UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI.
Aly Sabri AbdallaAli BehfarniaVuk MarojevicPublished in: CoRR (2023)
Keyphrases
- multi user
- multiple users
- single user
- user interface
- virtual environment
- virtual world
- augmented reality
- multi granularity
- multi touch
- end users
- malicious users
- user interaction
- optimization problems
- path planning
- recommender systems
- optimization algorithm
- social media
- injection attacks
- code division multiple access
- artificial intelligence
- multiple access
- countermeasures
- user profiles
- computer vision