{"id":"https://openalex.org/W7124456870","doi":"https://doi.org/10.1109/twc.2026.3652312","title":"Channel Inversion Power Control-Aided Multi-User Secret and Covert UAV Communications","display_name":"Channel Inversion Power Control-Aided Multi-User Secret and Covert UAV Communications","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124456870","doi":"https://doi.org/10.1109/twc.2026.3652312"},"language":null,"primary_location":{"id":"doi:10.1109/twc.2026.3652312","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2026.3652312","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111339798","display_name":"Yingqi He","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingqi He","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024692622","display_name":"Jinpeng Xu","orcid":"https://orcid.org/0000-0002-6406-6813"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinpeng Xu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058899630","display_name":"Lin Zhou","orcid":"https://orcid.org/0000-0003-4318-5132"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Zhou","raw_affiliation_strings":["School of Automation and Intelligent Manufacturing, Southern University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Automation and Intelligent Manufacturing, Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123235676","display_name":"Jingjing Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingjing Wang","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123207835","display_name":"Chunxiao Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunxiao Jiang","raw_affiliation_strings":["Tsinghua Space Center, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua Space Center, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111339798"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11816496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":null,"first_page":"11002","last_page":"11018"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.8842999935150146,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.8842999935150146,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.04839999973773956,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.010400000028312206,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.6151000261306763},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6115999817848206},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.5371999740600586},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.5360000133514404},{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.5212000012397766},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5120999813079834},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5070000290870667},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4269999861717224},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.4023999869823456},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.382999986410141}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8116999864578247},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.6151000261306763},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6115999817848206},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.5371999740600586},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.5360000133514404},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.5212000012397766},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5120999813079834},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5070000290870667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4300000071525574},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4269999861717224},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.4023999869823456},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.382999986410141},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3716999888420105},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.3643999993801117},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.36250001192092896},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.3569999933242798},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35359999537467957},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3402000069618225},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.3402000069618225},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3334999978542328},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.31769999861717224},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.3107999861240387},{"id":"https://openalex.org/C96608239","wikidata":"https://www.wikidata.org/wiki/Q1199823","display_name":"Statistical power","level":2,"score":0.3034000098705292},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2831999957561493},{"id":"https://openalex.org/C118437007","wikidata":"https://www.wikidata.org/wiki/Q1017139","display_name":"Hybrid automatic repeat request","level":3,"score":0.26809999346733093},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C56685638","wikidata":"https://www.wikidata.org/wiki/Q2300474","display_name":"Power