{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T16:35:24Z","timestamp":1767976524815,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11036-024-02348-2","type":"journal-article","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T07:01:56Z","timestamp":1716447716000},"page":"2275-2287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Deep Learning for Outage Probability Minimization in Secure NOMA Energy Harvesting UAV IoT Networks"],"prefix":"10.1007","volume":"28","author":[{"given":"Nguyen Quoc","family":"Long","sequence":"first","affiliation":[]},{"given":"Viet-Hung","family":"Dang","sequence":"additional","affiliation":[]},{"given":"Nhu Gia","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thanh Trong","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Tu Dac","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Hung","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Duc-Dung","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Cong Le","family":"Thanh","sequence":"additional","affiliation":[]},{"given":"Van Nhan","family":"Vo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,23]]},"reference":[{"issue":"2","key":"2348_CR1","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TWC.2022.3204438","volume":"22","author":"B Zhu","year":"2023","unstructured":"Zhu B, Bedeer E, Nguyen HH, Barton R, Gao Z (2023) UAV trajectory planning for AoI-minimal data collection in UAV-aided IoT networks by transformer. IEEE Trans Wireless Commun 22(2):1343\u20131358","journal-title":"IEEE Trans Wireless Commun"},{"issue":"1","key":"2348_CR2","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1109\/TVT.2019.2952525","volume":"69","author":"T Bao","year":"2020","unstructured":"Bao T, Yang HC, Hasna MO (2020) Secrecy performance analysis of UAV-assisted relaying communication systems. IEEE Trans Vehicular Tech 69(1):1122\u20131126","journal-title":"IEEE Trans Vehicular Tech"},{"key":"2348_CR3","doi-asserted-by":"crossref","unstructured":"Raut P, Singh K, Li CP, Alouini MS, Huang WJ (2021) Nonlinear eh-based uav-assisted fd iot networks: infinite and finite blocklength analysis. IEEE Internet Things J 8(24):17\u00a0655\u201317\u00a0668","DOI":"10.1109\/JIOT.2021.3082102"},{"key":"2348_CR4","doi-asserted-by":"crossref","unstructured":"Gong S, Wang M, Gu WZB, Hoang DT, Niyato D (2023) Bayesian optimization enhanced deep reinforcement learning for trajectory planning and network formation in multi-UAV networks. IEEE Trans Veh Techn 72(8):10\u00a0933\u201310\u00a0948","DOI":"10.1109\/TVT.2023.3262778"},{"issue":"5","key":"2348_CR5","doi-asserted-by":"publisher","first-page":"4101","DOI":"10.1109\/TAES.2022.3158640","volume":"58","author":"T Wigren","year":"2022","unstructured":"Wigren T, Yasini S (2022) Passive UAV tracking in wireless networks. IEEE Trans Aerospace Electron Syst 58(5):4101\u20134118","journal-title":"IEEE Trans Aerospace Electron Syst"},{"issue":"3","key":"2348_CR6","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TNET.2020.2979807","volume":"28","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Lan X, Ren J, Cai L (2020) Efficient computing resource sharing for mobile edge-cloud computing networks. IEEE\/ACM Trans Netw 28(3):1227\u20131240","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"2348_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MWC.2018.1800160","volume":"26","author":"N Zhao","year":"2019","unstructured":"Zhao N, Lu W, Sheng M, Chen Y, Tang J, Yu FR, Wong K-K (2019) Uav-assisted emergency networks in disasters. IEEE Wireless Commun 26(1):45\u201351","journal-title":"IEEE Wireless