|
[1] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with unmanned aerial vehicles: Opportunities and challenges,” IEEE Communications Magazine.”, vol. 54, no. 5, pp. 36–42, 2016. [2] A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L. G. Giordano, A. Garcia-Rodriguez, and J. Yuan, “Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3417–3442, 2019. [3] G. Reus-Muns and K. R. Chowdhury, “Classifying UAVs with proprietary waveforms via preamble feature extraction and federated learning,” IEEE Transactions on Vehicular Technology, vol. 70, no. 7, pp. 6279–6290, 2021. [4] H. Shakhatreh, A. H. Sawalmeh, A. Al-Fuqaha, Z. Dou, E. Almaita, I. Khalil, N. S. Othman, A. Khreishah, and M. Guizani, “Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges,” IEEE Access, vol. 7, pp. 48572–48634, 2019. [5] “ZENADRONE, remote aerial surveillance solutions.” https://www.zenadrone.com/. Accessed: 5-Sep-2023. [6] “AIRVIS, specialists in drone security and surveillance.” https://airvis.co.uk/. Accessed: 5-Sep-2023. [7] “DRONITECH, drone surveillance security.” https://www.dronitech.com/. Accessed: 5-Sep-2023. [8] N. Van Cuong, Y.-W. Peter Hong, and J.-P. Sheu, “UAV trajectory optimization for joint relay communication and image surveillance,” IEEE Transactions on Wireless Communications, vol. 21, no. 12, pp. 10177–10192, 2022. [9] N. Van Cuong, Y.-W. Peter Hong, and J.-P. Sheu, “UAV-enabled image capture and wireless delivery for on-demand surveillance tasks,” submitted, IEEE Transactions on Wireless Communications, 2023. [10] S. Hu, Q. Wu, and X. Wang, “Energy management and trajectory optimization for UAV-enabled legitimate monitoring systems,” IEEE Transactions on Wireless Communications, vol. 20, no. 1, pp. 142–155, 2021. [11] H. Zhao, H. Wang, W.Wu, and J. Wei, “Deployment algorithms for UAV airborne networks toward on-demand coverage,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 9, pp. 2015–2031, 2018. [12] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication design for multi-UAV enabled wireless networks,” IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 2109–2121, 2018. [13] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for UAV-enabled mobile relaying systems,” IEEE Transactions on Communications, vol. 64, no. 12, pp. 4983–4996, 2016. [14] Y. Ji, Z. Yang, H. Shen, W. Xu, K. Wang, and X. Dong, “Multi-cell edge coverage enhancement using mobile UAV-relay,” IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7482–7494, 2020. [15] R. Ding, F. Gao, and X. Shen, “3D UAV trajectory design and frequency band allocation for energy-efficient and fair communication: A deep reinforcement learning approach,” IEEE Transactions on Wireless Communications, vol. 19, no. 12, pp. 7796–7809, 2020. [16] Q. Hu, Y. Cai, A. Liu, G. Yu, and G. Y. Li, “Low-complexity joint resource allocation and trajectory design for UAV-aided relay networks with the segmented raytracing channel model,” IEEE Transactions on Wireless Communications, vol. 19, no. 9, pp. 6179–6195, 2020. [17] S. Zeng, H. Zhang, B. Di, and L. Song, “Trajectory optimization and resource allocation for OFDMA UAV relay networks,” IEEE Transactions on Wireless Communications, vol. 20, no. 10, pp. 6634–6647, 2021. [18] D.-H. Tran, V.-D. Nguyen, S. Chatzinotas, T. X. Vu, and B. Ottersten, “UAV relay assisted emergency communications in IoT networks: Resource allocation and trajectory optimization,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1621–1637, 2022. [19] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications,” IEEE Transactions on Wireless Communications, vol. 16, no. 11, pp. 7574–7589, 2017. [20] Z. Jia, M. Sheng, J. Li, D. Niyato, and Z. Han, “LEO-satellite-assisted UAV: Joint trajectory and data collection for internet of remote things in 6G aerial access networks,” IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9814–9826, 2021. [21] X. Li and A. Savkin, “Networked unmanned aerial vehicles for surveillance and monitoring: A survey,” Future Internet, vol. 13, p. 174, 07 2021. [22] M. Elloumi, R. Dhaou, B. Escrig, H. Idoudi, and L. A. Saidane, “Monitoring road traffic with a UAV-based system,” in Proceedings of IEEE Conference on Wireless Communications and Networking (WCNC), pp. 1–6, 2018. [23] L. Xing, H. Xiaoxuan, W. Guoqiang, and L. He, “A multi-UAV deployment method for border patrolling based on stackelberg game,” Journal of Systems Engineering and Electronics, vol. 34, no. 1, pp. 99–116, 2023. [24] M. L. Laouira, A. Abdelli, and J. B. Othman, “Wireless energy supply scheduling strategy in a combined border surveillance architecture,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2020. [25] S. Kim, D. Kim, S. Jeong, J.