{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:34Z","timestamp":1740123694043,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11036-023-02130-w","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T02:02:00Z","timestamp":1684893720000},"page":"1197-1205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Robust 3D Beamforming for Secure UAV Communications by DAE"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2273-3534","authenticated-orcid":false,"given":"Cuong","family":"Pham-Quoc","sequence":"first","affiliation":[]},{"given":"Vien","family":"Nguyen-Duy-Nhat","sequence":"additional","affiliation":[]},{"given":"Mai T. P.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Hung","family":"Nguyen-Le","sequence":"additional","affiliation":[]},{"given":"Chien","family":"Tang-Tan","sequence":"additional","affiliation":[]},{"given":"Tuan","family":"Tang-Anh","sequence":"additional","affiliation":[]},{"given":"Nghia","family":"Nguyen-Xuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,24]]},"reference":[{"key":"2130_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.cja.2021.04.025","volume":"35","author":"X Jiang","year":"2022","unstructured":"Jiang X, Sheng M, Zhao N, Xing C, Lu W, Wang X (2022) Green UAV communications for 6G: A survey. Chin J Aeronaut 35:19\u201334. https:\/\/doi.org\/10.1016\/j.cja.2021.04.025","journal-title":"Chin J Aeronaut"},{"key":"2130_CR2","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1109\/LWC.2019.2895597","volume":"8","author":"L Zhu","year":"2019","unstructured":"Zhu L, Zhang J, Xiao Z, Cao X, Wu DO, Xia X-G (2019) 3-D Beamforming for flexible coverage in millimeter-wave UAV communications. IEEE Wirel Commun Lett 8:837\u2013840. https:\/\/doi.org\/10.1109\/LWC.2019.2895597","journal-title":"IEEE Wirel Commun Lett"},{"key":"2130_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MWC.001.1900045","volume":"26","author":"H-M Wang","year":"2019","unstructured":"Wang H-M, Zhang X (2019) Jiang, Jia-Cheng: UAV-involved wireless physical-layer secure communications: overview and research directions. IEEE Wirel Commun 26:32\u201339. https:\/\/doi.org\/10.1109\/MWC.001.1900045","journal-title":"IEEE Wirel Commun"},{"key":"2130_CR4","doi-asserted-by":"publisher","first-page":"3954","DOI":"10.1109\/TVT.2020.2971520","volume":"69","author":"L Zhu","year":"2020","unstructured":"Zhu L, Zhang J, Xiao Z, Cao X, Wu DO, Xia X-G (2020) Energy-efficient and secure air-to-ground communication with jittering UAV. IEEE Trans Veh Technol 69:3954\u20133967. https:\/\/doi.org\/10.1109\/TVT.2020.2971520","journal-title":"IEEE Trans Veh Technol"},{"key":"2130_CR5","doi-asserted-by":"publisher","first-page":"10061","DOI":"10.1109\/JIOT.2021.3118079","volume":"9","author":"T Li","year":"2022","unstructured":"Li T, Zhang J, Obaidat MS, Lin C, Lin Y, Shen Y, Ma J (2022) Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J 9:10061\u201310076. https:\/\/doi.org\/10.1109\/JIOT.2021.3118079","journal-title":"IEEE Internet Things J"},{"key":"2130_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MWC.001.1900028","volume":"26","author":"X Sun","year":"2019","unstructured":"Sun X, Ng DWK, Ding Z, Xu Y, Zhong Z (2019) Physical layer security in UAV systems: Challenges and opportunities. IEEE Wirel Commun 26:40\u201347. https:\/\/doi.org\/10.1109\/MWC.001.1900028","journal-title":"IEEE Wirel Commun"},{"key":"2130_CR7","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/LWC.2019.2953725","volume":"9","author":"Y Li","year":"2020","unstructured":"Li Y, Zhang R, Zhang J, Yang L (2020) Cooperative jamming via spectrum sharing for secure UAV communications. IEEE Wirel Commun Lett 9:326\u2013330. https:\/\/doi.org\/10.1109\/LWC.2019.2953725","journal-title":"IEEE Wirel Commun Lett"},{"key":"2130_CR8","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/COMST.2021.3124512","volume":"24","author":"Z Xiao","year":"2022","unstructured":"Xiao Z, Zhu L, Liu Y, Yi P, Zhang R, Xia X-G, Schober R (2022) A survey on millimeter-wave beamforming enabled UAV communications and networking. IEEE Commun Surv Tutor 24:557\u2013610. https:\/\/doi.org\/10.1109\/COMST.2021.3124512","journal-title":"IEEE Commun Surv Tutor"},{"key":"2130_CR9","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti A, Wornell GW (2010) Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Trans Inf Theory 56:3088\u20133104. https:\/\/doi.org\/10.1109\/TIT.2010.2048445","journal-title":"IEEE Trans Inf Theory"},{"key":"2130_CR10","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1109\/LWC.2021.3075996","volume":"10","author":"R Dong","year":"2021","unstructured":"Dong R, Wang B, Cao K (2021) Deep learning driven 3D robust beamforming for secure communication of UAV systems. IEEE Wirel Commun Lett 