{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:20:28Z","timestamp":1774023628103,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932005"],"award-info":[{"award-number":["61932005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61901051"],"award-info":[{"award-number":["61901051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["4212005"],"award-info":[{"award-number":["4212005"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development of China","award":["2014AA01A701"],"award-info":[{"award-number":["2014AA01A701"]}]},{"name":"111 Project of China","award":["B16006"],"award-info":[{"award-number":["B16006"]}]},{"name":"BUPT Excellent Ph.D. Students Foundation","award":["CX2020212"],"award-info":[{"award-number":["CX2020212"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,3,1]]},"DOI":"10.1109\/jiot.2021.3098049","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T23:43:11Z","timestamp":1628638991000},"page":"3346-3358","source":"Crossref","is-referenced-by-count":55,"title":["Secrecy Energy Efficiency Maximization in UAV-Enabled Wireless Sensor Networks Without Eavesdropper\u2019s CSI"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6654-0390","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"first","affiliation":[{"name":"National Engineering Lab for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9518-1622","authenticated-orcid":false,"given":"Xiaofeng","family":"Tao","sequence":"additional","affiliation":[{"name":"National Engineering Lab for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7966-3568","authenticated-orcid":false,"given":"Na","family":"Li","sequence":"additional","affiliation":[{"name":"National Engineering Lab for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7689-482X","authenticated-orcid":false,"given":"Huici","family":"Wu","sequence":"additional","affiliation":[{"name":"National Engineering Lab for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0041-1427","authenticated-orcid":false,"given":"Jin","family":"Xu","sequence":"additional","affiliation":[{"name":"National Engineering Lab for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s17081781"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2691551"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s16020157"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2776922"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2911939"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848000"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2612119"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2887086"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800458"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900028"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2892461"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2849644"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864424"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2853723"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2902559"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2822700"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2962479"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2981092"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864420"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2688328"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-2985-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2990994"},{"key":"ref23","volume-title":"UAV-enabled confidential data collection in wireless networks","author":"Zhou","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2019.2949802"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2977948"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2924180"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2947921"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700643"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486033"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2330091"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2978073"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2949994"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904741"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2789293"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2006.877962"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611971255","volume-title":"Nonlinear Programming","author":"Mangasarian","year":"1994"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9717339\/09490362.pdf?arnumber=9490362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:34:03Z","timestamp":1705016043000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9490362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":38,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3098049","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]}}}