Commun"},{"issue":"7","key":"2348_CR8","doi-asserted-by":"publisher","first-page":"7644","DOI":"10.1109\/JSEN.2023.3247436","volume":"23","author":"H Xiao","year":"2023","unstructured":"Xiao H, Wu C, Jiang H, Deng LP, Luo Y, Zhang QY (2023) Energy-efficient resource allocation in multiple uavs-assisted energy harvesting-powered two-hop cognitive radio network. IEEE Sens J 23(7):7644\u20137655","journal-title":"IEEE Sens J"},{"issue":"6","key":"2348_CR9","doi-asserted-by":"publisher","first-page":"4464","DOI":"10.1109\/TWC.2021.3130404","volume":"21","author":"R Jiang","year":"2022","unstructured":"Jiang R, Xiong K, Yang HC, Fan P, Zhong Z, Letaief KB (2022) On the coverage of UAV-assisted SWIPT networks with nonlinear EH model. IEEE Trans Wireless Commun 21(6):4464\u20134481","journal-title":"IEEE Trans Wireless Commun"},{"issue":"5","key":"2348_CR10","doi-asserted-by":"publisher","first-page":"3542","DOI":"10.1109\/TCOMM.2022.3162249","volume":"70","author":"N Agrawal","year":"2022","unstructured":"Agrawal N, Bansal A, Singh K, Li CP, Mumtaz S (2022) Finite block length analysis of RIS-assisted UAV-based multiuser IoT communication system with non-linear EH. IEEE Trans Commun 70(5):3542\u20133557","journal-title":"IEEE Trans Commun"},{"key":"2348_CR11","doi-asserted-by":"crossref","unstructured":"Hoang TM, Dung LT, Nguyen BC, Vinh NV, Kim T (2023) BLER and throughput analysis of power beacon-based energy harvesting UAV-assisted NOMA relay systems for short-packet communications. IEEE Access 11:105\u00a0115\u2013105\u00a0129","DOI":"10.1109\/ACCESS.2023.3316716"},{"key":"2348_CR12","doi-asserted-by":"crossref","unstructured":"Arafat N, Maher EA, El-Mahdy A, Dressler F (2023) Performance of large intelligent surfaces in multiuser millimeter wave MIMO-NOMA systems. IEEE Access 11:142\u00a0235\u2013142\u00a0247","DOI":"10.1109\/ACCESS.2023.3341973"},{"issue":"3","key":"2348_CR13","doi-asserted-by":"publisher","first-page":"2633","DOI":"10.1109\/TAES.2022.3217025","volume":"59","author":"TM Hoang","year":"2023","unstructured":"Hoang TM, Dung LT, Nguyen BC, Kim T (2023) Outage and throughput analysis of UAV-assisted NOMA relay systems with indoor and outdoor users. IEEE Trans Aerospace Electron Syst 59(3):2633\u20132647","journal-title":"IEEE Trans Aerospace Electron Syst"},{"key":"2348_CR14","unstructured":"Nasir AA, Tuan HD, Duong TQ, Poor HV (2018) UAV-enabled communication using NOMA. pp 1\u201326, Jun. 2018. [Online]. Available: arXiv:1806.03604v1"},{"key":"2348_CR15","doi-asserted-by":"crossref","unstructured":"Lei H, Yang F, Ansari IS, Liu H, Kim KJ, Tsiftsis TA (2023) Secrecy outage performance analysis for uplink CR-NOMA systems with hybrid SIC. IEEE Internet Things J 10(15):13\u00a0181\u201313\u00a0195","DOI":"10.1109\/JIOT.2023.3261308"},{"key":"2348_CR16","doi-asserted-by":"crossref","unstructured":"SP et\u00a0al (2023) Physical layer security for NOMA systems: requirements, issues, and recommendations. IEEE Internet Things J 10(24):21\u00a0721\u201321\u00a0737","DOI":"10.1109\/JIOT.2023.3296319"},{"issue":"11","key":"2348_CR17","doi-asserted-by":"publisher","first-page":"3026","DOI":"10.1109\/TIFS.2019.2912074","volume":"14","author":"J Tang","year":"2019","unstructured":"Tang J, Chen G, Coon J (2019) Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers. IEEE Trans Inf Forensics Secur 14(11):3026\u20133041","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2348_CR18","doi-asserted-by":"crossref","unstructured":"Sun X, Ng DWK, Ding Z, Xu Y, Zhong Z (2019) Physical layer security in UAV systems: challenges and opportunities. IEEE Wireless Commun 