control","level":3,"score":0.25380000472068787},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.2526000142097473},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/twc.2026.3652312","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2026.3652312","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W581334404","https://openalex.org/W1870509456","https://openalex.org/W2043769961","https://openalex.org/W2098346479","https://openalex.org/W2109394932","https://openalex.org/W2268751503","https://openalex.org/W2466299575","https://openalex.org/W2558778358","https://openalex.org/W2802614201","https://openalex.org/W2893082680","https://openalex.org/W2903188535","https://openalex.org/W2905487115","https://openalex.org/W2912917423","https://openalex.org/W2944398350","https://openalex.org/W2962792015","https://openalex.org/W2982282313","https://openalex.org/W2987093331","https://openalex.org/W3025456008","https://openalex.org/W3092473865","https://openalex.org/W3105644655","https://openalex.org/W3117613361","https://openalex.org/W3125553008","https://openalex.org/W3157007851","https://openalex.org/W3166879908","https://openalex.org/W3168495756","https://openalex.org/W3193940080","https://openalex.org/W4210934214","https://openalex.org/W4214903087","https://openalex.org/W4226365550","https://openalex.org/W4226478636","https://openalex.org/W4296924472","https://openalex.org/W4302440885","https://openalex.org/W4309757311","https://openalex.org/W4312843593","https://openalex.org/W4318823904","https://openalex.org/W4320001217","https://openalex.org/W4323896844","https://openalex.org/W4362500847","https://openalex.org/W4367663106","https://openalex.org/W4387490191","https://openalex.org/W4390604386","https://openalex.org/W4392939660","https://openalex.org/W4399311056","https://openalex.org/W4399399400","https://openalex.org/W4402673610","https://openalex.org/W4402742622","https://openalex.org/W4402811367","https://openalex.org/W4402835603","https://openalex.org/W4403126120","https://openalex.org/W4405178976","https://openalex.org/W4405895891","https://openalex.org/W4408564433","https://openalex.org/W4408790474","https://openalex.org/W4414169596"],"related_works":[],"abstract_inverted_index":{"To":[0,89,169],"satisfy":[1],"diverse":[2],"security":[3,95],"requirements":[4],"of":[5,96,106,135,164,174,212,259,299],"ground":[6,44,218],"users":[7,46],"in":[8,54,183,191],"unmanned":[9],"aerial":[10],"vehicle":[11],"(UAV)":[12],"networks,":[13],"we":[14,101,179,196,227,244,280],"propose":[15,281],"a":[16,60,232,289],"channel":[17,127,146],"inversion":[18],"power":[19],"control":[20],"(CIPC)":[21],"aided":[22],"multi-user":[23],"collaborative":[24],"secret":[25,57,61,97,108],"and":[26,65,81,94,98,120,151,167,186,222,231,267,307],"covert":[27,45,52,99,116,207,253],"uplink":[28],"transmission":[29,177,220],"strategy":[30],"for":[31,132],"UAV":[32,69,188,194,242],"secure":[33],"communication.":[34],"Specifically,":[35],"using":[36,273],"the":[37,55,68,91,107,133,136,144,149,156,161,171,175,181,192,203,223,236,240,251,257,268,274,297,303],"non-orthogonal":[38],"multiple":[39,43],"access":[40],"(NOMA)":[41],"technology,":[42],"named":[47,63,70],"Carlo,":[48],"hide":[49],"their":[50],"weak":[51],"signals":[53],"strong":[56],"signal":[58],"from":[59],"user":[62,265],"Bob,":[64],"transmit":[66],"to":[67,76,201,210,235,249,256,287],"Alice.":[71],"An":[72],"adversary":[73],"Willie":[74],"attempts":[75],"eavesdrop":[77],"Bob\u2019s":[78],"confidential":[79],"message":[80],"detect":[82],"whether":[83],"Carlo":[84],"is":[85],"transmitting":[86],"or":[87],"not.":[88],"evaluate":[90],"link":[92],"reliability":[93],"transmissions,":[100],"first":[102],"derive":[103],"closed-form":[104],"expressions":[105],"connection":[109,117],"probability":[110,114,118,123],"(SCP),":[111],"secrecy":[112],"outage":[113],"(SOP),":[115],"(CCP),":[119],"detection":[121],"error":[122],"(DEP)":[124],"under":[125],"perfect":[126],"state":[128],"information":[129],"while":[130],"accounting":[131],"uncertainty":[134,147],"adversary\u2019s":[137],"noise":[138],"power.":[139],"We":[140],"then":[141],"further":[142],"incorporate":[143],"legitimate-link":[145],"into":[148],"analysis":[150],"characterize":[152,170],"its":[153],"impact":[154],"on":[155,302],"key":[157,300],"performance":[158,182],"metrics,":[159],"particularly":[160],"average":[162,204,252],"values":[163],"SCP,":[165,213,260],"SOP,":[166,214,261],"CCP.":[168],"theoretical":[172],"benchmark":[173],"proposed":[176],"strategy,":[178],"investigate":[180],"both":[184],"rotary-wing":[185,193],"fixed-wing":[187,241],"scenarios.":[189],"Particularly,":[190],"scenario,":[195,243],"formulate":[197,245],"an":[198,229,246,282],"optimization":[199,237,247,284],"problem":[200,248],"maximize":[202,250],"effective":[205],"sum":[206],"rate":[208,254],"subject":[209,255],"constraints":[211,258],"DEP,":[215,262],"CIPC":[216,263],"parameter,":[217,264],"user\u2019s":[219],"power,":[221],"UAV\u2019s":[224,269],"altitude.":[225],"Subsequently,":[226],"provide":[228],"optimal":[230],"sub-optimal":[233],"solution":[234],"problem.":[238],"In":[239],"scheduling,":[266],"flight":[270],"parameters.":[271],"Furthermore,":[272],"successive":[275],"convex":[276],"approximation":[277],"(SCA)":[278],"method,":[279],"alternating":[283],"(AO)":[285],"algorithm":[286],"obtain":[288],"high-quality":[290],"feasible":[291],"solution.":[292],"Finally,":[293],"our":[294],"results":[295],"reveal":[296],"influence":[298],"parameters":[301],"system":[304],"performance,":[305],"analytically":[306],"numerically.":[308]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-17T00:00:00"}
