DC programming and DCA: thirty years of developments

HA Le Thi, T Pham Dinh - Mathematical Programming, 2018 - Springer
The year 2015 marks the 30th birthday of DC (Difference of Convex functions) programming
and DCA (DC Algorithms) which constitute the backbone of nonconvex programming and …

Joint precoding optimization for secure SWIPT in UAV-aided NOMA networks

W Wang, J Tang, N Zhao, X Liu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Combination of unmanned aerial vehicle (UAV) and non-orthogonal multiple access
(NOMA) is deemed as an promising solution to achieving massive connectivity in future …

Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling

Y Cai, F Cui, Q Shi, M Zhao… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, we investigate a novel unmanned aerial vehicle (UAV)-enabled secure
communication system. Two UAVs are applied in this system where one UAV moves around …

Green full-duplex self-backhaul and energy harvesting small cell networks with massive MIMO

L Chen, FR Yu, H Ji, B Rong, X Li… - IEEE Journal on …, 2016 - ieeexplore.ieee.org
With the dense deployment of small cell networks, the powering and backhaul problem of
small cell base stations (SBSs) has attracted great attention, and energy harvesting …

Adaptive wireless video streaming based on edge computing: Opportunities and approaches

D Wang, Y Peng, X Ma, W Ding, H Jiang… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Dynamic Adaptive Streaming over HTTP (DASH) has been widely adopted to deal with such
user diversity as network conditions and device capabilities. In DASH systems, the …

Security optimization for an AF MIMO two-way relay-assisted cognitive radio nonorthogonal multiple access networks with SWIPT

C Hu, Q Li, Q Zhang, J Qin - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
This paper investigates the physical layer security issue in an amplify-and-forward (AF) multi-
input multi-output (MIMO) two-way relay assisted cognitive radio (CR) nonorthogonal …

Efficient resource allocation for relay-assisted computation offloading in mobile-edge computing

X Chen, Y Cai, Q Shi, M Zhao… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In this article, relay-assisted computation offloading (RACO) is investigated, where user A
wishes to share the results of computational tasks with another user B with the assistance of …

Energy-efficient resource allocation for latency-sensitive mobile edge computing

X Chen, Y Cai, L Li, M Zhao… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Resource allocation algorithms are conceived for minimizing the energy consumption of
multiuser mobile edge computing (MEC) systems operating in the face of interference …

Federated cooperation and augmentation for power allocation in decentralized wireless networks

M Yan, B Chen, G Feng, S Qin - IEEE Access, 2020 - ieeexplore.ieee.org
Emerging mobile edge techniques and applications such as Augmented Reality (AR)/Virtual
Reality (VR), Internet of Things (IoT), and vehicle networking, result in an explosive growth of …

Joint beamforming and power allocation for secrecy in peer-to-peer relay networks

C Wang, HM Wang, DWK Ng, XG Xia… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates the physical-layer security of a multiuser peer-to-peer (MUP2P) relay
network for amplify-and-forward (AF) protocol, where a secure user and other unclassified …