{"id":"https://openalex.org/W7140295448","doi":"https://doi.org/10.1109/tcomm.2026.3677390","title":"Secure Control Information Transmission via RSMA for Low-Altitude Economy Networks","display_name":"Secure Control Information Transmission via RSMA for Low-Altitude Economy Networks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7140295448","doi":"https://doi.org/10.1109/tcomm.2026.3677390"},"language":null,"primary_location":{"id":"doi:10.1109/tcomm.2026.3677390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2026.3677390","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130627439","display_name":"Zhaoxin Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhaoxin Feng","raw_affiliation_strings":["School of Information and Communication Engineering, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034628707","display_name":"Huabing Lu","orcid":"https://orcid.org/0000-0003-4782-6662"},"institutions":[{"id":"https://openalex.org/I141649914","display_name":"Nanchang University","ror":"https://ror.org/042v6xz23","country_code":"CN","type":"education","lineage":["https://openalex.org/I141649914"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huabing Lu","raw_affiliation_strings":["School of Information Engineering, Jiangxi Provincial Key Laboratory of Advanced Signal Processing and Intelligent Communications, Nanchang University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Jiangxi Provincial Key Laboratory of Advanced Signal Processing and Intelligent Communications, Nanchang University, Nanchang, China","institution_ids":["https://openalex.org/I141649914"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130552733","display_name":"Weidang Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weidang Lu","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089852268","display_name":"Zhaoyuan Shi","orcid":"https://orcid.org/0000-0002-6840-3477"},"institutions":[{"id":"https://openalex.org/I46482218","display_name":"Anqing Normal University","ror":"https://ror.org/0127ytz78","country_code":"CN","type":"education","lineage":["https://openalex.org/I46482218"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoyuan Shi","raw_affiliation_strings":["School of Computer and Information, Anqing Normal University, Anqing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anqing Normal University, Anqing, China","institution_ids":["https://openalex.org/I46482218"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130629708","display_name":"Nan Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Zhao","raw_affiliation_strings":["School of Information and Communication Engineering, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130580628","display_name":"Dusit Niyato","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5130627439"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79852198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"74","issue":null,"first_page":"6750","last_page":"6763"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.11649999767541885,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.11649999767541885,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.04230000078678131,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.04019999876618385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-transmission","display_name":"Information transmission","score":0.4837000072002411},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.477400004863739},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.45660001039505005},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.34540000557899475},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.3273000121116638},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.3122999966144562},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.310699999332428},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31029999256134033}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6082000136375427},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5752000212669373},{"id":"https://openalex.org/C2983568541","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Information transmission","level":2,"score":0.4837000072002411},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.477400004863739},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.45660001039505005},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.34540000557899475},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.3273000121116638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31380000710487366},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.31360000371932983},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30570000410079956},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2912999987602234},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.28380000591278076},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.28110000491142273},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26980000734329224},{"id":"https://openalex.org/C113508815","wikidata":"https://www.wikidata.org/wiki/Q193446","display_name":"Packet switching","level":3,"score":0.2660999894142151},{"id":"https://openalex.org/C51675839","wikidata":"https://www.wikidata.org/wiki/Q1665681","display_name":"Intelligent Network","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C2983848023","wikidata":"https://www.wikidata.org/wiki/Q733553","display_name":"Transmission channel","level":3,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcomm.2026.3677390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2026.3677390","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6634784936904907,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[{"id":"https://openalex.org/G114366460","display_name":null,"funder_award_id":"CSTB2025NSCQ-GPX0466","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G1320095198","display_name":null,"funder_award_id":"62371086","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4514045054","display_name":null,"funder_award_id":"20244BAB28002","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"},{"id":"https://openalex.org/G6063619178","display_name":null,"funder_award_id":"62371087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7407307467","display_name":null,"funder_award_id":"2308085QF198","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322665","display_name":"Natural Science Foundation of Jiangxi Province","ror":null},{"id":"https://openalex.org/F4320323172","display_name":"Natural Science Foundation of Chongqing","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1],"vehicles":[2],"(UAVs)":[3],"have":[4],"been":[5],"applied":[6],"to":[7,28,156,170,181],"various":[8],"tasks":[9],"in":[10,58,104],"the":[11,16,29,36,41,48,63,80,90,119,123,135,140,147,158,164,189,192,195,198],"low-altitude":[12],"economy":[13],"(LAE)":[14],"with":[15,79],"advantages":[17],"of":[18,32,39,43,66,82,92,122,191,197],"high":[19],"mobility,":[20],"low":[21],"costs,":[22],"and":[23,35,47,55,88,99,113,134,166,194],"flexible":[24],"deployment.":[25],"However,":[26],"due":[27],"broadcast":[30],"nature":[31],"wireless":[33],"channels":[34],"increasing":[37],"number":[38],"UAVs,":[40],"security":[42],"UAV":[44,67],"control":[45,69],"information":[46,70,97],"spectrum":[49],"resource":[50],"utilization":[51],"face":[52],"significant":[53],"challenges":[54],"threats.":[56],"Therefore,":[57],"this":[59,183],"paper,":[60],"we":[61,86],"investigate":[62],"secrecy":[64,126],"performance":[65],"short-packet":[68],"transmission":[71],"networks":[72],"based":[73],"on":[74],"rate-splitting":[75],"multiple":[76,83],"access":[77],"(RSMA)":[78],"presence":[81],"eavesdroppers.":[84],"Moreover,":[85],"consider":[87],"analyze":[89],"impacts":[91],"both":[93,110],"imperfect":[94],"channel":[95],"state":[96],"(CSI)":[98],"successive":[100],"interference":[101],"cancellation":[102],"(SIC)":[103],"a":[105],"more":[106],"realistic":[107],"scenario.":[108],"Considering":[109,138],"large-scale":[111],"fading":[112],"Nakagami-<italic":[114],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">m</i>":[116],"small-scale":[117],"fading,":[118],"closed-form":[120],"expression":[121],"average":[124],"effective":[125],"sum":[127],"rate":[128,160],"is":[129,154,179],"derived":[130],"utilizing":[131],"stochastic":[132],"geometry":[133],"Gauss-Chebyshev":[136],"quadrature.":[137],"that":[139],"private":[141],"stream":[142],"can":[143],"be":[144],"concealed":[145],"within":[146],"high-power":[148],"common":[149,159],"stream,":[150],"an":[151],"optimization":[152],"problem":[153],"formulated":[155],"maximize":[157],"by":[161],"jointly":[162],"optimizing":[163],"blocklength":[165],"power":[167],"allocation":[168],"coefficients":[169],"enhance":[171],"security.":[172],"The":[173],"block":[174],"coordinate":[175],"descent":[176],"(BCD)":[177],"algorithm":[178],"adopted":[180],"solve":[182],"problem.":[184],"Finally,":[185],"simulation":[186],"results":[187],"demonstrate":[188],"accuracy":[190],"analysis":[193],"effectiveness":[196],"proposed":[199],"scheme.":[200]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-03-26T00:00:00"}