26(5):40\u201347","DOI":"10.1109\/MWC.001.1900028"},{"key":"2348_CR19","doi-asserted-by":"crossref","unstructured":"Wu Q, Mei W, Zhang R (2019) Safeguarding wireless network with UAVs: a physical layer security perspective. IEEE Wireless Commun 26(5):12\u201318","DOI":"10.1109\/MWC.001.1900050"},{"key":"2348_CR20","doi-asserted-by":"crossref","unstructured":"Van NV, Tran H, Dang VH, Niyato D, Cuong DN, Luong NC, So-In C (2023) Outage probability minimization in secure noma cognitive radio systems with uav relay: a machine learning approach. IEEE Trans Cognit Commun Netw 9(2):435\u2013451","DOI":"10.1109\/TCCN.2022.3226184"},{"key":"2348_CR21","doi-asserted-by":"crossref","unstructured":"Liu B, Zhao W, Sun Q (2017) Study of object detection based on faster R-CNN. In: 2017 Chinese Automation Congress (CAC) 2017, pp 6233\u20136236","DOI":"10.1109\/CAC.2017.8243900"},{"key":"2348_CR22","doi-asserted-by":"crossref","unstructured":"Menikdiwela M, Nguyen C, Li H, Shaw M (2017) CNN-based small object detection and visualization with feature activation mapping. In: International conference on image and vision computing New Zealand (IVCNZ) 2017, pp 1\u20135","DOI":"10.1109\/IVCNZ.2017.8402455"},{"key":"2348_CR23","doi-asserted-by":"crossref","unstructured":"Zhang L, Wang Z, He J, Li Y (2023) New image processing: VGG image style transfer with gram matrix style features. In: 2023 5th International conference on artificial intelligence and computer applications (ICAICA) 2023, pp 468\u2013472","DOI":"10.1109\/ICAICA58456.2023.10405398"},{"key":"2348_CR24","doi-asserted-by":"crossref","unstructured":"Bai L, Abe H, Lee C (2020) RNN-based approach to TCP throughput prediction. In: Eighth international symposium on computing and networking workshops (CANDARW) 2020, pp 391\u2013395","DOI":"10.1109\/CANDARW51189.2020.00080"},{"key":"2348_CR25","doi-asserted-by":"crossref","unstructured":"Elkourdi M, Mazin A, Gitlin RD (2019) Performance analysis for virtual-cell based comp 5G networks using deep recurrent neural nets. In: Wireless telecommunications symposium (WTS) 2019, pp 1\u20136","DOI":"10.1109\/WTS.2019.8715542"},{"key":"2348_CR26","doi-asserted-by":"crossref","unstructured":"Li Y, Zhang R, Zhang J, Gao S, Yang L (2019) Cooperative jamming for secure UAV communications with partial eavesdropper information. IEEE Access 7:94\u00a0593\u201394\u00a0603","DOI":"10.1109\/ACCESS.2019.2926741"},{"key":"2348_CR27","doi-asserted-by":"crossref","unstructured":"Chen Y, Zhao N, Alouini ZDM-S (2018) Multiple UAVs as relays: multi-hop single link versus multiple dual-hop links. IEEE Trans Wireless Commun 17(9):6348\u20136359","DOI":"10.1109\/TWC.2018.2859394"},{"key":"2348_CR28","doi-asserted-by":"crossref","unstructured":"Sohail MF, Leow CY, Won S (2018) Non-orthogonal multiple access for unmanned aerial vehicle assisted communication. IEEE Access 6:22\u00a0716\u201322\u00a0727","DOI":"10.1109\/ACCESS.2018.2826650"},{"key":"2348_CR29","doi-asserted-by":"crossref","unstructured":"Ji B, Li Y, Chen S, Han C, Li C, Wen H (2020) Secrecy outage analysis of UAV assisted relay and antenna selection for cognitive network under nakagami-$$m$$ channel. IEEE Trans Cognit Commun Netw 7:1\u201311","DOI":"10.1109\/TCCN.2020.2965945"},{"key":"2348_CR30","doi-asserted-by":"crossref","unstructured":"Tran D-D, Ha D-B, Vo VN, So-In C, Tran H, Nguyen TG, Baig Z, Sanguanpong S (2018) Performance analysis of DF\/AF cooperative MISO wireless sensor networks with NOMA and SWIPT over Nakagami-$$m$$ fading. IEEE Access 6:56\u00a0142\u201356\u00a0161","DOI":"10.1109\/ACCESS.2018.2872935"},{"key":"2348_CR31","doi-asserted-by":"crossref","unstructured":"Do