2021
DOI: 10.1109/access.2021.3060323
|View full text |Cite
|
Sign up to set email alerts
|

Deep Reinforcement Learning for Trustworthy and Time-Varying Connection Scheduling in a Coupled UAV-Based Femtocaching Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 48 publications
0
6
0
Order By: Relevance
“…It is worth mentioning that the wireless channel is modeled based on the UAV 3GPP standard [27], [28]. In this model, the power gain of the channel between user u η and η th UAV at time t is calculated by [29]:…”
Section: System Model and Problem Descriptionmentioning
confidence: 99%
“…It is worth mentioning that the wireless channel is modeled based on the UAV 3GPP standard [27], [28]. In this model, the power gain of the channel between user u η and η th UAV at time t is calculated by [29]:…”
Section: System Model and Problem Descriptionmentioning
confidence: 99%
“…To avoid frequent handover in terrestrial infrastructure and UAV's signal attenuation in indoor areas, indoor requests are managed by FAPs, while outdoor users' requests are handled through FAPs/UAVs, depending on their movement speed (i.e., Low-Speed Users (LSU) are served through FAPs, otherwise, they are managed by UAVs) [33]. Due to the high mobility of users, the location of UAVs is determined using the K-means clustering algorithm [9]. Each UAV covers one intra-cluster and hovers at its location while delivering a request [34].…”
Section: System Model and Problem Descriptionmentioning
confidence: 99%
“…Recent advancements in heterogeneous cluster-centric cellular networks [8] have drawn focused research attention given provided considerable improvements in content diversity, which is due to the integration of the coded/uncoded content placement and Coordinated Multi-Point (CoMP) technology. Besides, integrating Unmanned Aerial Vehicles (UAVs) as flying caching nodes into the cluster-centric MEC networks [9] can further improve the network's Quality of Service (QoS) due to the high-quality Line of Sight (LoS) links, high mobility of UAVs, and their wide transmission range.…”
Section: Introductionmentioning
confidence: 99%
“…Autonomous intrusion detection collects large data sets from drone networks with several attacks for protecting drone networks. The ML approaches involve a decision tree, naive Bayes, deep learning multi‐layer perceptron, k‐nearest neighbors, and support vector machine for classifying the attack and detecting the accuracy of a drone network 18–20 …”
Section: Introductionmentioning
confidence: 99%
“…The ML approaches involve a decision tree, naive Bayes, deep learning multi-layer perceptron, k-nearest neighbors, and support vector machine for classifying the attack and detecting the accuracy of a drone network. [18][19][20]…”
mentioning
confidence: 99%