10:1643\u20131647. https:\/\/doi.org\/10.1109\/LWC.2021.3075996","journal-title":"IEEE Wirel Commun Lett"},{"key":"2130_CR11","doi-asserted-by":"publisher","unstructured":"Morocho-Cayamcela ME, Njoku JN, Park J, Lim W (2020) Learning to communicate with autoencoders: Rethinking wireless systems with deep learning. In: 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE, Japan, pp. 308\u2013311. https:\/\/doi.org\/10.1109\/ICAIIC48513.2020.9065246","DOI":"10.1109\/ICAIIC48513.2020.9065246"},{"key":"2130_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MWC.001.1900292","volume":"27","author":"C-X Wang","year":"2020","unstructured":"Wang C-X, Renzo MD, Stanczak S, Wang S, Larsson EG (2020) Artificial intelligence enabled wireless networking for 5G and beyond: Recent advances and future challenges. IEEE Wirel Commun 27:16\u201323. https:\/\/doi.org\/10.1109\/MWC.001.1900292","journal-title":"IEEE Wirel Commun"},{"key":"2130_CR13","doi-asserted-by":"publisher","unstructured":"Iliev TB, Ivanova EP, Stoyanov IS, Mihaylov GY, Beloev IH (2021) Artificial intelligence in wireless communications - evolution towards 6G mobile networks. In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE, Croatia, pp. 432\u2013437. https:\/\/doi.org\/10.23919\/MIPRO52101.2021.9597147","DOI":"10.23919\/MIPRO52101.2021.9597147"},{"key":"2130_CR14","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/COMST.2020.3024783","volume":"23","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, Cheng P, Ding M, Lopez-Perez D, Pathirana PN, Li J, Seneviratne A, Li Y, Poor HV (2021) Artificial intelligence enabled wireless networking for 5G and beyond: Recent advances and future challenges. IEEE Commun Surv Tutor 23:553\u2013595. https:\/\/doi.org\/10.1109\/COMST.2020.3024783","journal-title":"IEEE Commun Surv Tutor"},{"key":"2130_CR15","doi-asserted-by":"publisher","first-page":"4144","DOI":"10.1109\/TCOMM.2021.3063236","volume":"69","author":"L Wei","year":"2021","unstructured":"Wei L, Huang C, Alexandropoulos GC, Yuen C, Zhang Z, Debbah M (2021) Channel estimation for RIS-empowered multi-user MISO wireless communications. IEEE Trans Commun 69:4144\u20134157. https:\/\/doi.org\/10.1109\/TCOMM.2021.3063236","journal-title":"IEEE Trans Commun"},{"key":"2130_CR16","doi-asserted-by":"publisher","unstructured":"Vincent P, Hugo Larochelle YB, Manzagol PA (2008) Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th international conference on machine learning, Finland, pp. 1096\u20131103. https:\/\/doi.org\/10.1145\/1390156.1390294","DOI":"10.1145\/1390156.1390294"},{"key":"2130_CR17","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MGRS.2018.2853555","volume":"6","author":"G Dong","year":"2018","unstructured":"Dong G, Liao G, Liu H, Kuang G (2018) A review of the autoencoder and its variants: A comparative perspective from target recognition in synthetic-aperture radar images. IEEE Geosci Remote Sens Mag 6:44\u201368. https:\/\/doi.org\/10.1109\/MGRS.2018.2853555","journal-title":"IEEE Geosci Remote Sens Mag"},{"key":"2130_CR18","unstructured":"Djork-Arn\u00b4e Clevert TU, Hochreiter S (2015) Fast and accurate deep network learning by exponential linear units (ELUs). In: Proceedings of the international conference on learning representations 2016, Puerto Rico, pp. 1\u201314. arXiv preprint arXiv:1511.07289"},{"key":"2130_CR19","doi-asserted-by":"publisher","unstructured":"Deepa N (2021) A novel intervention method for aspect-based emotion using exponential linear unit (ELU) activation function in a deep neural network. In: 2021 5th international conference on intelligent computing and control systems (ICICCS), pp. 1671\u20131675. IEEE, India. https:\/\/doi.org\/10.1109\/ICICCS51141.2021.9432223","DOI":"10.1109\/ICICCS51141.2021.9432223"},{"key":"2130_CR20","doi-asserted-by":"publisher","unstructured":"Urolagin S, Prema KV, Reddy NVS (2011) Generalization capability of artificial neural network incorporated with pruning method. Proceedings of The 2011 international conference on advanced computing, networking and security. Springer, India, pp. 171\u2013178. https:\/\/doi.org\/10.1109\/CISCE52179.2021.9445927","DOI":"10.1109\/CISCE52179.2021.9445927"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02130-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02130-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02130-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T14:50:39Z","timestamp":1714747839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02130-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,24]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2130"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02130-w","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2023,5,24]]},"assertion":[{"value":"27 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}