{"id":"https://openalex.org/W4311413987","doi":"https://doi.org/10.1109/lwc.2022.3210144","title":"Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks","display_name":"Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks","publication_year":2022,"publication_date":"2022-09-27","ids":{"openalex":"https://openalex.org/W4311413987","doi":"https://doi.org/10.1109/lwc.2022.3210144"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2022.3210144","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2022.3210144","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076938763","display_name":"Liping Qian","orcid":"https://orcid.org/0000-0001-6210-2617"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Ping Qian","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100385513","display_name":"Wenjie Zhang","orcid":"https://orcid.org/0000-0002-7470-3011"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjie Zhang","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073201721","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0001-5544-4512"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082844557","display_name":"Yuan Wu","orcid":"https://orcid.org/0000-0001-6661-9461"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]},{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Yuan Wu","raw_affiliation_strings":["State Key Laboratory of Internet of Things for Smart City and the Department of Computer and Information Science, University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Internet of Things for Smart City and the Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I6469544","https://openalex.org/I204512498"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047444184","display_name":"Xiaoniu Yang","orcid":"https://orcid.org/0000-0003-3117-2211"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoniu Yang","raw_affiliation_strings":["Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China","Science and Technology on Communication Information Security Control Laboratory, Jiaxing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]},{"raw_affiliation_string":"Science and Technology on Communication Information Security Control Laboratory, Jiaxing, China","institution_ids":["https://openalex.org/I4210160629"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5076938763"],"corresponding_institution_ids":["https://openalex.org/I55712492"],"apc_list":null,"apc_paid":null,"fwci":4.3104,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.9352406,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"11","issue":"12","first_page":"2580","last_page":"2584"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7428019642829895},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.7018537521362305},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6843699216842651},{"id":"https://openalex.org/keywords/noma","display_name":"Noma","score":0.6831094622612},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.5351734161376953},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4418148398399353},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.30850204825401306},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2826090157032013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20901980996131897},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17794126272201538},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.12908825278282166},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10618188977241516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7428019642829895},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.7018537521362305},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6843699216842651},{"id":"https://openalex.org/C2775918612","wikidata":"https://www.wikidata.org/wiki/Q994794","display_name":"Noma","level":3,"score":0.6831094622612},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.5351734161376953},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4418148398399353},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.30850204825401306},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2826090157032013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20901980996131897},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17794126272201538},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.12908825278282166},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10618188977241516}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lwc.2022.3210144","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2022.3210144","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2043673203","display_name":null,"funder_award_id":"LR17F010002","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"},{"id":"https://openalex.org/G346397689","display_name":null,"funder_award_id":"62071431","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4305473922","display_name":null,"funder_award_id":"62072490","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4592526507","display_name":null,"funder_award_id":"62201507","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G809664999","display_name":null,"funder_award_id":"62122069","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1991264581","https://openalex.org/W2128153585","https://openalex.org/W2148622067","https://openalex.org/W2268751503","https://openalex.org/W2277419020","https://openalex.org/W2294307407","https://openalex.org/W2932145029","https://openalex.org/W2940785943","https://openalex.org/W2963117265","https://openalex.org/W2963836746","https://openalex.org/W3034730089","https://openalex.org/W3082701571","https://openalex.org/W3137515783","https://openalex.org/W3195128949","https://openalex.org/W4226020401","https://openalex.org/W4250589301","https://openalex.org/W4285305542"],"related_works":["https://openalex.org/W3030525848","https://openalex.org/W4385197910","https://openalex.org/W2340639785","https://openalex.org/W3010814398","https://openalex.org/W4385197899","https://openalex.org/W3005957545","https://openalex.org/W2076432172","https://openalex.org/W4309235375","https://openalex.org/W2887349183","https://openalex.org/W4364360709"],"abstract_inverted_index":{"With":[0],"the":[1,12,19,45,52,57,71,75,81,115,130,136,143,148,156,165],"rapid":[2],"boost":[3],"of":[4,21,63],"wireless":[5],"networks,":[6],"it":[7],"is":[8,41,122],"challenging":[9],"to":[10,43,56,69,74,79,109,114,124,141],"guarantee":[11],"secure":[13],"transmission":[14],"and":[15,60,91,135],"massive":[16],"connectivity":[17],"in":[18,51],"process":[20],"data":[22,46],"collection.":[23],"This":[24],"letter":[25],"considers":[26],"an":[27,118],"unmanned":[28],"aerial":[29],"vehicle":[30],"(UAV)-aided":[31],"non-orthogonal":[32],"multiple":[33],"access":[34],"(NOMA)":[35],"communication":[36],"network,":[37],"where":[38],"a":[39,61,101,126],"UAV":[40],"deployed":[42,68],"collect":[44],"from":[47,147],"sensing":[48],"devices":[49,65],"(SDs)":[50],"NOMA":[53],"manner":[54],"subject":[55],"eavesdropping":[58],"attack,":[59],"group":[62],"auxiliary":[64],"(ADs)":[66],"are":[67,139],"provide":[70],"cooperative":[72],"jamming":[73],"eavesdropper.":[76],"We":[77,95],"aim":[78],"maximize":[80],"total":[82],"secrecy":[83],"throughput":[84],"by":[85],"jointly":[86],"optimizing":[87],"SDs\u2019":[88],"transmit":[89],"power":[90],"ADs\u2019":[92],"scheduling":[93],"decisions.":[94],"first":[96],"formulate":[97],"this":[98],"problem":[99],"as":[100],"mixed-integer":[102],"non-convex":[103],"optimization":[104,120,149],"problem,":[105,150],"which":[106],"turns":[107],"out":[108],"be":[110],"mathematically":[111],"intractable":[112],"due":[113],"non-convexity.":[116],"Then,":[117],"alternative":[119],"algorithm":[121,158],"developed":[123],"find":[125],"suboptimal":[127],"solution.":[128],"Specifically,":[129],"successive":[131],"convex":[132],"approximation":[133],"approach":[134],"cross-entropy":[137],"technique":[138],"used":[140],"solve":[142],"two":[144],"sub-problems":[145],"decomposed":[146],"respectively.":[151],"Numerical":[152],"results":[153],"demonstrate":[154],"that":[155],"proposed":[157],"can":[159],"achieve":[160],"considerable":[161],"performance":[162],"compared":[163],"with":[164],"benchmark":[166],"schemes.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
