{"id":"https://openalex.org/W4401508682","doi":"https://doi.org/10.1109/infocom52122.2024.10621264","title":"Two-Way Aerial Secure Communications via Distributed Collaborative Beamforming under Eavesdropper Collusion","display_name":"Two-Way Aerial Secure Communications via Distributed Collaborative Beamforming under Eavesdropper Collusion","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4401508682","doi":"https://doi.org/10.1109/infocom52122.2024.10621264"},"language":"en","primary_location":{"id":"doi:10.1109/infocom52122.2024.10621264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom52122.2024.10621264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100462964","display_name":"Jiahui Li","orcid":"https://orcid.org/0000-0002-7454-3257"},"institutions":[{"id":"https://openalex.org/I4210134929","display_name":"Jilin Province Science and Technology Department","ror":"https://ror.org/049x38272","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210134929"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiahui Li","raw_affiliation_strings":["Jilin University,College of Computer Science and Technology,Changchun,China,130012"],"affiliations":[{"raw_affiliation_string":"Jilin University,College of Computer Science and Technology,Changchun,China,130012","institution_ids":["https://openalex.org/I4210134929","https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085514719","display_name":"Geng Sun","orcid":"https://orcid.org/0000-0001-7802-4908"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]},{"id":"https://openalex.org/I4210134929","display_name":"Jilin Province Science and Technology Department","ror":"https://ror.org/049x38272","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210134929"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Geng Sun","raw_affiliation_strings":["Jilin University,College of Computer Science and Technology,Changchun,China,130012"],"affiliations":[{"raw_affiliation_string":"Jilin University,College of Computer Science and Technology,Changchun,China,130012","institution_ids":["https://openalex.org/I4210134929","https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048817096","display_name":"Qingqing Wu","orcid":"https://orcid.org/0000-0002-0043-3266"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingqing Wu","raw_affiliation_strings":["Shanghai Jiao Tong University,Department of Electronic Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Department of Electronic Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100688114","display_name":"Shuang Liang","orcid":"https://orcid.org/0009-0007-7142-781X"},"institutions":[{"id":"https://openalex.org/I184983240","display_name":"Northeast Normal University","ror":"https://ror.org/02rkvz144","country_code":"CN","type":"education","lineage":["https://openalex.org/I184983240"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Liang","raw_affiliation_strings":["Northeast Normal University,School of Information Science and Technology,Changchun,China,130024"],"affiliations":[{"raw_affiliation_string":"Northeast Normal University,School of Information Science and Technology,Changchun,China,130024","institution_ids":["https://openalex.org/I184983240"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100399574","display_name":"Pengfei Wang","orcid":"https://orcid.org/0000-0002-8827-0309"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Wang","raw_affiliation_strings":["Dalian University of Technology,School of Computer Science and Technology,Dalian,China,116024"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology,School of Computer Science and Technology,Dalian,China,116024","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091266202","display_name":"Dusit Niyato","orcid":"https://orcid.org/0000-0002-7442-7416"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["Nanyang Technological University,School of Computer Science and Engineering,Singapore,Singapore,639798"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,School of Computer Science and Engineering,Singapore,Singapore,639798","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100462964"],"corresponding_institution_ids":["https://openalex.org/I194450716","https://openalex.org/I4210134929"],"apc_list":null,"apc_paid":null,"fwci":10.8795,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.97715805,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"331","last_page":"340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.9153429269790649},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.8059079647064209},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6629447937011719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5703439712524414},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44902241230010986},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4329231381416321},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.32062435150146484},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22939491271972656},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12212330102920532}],"concepts":[{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.9153429269790649},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.8059079647064209},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6629447937011719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5703439712524414},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44902241230010986},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4329231381416321},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.32062435150146484},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22939491271972656},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12212330102920532},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom52122.2024.10621264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom52122.2024.10621264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337495","display_name":"Technology