Abstract: In this research work, we consider the availability of mobile eavesdroppers and wardens, and investigate the covert and secure communication performance in UAV-ISAC-assisted D2D networks. To ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results