{"id":"https://openalex.org/W4402436188","doi":"https://doi.org/10.1109/twc.2024.3454073","title":"UAV-Enabled Semantic Communication in Mobile Edge Computing Under Jamming Attacks: An Intelligent Resource Management Approach","display_name":"UAV-Enabled Semantic Communication in Mobile Edge Computing Under Jamming Attacks: An Intelligent Resource Management Approach","publication_year":2024,"publication_date":"2024-09-11","ids":{"openalex":"https://openalex.org/W4402436188","doi":"https://doi.org/10.1109/twc.2024.3454073"},"language":"en","primary_location":{"id":"doi:10.1109/twc.2024.3454073","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2024.3454073","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102908206","display_name":"Shuai Liu","orcid":"https://orcid.org/0000-0001-7178-5608"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuai Liu","raw_affiliation_strings":["School of Informatics and the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Xiamen University, Xiamen, China","School of Informatics, China"],"affiliations":[{"raw_affiliation_string":"School of Informatics and the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"School of Informatics, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013729643","display_name":"Helin Yang","orcid":"https://orcid.org/0000-0001-9697-7470"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Helin Yang","raw_affiliation_strings":["School of Informatics, the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, and the Institute of Artificial Intelligence, Xiamen University, Xiamen, China","School of Informatics, China"],"affiliations":[{"raw_affiliation_string":"School of Informatics, the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, and the Institute of Artificial Intelligence, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"School of Informatics, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114928825","display_name":"Mengting Zheng","orcid":"https://orcid.org/0009-0007-7860-6888"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengting Zheng","raw_affiliation_strings":["School of Informatics and the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Xiamen University, Xiamen, China","School of Informatics, China"],"affiliations":[{"raw_affiliation_string":"School of Informatics and the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"School of Informatics, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068976123","display_name":"Liang Xiao","orcid":"https://orcid.org/0000-0003-2402-611X"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Xiao","raw_affiliation_strings":["School of Informatics, the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, and the Institute of Artificial Intelligence, Xiamen University, Xiamen, China","School of Informatics, China"],"affiliations":[{"raw_affiliation_string":"School of Informatics, the Key Laboratory of Multimedia Trusted Perception and Efficient Computing, and the Institute of Artificial Intelligence, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"School of Informatics, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005327587","display_name":"Zehui Xiong","orcid":"https://orcid.org/0000-0002-4440-941X"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Zehui Xiong","raw_affiliation_strings":["Singapore University of Technology and Design, Tampines, Singapore","Pillar of Information Systems Technology and Design, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design, Tampines, Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"Pillar of Information Systems Technology and Design, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091266202","display_name":"Dusit Niyato","orcid":"https://orcid.org/0000-0002-7442-7416"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102908206"],"corresponding_institution_ids":["https://openalex.org/I191208505"],"apc_list":null,"apc_paid":null,"fwci":23.3924,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.99338776,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"23","issue":"11","first_page":"17493","last_page":"17507"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9503999948501587,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9503999948501587,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8170022964477539},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.6600059270858765},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.5311217308044434},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4915367066860199},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.47492820024490356},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45972272753715515},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4273306727409363},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.41316473484039307},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.41247260570526123},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3564608693122864},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.3190992474555969},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.