-W. Ham, J.-K. Lee, and K.-Y. Oh, “Fault diagnosis of power transmission lines using a UAV-mounted smart inspection system,” IEEE Access, vol. 8, pp. 149999–150009, 2020. [26] A. Raja, L. Njilla, and J. Yuan, “Adversarial attacks and defenses toward AI-assisted UAV infrastructure inspection,” IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23379–23389, 2022. [27] P. K. Reddy Maddikunta, S. Hakak, M. Alazab, S. Bhattacharya, T. R. Gadekallu, W. Z. Khan, and Q.-V. Pham, “Unmanned aerial vehicles in smart agriculture: Applications, requirements, and challenges,” IEEE Sensors Journal, vol. 21, no. 16, pp. 17608–17619, 2021. [28] Y. Liang, W. Xu, W. Liang, J. Peng, X. Jia, Y. Zhou, and L. Duan, “Nonredundant information collection in rescue applications via an energy-constrained UAV,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2945–2958, 2019. [29] D. Ebrahimi, S. Sharafeddine, P.-H. Ho, and C. Assi, “Autonomous UAV trajectory for localizing ground objects: A reinforcement learning approach,” IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1312–1324, 2021. [30] F. P. Kelly, A. K. Maulloo, and D. K. H. Tan, “Rate control in communication networks: shadow prices, proportional fairness and stability,” Journal of the Operational Research Society, vol. 49, no. 3, pp. 237–252, 1998. [31] X. Wang, Z. Fei, J. A. Zhang, J. Huang, and J. Yuan, “Constrained utility maximization in dual-functional radar-communication multi-UAV networks,” IEEE Transactions on Communications, vol. 69, no. 4, pp. 2660–2672, 2021. [32] P. D. Diamantoulakis and G. K. Karagiannidis, “Maximizing proportional fairness in wireless powered communications,” IEEE Communications Letters, vol. 6, no. 2, pp. 202–205, 2017. [33] H. Huang, A. V. Savkin, and C. Huang, “Decentralised autonomous navigation of a UAV network for road traffic monitoring,” IEEE Transactions on Aerospace and Electronic Systems, vol. 57, no. 4, pp. 2558–2564, 2021. [34] Z. Zhang, Q. Zhang, J. Miao, F. R. Yu, F. Fu, J. Du, and T. Wu, “Energy-efficient secure video streaming in UAV-enabled wireless networks: A safe-DQN approach,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 4, pp. 1892–1905, 2021. [35] D. Han, W. Chen, and J. Liu, “Energy-efficient UAV communications under stochastic trajectory: A markov decision process approach,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 1, pp. 106–118, 2021. [36] S. Hu, W. Ni, X. Wang, A. Jamalipour, and D. Ta, “Joint optimization of trajectory, propulsion, and thrust powers for covert UAV-on-UAV video tracking and surveillance,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1959–1972, 2021. [37] J. Cho, J. Sung, J. Yoon, and H. Lee, “Towards persistent surveillance and reconnaissance using a connected swarm of multiple UAVs,” IEEE Access, vol. 8, pp. 157906–157917, 2020. [38] V. T. Hoang, M. D. Phung, T. H. Dinh, and Q. P. Ha, “System architecture for real-time surface inspection using multiple UAVs,” IEEE Systems Journal, vol. 14, no. 2, pp. 2925–2936, 2020. [39] S. Zhang, H. Zhang, B. Di, and L. Song, “Cellular UAV-to-X communications: Design and optimization for multi-UAV networks,” IEEE Transactions on Wireless Communications, vol. 18, no. 2, pp. 1346–1359, 2019. [40] S. Zhang, H. Zhang, Z. Han, H. V. Poor, and L. Song, “Age of information in a cellular internet of UAVs: Sensing and communication trade-off design,” IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6578–6592, 2020. [41] S. Zhang, H. Zhang, B. Di, and L. Song, “Cooperative sensing and transmission for cellular network controlled unmanned aerial vehicles,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2018. [42] C. D. Franco and G. Buttazzo, “Coverage path planning for UAVs photogrammetry with energy and resolution constraints,” Journal of Intelligent & Robotic Systems, vol. 83, pp. 445–462, 2016. [43] X.-W. Tang, S. Zhang, C. You, X.-L. Huang, and R. Zhang, “UAV-assisted image acquisition: 3D UAV trajectory design and camera control,” in Proceedings of IEEE 96th Vehicular Technology Conference (VTC Spring), pp. 1–6, 2022. [44] N. Masmoudi, W. Jaafar, S. Cherif, J. B. Abderrazak, and H. Yanikomeroglu, “UAV-based crowd surveillance in post COVID-19 era,” IEEE Access, vol. 9, pp. 162276–162290, 2021. [45] L. Xie, J. Xu, and R. Zhang, “Throughput maximization for UAV-enabled wireless powered communication networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1690–1703, 2019. [46] Y. Liu, K. Xiong, Q. Ni, P. Fan, and K. B. Letaief, “UAV-assisted wireless powered cooperative mobile edge computing: Joint offloading, CPU control, and trajectory optimization,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2777–2790, 2020. [47] X. Hu, K.