2018
DOI: 10.1109/mnet.2018.1700286
|View full text |Cite
|
Sign up to set email alerts
|

UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 161 publications
(59 citation statements)
references
References 10 publications
0
59
0
Order By: Relevance
“…Given the advantages of prompt deployment and their bird's-eye perspective, unmanned aerial vehicles (UAVs) have been widely invoked for environmental monitoring and data collection [1]- [3], in the fields of agriculture [4], disaster sensing [5], emergency management [6], border control [7], intelligent transportation systems [8] and crowd surveillance [9]. However, the decision-making applications relying on real-time video streaming and image processing tend to exceed the local data processing capability of low-cost UAVs or may excessively prolong the time required for executing their actions [10].…”
Section: A Motivation and Scopementioning
confidence: 99%
“…Given the advantages of prompt deployment and their bird's-eye perspective, unmanned aerial vehicles (UAVs) have been widely invoked for environmental monitoring and data collection [1]- [3], in the fields of agriculture [4], disaster sensing [5], emergency management [6], border control [7], intelligent transportation systems [8] and crowd surveillance [9]. However, the decision-making applications relying on real-time video streaming and image processing tend to exceed the local data processing capability of low-cost UAVs or may excessively prolong the time required for executing their actions [10].…”
Section: A Motivation and Scopementioning
confidence: 99%
“…After obtaining the user association and UAV location by solving Problem (53), a feasible computing capacity allocation for Problem (42) is given by…”
Section: Function (53a) Represents the Sum Squared Distance Between Amentioning
confidence: 99%
“…Optimizing the position and trajectory [126], [128], [133], [144], [176] Intelligent network layer Routing selection [15], [69], [89] Congestion control [177]- [181] Smart access [182], [183] Intelligent application layer High-level control [184]- [187] UAV-enabled intelligent aerial services…”
Section: Intelligent Communication Layermentioning
confidence: 99%