable":[92],"disguising":[93],"performances":[94],"compared":[95],"benchmark":[98],"method.":[99]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-06T23:10:59.065948","created_date":"2025-10-10T00:00:00"}