-K. Wong, and Y. Zhang, “Wireless-powered edge computing with cooperative UAV: Task, time scheduling and trajectory design,” IEEE Transactions on Wireless Communications, vol. 19, no. 12, pp. 8083–8098, 2020. [48] M. Khosravi, S. Enayati, H. Saeedi, and H. Pishro-Nik, “Multi-purpose drones for coverage and transport applications,” IEEE Transactions on Wireless Communications, vol. 20, no. 6, pp. 3974–3987, 2021. [49] M. Samir, S. Sharafeddine, C. M. Assi, T. M. Nguyen, and A. Ghrayeb, “UAV trajectory planning for data collection from time-constrained IoT devices,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 34–46, 2020. [50] A. Mrad, A. Al-Hilo, S. Sharafeddine, and C. Assi, “NOMA-aided UAV data collection from time-constrained IoT devices,” in Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6, 2022. [51] C. Zhan, H. Hu, Z. Liu, Z. Wang, and S. Mao, “Multi-UAV-enabled mobile edge computing for time-constrained IoT applications,” IEEE Internet of Things Journal, vol. 8, no. 20, pp. 15553–15567, 2021. [52] K. Liu and J. Zheng, “UAV trajectory optimization for time-constrained data collection in UAV-enabled environmental monitoring systems,” IEEE Internet of Things Journal, vol. 9, no. 23, pp. 24300–24314, 2022. [53] D.-H. Tran, V.-D. Nguyen, S. Chatzinotas, T. X. Vu, and B. Ottersten, “UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1621–1637, 2022. [54] A. M. Almasoud, M. Y. Selim, A. Alqasir, T. Shabnam, A. Masadeh, and A. E. Kamal, “Energy efficient data forwarding in disconnected networks using cooperative UAVs,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2018. [55] J. Scherer and B. Rinner, “Multi-UAV surveillance with minimum information idleness and latency constraints,” IEEE Robotics and Automation Letters, vol. 5, no. 3, pp. 4812–4819, 2020. [56] K. Meng, X. He, Q. Wu, and D. Li, “Multi-UAV collaborative sensing and communication: Joint task allocation and power optimization,” IEEE Transactions on Wireless Communications, vol. 22, no. 6, pp. 4232–4246, 2023. [57] N. Kumar, M. Ghosh, and C. Singhal, “UAV network for surveillance of inaccessible regions with zero blind spots,” in Proceedings of IEEE International Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1213–1218, 2020. [58] M. Shenoy, A. Roy, and S. Misra, “QoI-aware camera network-as-a-service for social behavior analysis,” in Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6, 2021. [59] X. Lin, V. Yajnanarayana, S. D. Muruganathan, S. Gao, H. Asplund, H.-L. Maattanen, M. Bergstrom, S. Euler, and Y.-P. E. Wang, “The sky is not the limit: LTE for unmanned aerial vehicles,” IEEE Communications Magazine, vol. 56, no. 4, pp. 204–210, 2018. [60] G. Yuan and B. Ghanem, “An exact penalty method for binary optimization based on MPEC formulation,” in Proceedings of 31st AAAI Conference on Artificial Intelligence (AAAI), p. 2867–2875, 2017. [61] Z. Q. Luo, J. S. Pang, and D. Ralph, Mathematical Programs with Equilibrium Constraints. U.K.: Cambridge Univ. Press, 1996. [62] X. Hu and D. Ralph, “Convergence of a penalty method for mathematical programming with complementarity constraints,” Journal of Optimization Theory and Applications, vol. 123, no. 2, pp. 365–390, 2004. [63] T. Ma, H. Zhou, B. Qian, N. Cheng, X. Shen, X. Chen, and B. Bai, “UAV-LEO integrated backbone: A ubiquitous data collection approach for B5G internet of remote things networks,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 11, pp. 3491–3505, 2021. [64] CENELEC, “Video surveillance systems for use in security applications,” Standard CENELEC EN 62676-4:2015, European Committee for Electrotechnical Standardization, 2015. [65] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.2,” Jan. 2020. [66] A. Meng, X. Gao, Y. Zhao, and Z. Yang, “Three-dimensional trajectory optimization for energy-constrained UAV-enabled IoT system in probabilistic LoS channel,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1109–1121, 2022. [67] C. You and R. Zhang, “Hybrid offline-online design for UAV-enabled data harvesting in probabilistic LoS channels,” IEEE Transactions on Wireless Communications, vol. 19, no. 6, pp. 3753–3768, 2020. [68] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms. MIT Press, 2nd ed., 2001. [69] Y.-W. P. Hong, R.-H. Cheng, Y.-C. Hsiao, and J.-P. Sheu, “Power-efficient trajectory adjustment and temporal routing for multi-UAV networks,” IEEE Transactions on Green Communications and Networking, vol. 4, no. 4, pp. 1106–1119, 2020. [70] F. Diara and M. Roggero, “Quality assessment of DJI Zenmuse L1 and P1 LiDAR and photogrammetric systems: Metric and statistics analysis with the integration of trimble SX10 data,” Geomatics, vol. 2, no. 3, pp. 254–281, 2022.
|