D-T, Vaezi M, Nguyen T-L (2018) Wireless powered cooperative relaying using NOMA with imperfect CSI. In: Proc. IEEE Globecom, Abu Dhabi, U.A.E, Sep. 2018, pp 1\u20136","DOI":"10.1109\/GLOCOMW.2018.8644154"},{"key":"2348_CR32","doi-asserted-by":"crossref","unstructured":"Vo V.N, Nguyen TG, So-In C, Ha D-B (2017) Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer. IEEE Access 5:25\u00a0196\u201325\u00a0206","DOI":"10.1109\/ACCESS.2017.2768443"},{"issue":"7","key":"2348_CR33","doi-asserted-by":"publisher","first-page":"7179","DOI":"10.1109\/TVT.2019.2914508","volume":"68","author":"C Guo","year":"2019","unstructured":"Guo C, Zhao L, Feng C, Ding Z, Chen H-H (2019) Energy harvesting enabled NOMA systems with full-duplex relaying. IEEE Trans Veh Technol 68(7):7179\u20137183","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"2348_CR34","doi-asserted-by":"publisher","first-page":"4645","DOI":"10.1109\/TVT.2017.2789223","volume":"67","author":"J Chen","year":"2018","unstructured":"Chen J, Yang L, Alouini M-S (2018) Physical layer security for cooperative NOMA systems. IEEE Trans Veh Technol 67(5):4645\u20134649","journal-title":"IEEE Trans Veh Technol"},{"key":"2348_CR35","unstructured":"Gradshteyn I, Ryzhik I (2014) Table of Integrals, Series, and Products, 8th\u00a0ed., Zwillinger D, Moll V (eds). Elsevier"},{"issue":"94","key":"2348_CR36","first-page":"1","volume":"2021","author":"M Yan","year":"2021","unstructured":"Yan M, Yuan H, Xu J (2021) Task allocation and route planning of multiple UAVs in a marine environment based on an improved particle swarm optimization algorithm. EURASIP J Adv Signal Process 2021(94):1\u201323","journal-title":"EURASIP J Adv Signal Process"},{"issue":"6","key":"2348_CR37","first-page":"1635","volume":"19","author":"Z Liu","year":"2019","unstructured":"Liu Z, Liu J, Zhou F, Liu RW, Xiong N (2019) A robust GA\/PSO-hybrid algorithm in intelligent shipping route planning systems for maritime traffic networks. J Internet Technol 19(6):1635\u20131644","journal-title":"J Internet Technol"},{"key":"2348_CR38","doi-asserted-by":"crossref","unstructured":"Luo Y, Wu C, Leng Y, Huang N, Mao L, Tang J (2022) Throughput Optimization for NOMA cognitive relay network with RF energy harvesting based on improved Bat Algorithm. Math 10(22)","DOI":"10.3390\/math10224357"},{"key":"2348_CR39","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s11036-018-1188-7","volume":"25","author":"VN Vo","year":"2020","unstructured":"Vo VN, Nguyen TG, So-In C, Tran H (2020) Outage performance analysis of energy harvesting wireless sensor networks for NOMA transmissions. Mobile Netw Appl 25:23\u201341","journal-title":"Mobile Netw Appl"},{"key":"2348_CR40","doi-asserted-by":"crossref","unstructured":"Hayaneh AM, Zaidi SAR, Mclernon DC, Renzo MD, Ghogho M (2018) Performance analysis of UAV enabled disaster recovery networks: a stochastic geometric framework based on cluster processes. IEEE Access 6:26\u00a0215\u201326\u00a0230","DOI":"10.1109\/ACCESS.2018.2835638"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02348-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-024-02348-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02348-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T09:17:13Z","timestamp":1726737433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-024-02348-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["2348"],"URL":"https:\/\/doi.org\/10.1007\/s11036-024-02348-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"7 May 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}