29663658142089844}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8170022964477539},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.6600059270858765},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.5311217308044434},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4915367066860199},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.47492820024490356},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45972272753715515},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4273306727409363},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.41316473484039307},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.41247260570526123},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3564608693122864},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.3190992474555969},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.29663658142089844},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/twc.2024.3454073","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2024.3454073","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W2782363571","https://openalex.org/W2962814013","https://openalex.org/W2964052915","https://openalex.org/W2981262799","https://openalex.org/W2982035226","https://openalex.org/W3013960924","https://openalex.org/W3036851434","https://openalex.org/W3040914594","https://openalex.org/W3041971333","https://openalex.org/W3089147436","https://openalex.org/W3108863254","https://openalex.org/W3162720533","https://openalex.org/W3166791908","https://openalex.org/W3172347396","https://openalex.org/W3215554746","https://openalex.org/W4225009676","https://openalex.org/W4226249635","https://openalex.org/W4285131538","https://openalex.org/W4285742007","https://openalex.org/W4287218656","https://openalex.org/W4288062306","https://openalex.org/W4292265648","https://openalex.org/W4293173843","https://openalex.org/W4312766166","https://openalex.org/W4312913871","https://openalex.org/W4312924812","https://openalex.org/W4313053130","https://openalex.org/W4313189740","https://openalex.org/W4313449066","https://openalex.org/W4315629738","https://openalex.org/W4317794926","https://openalex.org/W4327643814","https://openalex.org/W4384158383","https://openalex.org/W4386025745","https://openalex.org/W4386234175","https://openalex.org/W4387441444","https://openalex.org/W4387870996","https://openalex.org/W4388739236","https://openalex.org/W4392158912","https://openalex.org/W6747473740","https://openalex.org/W6749032143","https://openalex.org/W6847614662","https://openalex.org/W6851655105"],"related_works":["https://openalex.org/W3009067413","https://openalex.org/W4210272022","https://openalex.org/W1844259124","https://openalex.org/W2170939602","https://openalex.org/W1974440652","https://openalex.org/W1541175715","https://openalex.org/W565993663","https://openalex.org/W2326504464","https://openalex.org/W1729918523","https://openalex.org/W2119572658"],"abstract_inverted_index":{"The":[0],"integration":[1],"of":[2,42,69,78,85,142,163],"semantic":[3,26,61,128,149],"communication":[4,27],"with":[5,30,134],"mobile":[6],"edge":[7],"computing":[8],"(MEC)":[9],"has":[10],"emerged":[11],"as":[12],"a":[13,22,91],"prominent":[14],"research":[15,46],"area.":[16],"In":[17,109],"this":[18,79,88],"paper,":[19],"we":[20],"explore":[21],"novel":[23],"scenario":[24],"where":[25],"is":[28],"integrated":[29],"unmanned":[31],"aerial":[32],"vehicles":[33],"(UAVs)":[34],"to":[35,54,67,126,137],"enhance":[36],"MEC,":[37],"particularly":[38],"in":[39,161],"the":[40,50,76,82,111,121,135,139,155],"face":[41],"jamming":[43,86,143],"attacks.":[44],"Our":[45],"focuses":[47],"on":[48,145],"addressing":[49],"resource":[51,73,115,131],"management":[52,116],"challenge":[53],"minimize":[55,138],"task":[56,129,146,164],"completion":[57,165],"time":[58,166],"and":[59,72,81,104,124,130,148,167],"maximize":[60],"spectral":[62],"efficiency":[63],"(SSE)":[64],"while":[65],"adhering":[66],"quality":[68],"service":[70],"requirements":[71],"constraints.":[74],"Given":[75],"non-convexity":[77],"problem":[80],"dynamic":[83],"behavior":[84],"attacks,":[87],"paper":[89],"proposes":[90],"deep":[92],"reinforcement":[93],"learning":[94],"(DRL)":[95],"algorithm":[96],"by":[97],"jointly":[98],"optimizing":[99],"UAV":[100],"trajectories,":[101],"user":[102],"associations,":[103],"channel":[105],"selections":[106],"against":[107],"jamming.":[108],"detail,":[110],"proposed":[112,156],"anti-jamming":[113],"DRL-based":[114],"approach":[117,157],"can":[118],"effectively":[119],"capture":[120],"jammer\u2019s":[122],"behavior,":[123],"learn":[125],"adjust":[127],"scheduling":[132],"strategies":[133],"objective":[136],"negative":[140],"effect":[141],"attacks":[144],"offloading":[147],"communication.":[150],"Simulation":[151],"results":[152],"demonstrate":[153],"that":[154],"outperforms":[158],"baseline":[159],"algorithms":[160],"terms":[162],"total":[168],"SSE":[169],"under":[170],"different":[171],"real-world":[172],"settings.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":12}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