Development","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W414544266","https://openalex.org/W2045808688","https://openalex.org/W2061911970","https://openalex.org/W2082754320","https://openalex.org/W2114863568","https://openalex.org/W2481453975","https://openalex.org/W2731474427","https://openalex.org/W2735292160","https://openalex.org/W2738900493","https://openalex.org/W2742961367","https://openalex.org/W2932447352","https://openalex.org/W2963117265","https://openalex.org/W2964135632","https://openalex.org/W2975032961","https://openalex.org/W2991627768","https://openalex.org/W2998267513","https://openalex.org/W3046042712","https://openalex.org/W3112042900","https://openalex.org/W3137017608","https://openalex.org/W3156109555","https://openalex.org/W3157791915","https://openalex.org/W3171539023","https://openalex.org/W3174510089","https://openalex.org/W3177791460","https://openalex.org/W3184026447","https://openalex.org/W3184078521","https://openalex.org/W4206826531","https://openalex.org/W4226301176","https://openalex.org/W4280506588","https://openalex.org/W4283211846","https://openalex.org/W4283216222","https://openalex.org/W4285124278","https://openalex.org/W4312415945","https://openalex.org/W4313854346","https://openalex.org/W4315777612","https://openalex.org/W4318953584","https://openalex.org/W4322731284","https://openalex.org/W4379117226","https://openalex.org/W4379741395","https://openalex.org/W4385287226"],"related_works":["https://openalex.org/W2009938035","https://openalex.org/W3143020802","https://openalex.org/W1491837399","https://openalex.org/W3122232980","https://openalex.org/W2272761499","https://openalex.org/W2502115930","https://openalex.org/W2363272970","https://openalex.org/W2120306875","https://openalex.org/W1699588379","https://openalex.org/W3143060468"],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1,4,27,72],"vehicles":[2],"(UAVs)-enabled":[3],"communication":[5,73],"provides":[6],"a":[7,14,69,142,172],"flexible,":[8],"reliable,":[9],"and":[10,55,78,96,108,134,177,199],"cost-effective":[11],"solution":[12],"for":[13,121,202],"range":[15],"of":[16,119,160,174,197],"wireless":[17],"applications.":[18],"However,":[19],"due":[20],"to":[21,33,46,101,127],"the":[22,57,62,91,97,106,116,128,157,161],"high":[23],"line-of-sight":[24],"(LoS)":[25],"probability,":[26],"communications":[28],"between":[29,74,131],"UAVs":[30,120,198],"are":[31],"vulnerable":[32],"eavesdropping":[34],"attacks,":[35],"particularly":[36],"when":[37],"multiple":[38],"eavesdroppers":[39],"collude.":[40],"In":[41],"this":[42],"work,":[43],"we":[44,67,89,113,137,148],"aim":[45],"introduce":[47],"distributed":[48],"collaborative":[49],"beamforming":[50],"(DCB)":[51],"into":[52],"UAV":[53,76,84],"swarms":[54,77,81],"handle":[56],"eavesdropper":[58],"collusion":[59],"by":[60],"controlling":[61],"corresponding":[63],"signal":[64],"distributions.":[65],"Specifically,":[66],"consider":[68,138],"two-way":[70,92],"DCB-enabled":[71],"two":[75,83],"construct":[79],"these":[80,139],"as":[82,141],"virtual":[85,123],"antenna":[86,124],"arrays.":[87,125],"Then,":[88],"minimize":[90,115],"known":[93,107],"secrecy":[94],"capacity":[95],"maximum":[98],"sidelobe":[99],"level":[100],"avoid":[102],"information":[103],"leakage":[104],"from":[105],"unknown":[109],"eavesdroppers,":[110],"respectively.":[111],"Simultaneously,":[112],"also":[114],"energy":[117,135],"consumption":[118],"constructing":[122],"Due":[126],"conflicting":[129],"relationships":[130],"secure":[132],"performance":[133],"efficiency,":[136],"objectives":[140],"multi-objective":[143,152],"optimization":[144],"problem.":[145,162],"Following":[146],"this,":[147],"propose":[149],"an":[150],"enhanced":[151],"swarm":[153],"intelligence":[154],"algorithm":[155,169],"via":[156],"characterized":[158],"properties":[159],"Simulation":[163],"results":[164],"show":[165],"that":[166,186],"our":[167,187],"proposed":[168],"can":[170,189],"obtain":[171],"set":[173],"informative":[175],"solutions":[176],"outperform":[178],"other":[179],"state-of-the-art":[180],"baseline":[181],"algorithms.":[182],"Experimental":[183],"tests":[184],"demonstrate":[185],"method":[188],"be":[190],"deployed":[191],"in":[192],"limited":[193],"computing":[194],"power":[195],"platforms":[196],"is":[200],"beneficial":[201],"saving":[203],"computational":[204],"resources.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":8}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
