{"id":"https://openalex.org/W4405601214","doi":"https://doi.org/10.1109/lwc.2024.3520596","title":"Secrecy Enhancement for AAV-Enabled Integrated Sensing and Communication Systems","display_name":"Secrecy Enhancement for AAV-Enabled Integrated Sensing and Communication Systems","publication_year":2024,"publication_date":"2024-12-19","ids":{"openalex":"https://openalex.org/W4405601214","doi":"https://doi.org/10.1109/lwc.2024.3520596"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2024.3520596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2024.3520596","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109704343","display_name":"Chaedam Son","orcid":null},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Chaedam Son","raw_affiliation_strings":["School of Electrical Engineering, KAIST, Daejeon, South Korea","School of Electrical Engineering of KAIST, Daejeon, Korea"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, KAIST, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]},{"raw_affiliation_string":"School of Electrical Engineering of KAIST, Daejeon, Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027719576","display_name":"Sang-Wook Jeong","orcid":null},"institutions":[{"id":"https://openalex.org/I124633538","display_name":"University of Seoul","ror":"https://ror.org/05en5nh73","country_code":"KR","type":"education","lineage":["https://openalex.org/I124633538"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seongah Jeong","raw_affiliation_strings":["School of Advanced Fusion Studies, University of Seoul, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Advanced Fusion Studies, University of Seoul, Seoul, South Korea","institution_ids":["https://openalex.org/I124633538"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109704343"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":null,"apc_paid":null,"fwci":5.5915,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.95672261,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"14","issue":"3","first_page":"696","last_page":"700"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.665480375289917},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4948977828025818},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.43472611904144287},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.34621185064315796},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32403653860092163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30063289403915405}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.665480375289917},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4948977828025818},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.43472611904144287},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.34621185064315796},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32403653860092163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30063289403915405}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lwc.2024.3520596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2024.3520596","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1996215314","https://openalex.org/W2043769961","https://openalex.org/W2050968963","https://openalex.org/W2178935672","https://openalex.org/W2963117265","https://openalex.org/W3206485563","https://openalex.org/W4250589301","https://openalex.org/W4322576415","https://openalex.org/W4381785965","https://openalex.org/W4382568105","https://openalex.org/W4391547700","https://openalex.org/W4395069470","https://openalex.org/W4406858344"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W99756173"],"abstract_inverted_index":{"In":[0],"this":[1],"letter,":[2],"we":[3,48],"propose":[4],"a":[5,17,21,33],"AAV-enabled":[6],"integrated":[7],"sensing":[8,30,43],"and":[9,31,45,54,66],"communication":[10],"(ISAC)":[11],"system":[12],"for":[13],"secrecy":[14,40],"enhancement,":[15],"where":[16],"full-duplex":[18],"AAV":[19,55],"with":[20,81],"uniform":[22],"planar":[23],"array":[24],"serves":[25],"multiple":[26],"ground":[27,34],"users":[28],"while":[29],"jamming":[32],"eavesdropper.":[35],"To":[36],"maximize":[37],"the":[38,51],"sum":[39],"rate":[41],"under":[42],"SINR":[44],"operational":[46],"constraints,":[47],"jointly":[49],"optimize":[50],"transceiver":[52],"beamforming":[53],"trajectory.":[56],"An":[57],"algorithmic":[58],"solution":[59],"based":[60],"on":[61],"block":[62],"coordinate":[63],"descent":[64],"(BCD)":[65],"semidefinite":[67],"programming":[68],"(SDP)":[69],"relaxation":[70],"technique":[71],"is":[72],"developed,":[73],"whose":[74],"performance":[75],"gains":[76],"are":[77],"emphasized":[78],"in":[79],"simulations":[80],"sufficient":[82],"mission":[83],"periods.":[84]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2024-12-20T00:00:00"}
