Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/33137
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZhou, Y-
dc.contributor.authorLiu, X-
dc.contributor.authorFan, P-
dc.contributor.authorMa, Z-
dc.contributor.authorWang, K-
dc.contributor.authorDong, Z-
dc.contributor.authorPanayirci, E-
dc.coverage.spatialChengdu, China-
dc.date.accessioned2026-04-12T11:40:26Z-
dc.date.available2026-04-12T11:40:26Z-
dc.date.issued2025-10-19-
dc.identifierORCiD: Yi Zhou https://orcid.org/0000-0001-6407-068X-
dc.identifierORCiD: Kezhi Wang https://orcid.org/0000-0001-8602-0800-
dc.identifier.citationZhou, Y. et al. (2025) 'Artificial Noise Aided UAV-ISAC System Against Malicious Radar Signal Detection and Communication Eavesdropping', 2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall), Chengdu, China, 19-22 October, pp. 1–6. doi: 10.1109/vtc2025-fall65116.2025.11310395.en-US
dc.identifier.isbn979-8-3315-0320-8-
dc.identifier.isbn979-8-3315-0321-5-
dc.identifier.issn1090-3038-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/33137-
dc.description.abstractIn this paper, a novel artificial noise (AN)-aided secure and covert integrated sensing and communication (ISAC) framework is established for uncrewed aerial vehicle (UAV) systems, to against malicious radar signal detection and communication eavesdropping. Specifically, we consider that besides the communication and sensing signals, the AN signal, which is used to interfere with the eavesdropper and conceal the existence of radar signal, will be transmitted by the UAV-enabled base station (UBS) with uncertainty on its power level. The closed-form expressions of intercept probability (IP) as well as the minimum detection error probability (M-DEP) are derived. Moreover, an efficient communication and sensing performance maximization strategy is designed by optimizing the beamforming vector of communication, covariance matrix of sensing, and UBS receiver filter jointly, to satisfy the IP, power and M-DEP constraints. Simulation results are provided to verify the effectiveness of our joint design by comparing it to benchmark strategy. Moreover, the impact of AN power uncertainty is examined via simulations.en-US
dc.description.sponsorshipThis work was supported in part by the National Natural Science Foundation of China under Grant U23A20274, Grant 62361136810, Grant 62301462, Grant 62401483, in part by UKRI Postdoc Guarantee project S-ISAC [grant number EP/Z002435/1] and EU MSCA Postdoctoral Fellowships [grant num-ber 101154926], in part by the Science and Technology Major Project of Ti-betan Autonomous Region of China under Grant No.XZ202201ZD0006G04, in part by the Lhasa Science and Technology Plan Project under Grant No. LSKJ202405, in part by the Natural Science Foundation of Sichuan Province under Grants 2025ZNSFSC1446, in part by the Bilateral Scientific Cooper-ation Program with the China National Science Foundation (NSF), China, and the Scientific and Technical Research Council of Türkiye (TUBITAK), Türkiye under Grant 123N805.en-US
dc.format.extent1–6-
dc.format.mediumPrint-Electronic-
dc.languageen-USen-US
dc.language.isoenen-US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en-US
dc.rightsCreative Commons Attribution 4.0 International-
dc.rightsCreative Commons Attribution 4.0 International-
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/-
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/-
dc.source2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)-
dc.source2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)-
dc.subjectISACen-US
dc.subjectUAVen-US
dc.subjectAN uncertaintyen-US
dc.subjectcovert sensingen-US
dc.subjectsecure communicationen-US
dc.titleArtificial Noise Aided UAV-ISAC System Against Malicious Radar Signal Detection and Communication Eavesdroppingen-US
dc.typeArticleen-US
dc.date.dateAccepted2025-06-01-
dc.identifier.doihttps://doi.org/10.1109/vtc2025-fall65116.2025.11310395-
dc.relation.isPartOf2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)-
pubs.finish-date2025-10-22-
pubs.finish-date2025-10-22-
pubs.publication-statusPublished-
pubs.start-date2025-10-19-
pubs.start-date2025-10-19-
dc.identifier.eissn2577-2465-
dc.rights.licensehttps://creativecommons.org/licenses/by/4.0/legalcode.en-
dc.rights.licensehttps://creativecommons.org/licenses/by/4.0/legalcode.en-
dcterms.dateAccepted2025-06-01-
dc.rights.holderThe Author(s)-
dc.rights.holderThe Author(s)-
dc.contributor.orcidZhou, Yi [0000-0001-6407-068X]-
dc.contributor.orcidWang, Kezhi [0000-0001-8602-0800]-
Appears in Collections:Department of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfFor the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising.924.35 kBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons