Alert button
Picture for Ali Behfarnia

Ali Behfarnia

Alert button

UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI

Add code
Bookmark button
Alert button
Jun 13, 2023
Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic

Figure 1 for UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI
Figure 2 for UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI
Figure 3 for UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI
Figure 4 for UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI
Viaarxiv icon

Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach

Add code
Bookmark button
Alert button
Dec 21, 2021
Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic

Figure 1 for Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach
Figure 2 for Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach
Figure 3 for Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach
Figure 4 for Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach
Viaarxiv icon