LEADER 04788nam 22006015 450 001 9911047714703321 005 20251001130457.0 010 $a981-9696-11-9 024 7 $a10.1007/978-981-96-9611-6 035 $a(MiAaPQ)EBC32323324 035 $a(Au-PeEL)EBL32323324 035 $a(CKB)41528787900041 035 $a(DE-He213)978-981-96-9611-6 035 $a(EXLCZ)9941528787900041 100 $a20251001d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems /$fby Weidang Lu, Yu Ding, Huimei Han, Guanjun Xu 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (139 pages) 225 1 $aSpringerBriefs in Computer Science,$x2191-5776 311 08$a981-9696-10-0 327 $a"Chapter 1. Overview of Unmanned Aerial Vehicle ? Mobile Edge Computing Systems" -- "Chapter 2 PLS-based Secure communications for UAV-enabled MEC Systems" -- "Chapter 3 RIS-Based Secure Communications for UAV-Enabled MEC Systems" -- "Chapter 4 DRL-Based Secure Communications for UAV-Enabled MEC Systems" -- "Chapter 5 Online-Based Secure Communications for UAV-Enabled MEC Systems" -- "Chapter 6 Conclusions and Future Research". 330 $aWith the rapid evolution of wireless communication technologies, emerging applications like autonomous driving, telemedicine, and virtual reality are becoming integral to modern life. These advancements have significantly increased computing demands and coverage requirements, posing challenges for traditional systems and resource-constrained devices. Unmanned aerial vehicle-assisted mobile edge computing (UAV-assisted MEC) offers an innovative solution, enabling rapid deployment of communication infrastructure and providing efficient computing services for devices. However, the openness and broadcast nature of UAV communications make them highly susceptible to security threats. The book "Secure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems" explores advanced strategies to secure data transmission in UAV-enabled MEC systems. Furthermore, this book provides a detailed exploration of how physical-layer security techniques can be effectively employed to enhance secure communications within these complex systems. Aimed at researchers, engineers, and professionals in the fields of secure communications, MEC, and UAV technology, the book addresses the growing demand for resilient security frameworks that can handle the dynamic and real-time nature of UAV operations. It offers vital insights for anyone involved in the development of next-generation wireless networks, making it an indispensable reference for those tackling security challenges in UAV-enabled MEC systems. The content covers advanced theoretical insights and technical analysis, offering a comprehensive range of methods to strengthen security in UAV-enabled MEC systems. Key topics include secure offloading strategies, communication modes, edge learning, deep reinforcement learning, reconfigurable intelligent surface, and multiple UAVs collaboration. Additionally, the book delves into physical-layer security techniques such as artificial noise generation and cooperative jamming. These methods aim to safeguard sensitive information from eavesdroppers and secure communication channels at the physical layer. Alongside these security-focused techniques, the book also covers essential optimization strategies, including trajectory optimization, resource allocation under adversarial conditions, which collectively enhance secure performance in UAV-enabled MEC systems. 410 0$aSpringerBriefs in Computer Science,$x2191-5776 606 $aComputer science 606 $aData protection 606 $aElectronic digital computers$xEvaluation 606 $aModels of Computation 606 $aSecurity Services 606 $aSystem Performance and Evaluation 615 0$aComputer science. 615 0$aData protection. 615 0$aElectronic digital computers$xEvaluation. 615 14$aModels of Computation. 615 24$aSecurity Services. 615 24$aSystem Performance and Evaluation. 676 $a004.0151 700 $aLu$b Weidang$01870083 701 $aDing$b Yu$01589108 701 $aHan$b Huimei$01870084 701 $aXu$b Guanjun$01870085 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047714703321 996 $aSecure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems$94478413 997 $aUNINA