1. Kawamoto, Y., H. Nishiyama, N. Kato, F. Ono, and R. Miura, "Toward future unmanned aerial vehicle networks: Architecture, resource allocation and field experiments," IEEE Wireless Commun., Vol. 26, No. 1, 94-99, Feb. 2019.
doi:10.1109/MWC.2018.1700368 Google Scholar
2. Li, B., Z. Fei, and Y. Zhang, "UAV communications for 5G and beyond: Recent advances and future trends," IEEE Inter. Things Jour., Vol. 6, No. 2, 2241-2263, Apr. 2019.
doi:10.1109/JIOT.2018.2887086 Google Scholar
3. He, D., S. Chan, and M. Guizani, "Communication security of unmanned aerial vehicles," IEEE Wireless Commun., Vol. 24, No. 4, 134-139, Aug. 2017.
doi:10.1109/MWC.2016.1600073WC Google Scholar
4. Tang, H., Q. Wu, and B. Li, "An efficient solution for joint power and trajectory optimization in UAV-enabled wireless network," IEEE Access, Vol. 7, 59640-59625, Mar. 2019.
doi:10.1109/ACCESS.2019.2915660 Google Scholar
5. Zhang, G., Q. Wu, M. Cui, and R. Zhang, "Securing UAV communications via joint trajectory and power control," IEEE Trans. Wireless Commun., Vol. 18, No. 2, 1376-1389, Feb. 2019.
doi:10.1109/TWC.2019.2892461 Google Scholar
6. Cui, M., G. Zhang, Q. Wu, and D. W. K. Ng, "Robust trajectory and transmit power design for secure UAV communications," IEEE Trans. Veh. Tech., Vol. 67, No. 9, 9042-9046, Sep. 2018.
doi:10.1109/TVT.2018.2849644 Google Scholar
7. Zhou, X., Q.Wu, S. Yan, F. Shu, and J. Li, "UAV-enabled secure communications: Joint trajectory and transmit power optimization," IEEE Trans. Veh. Tech., Vol. 68, No. 4, 4069-4073, Apr. 2019.
doi:10.1109/TVT.2019.2900157 Google Scholar
8. Gao, Y., H. Tang, B. Li, and X. Yuan, "Joint trajectory and power design for UAV-enabled secure communications with no-fly zone constraints," IEEE Access, Vol. 7, 44459-44470, Apr. 2019.
doi:10.1109/ACCESS.2019.2908407 Google Scholar
9. Cai, Y., F. Cui, Q. Shi, M. Zhao, and G. Y. Li, "Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling," IEEE J. Sel. A. Commun., Vol. 36, No. 9, 1972-1985, Sep. 2018.
doi:10.1109/JSAC.2018.2864424 Google Scholar
10. Lee, H., S. Eom, J. Park, and I. Lee, "UAV-aided secure communications with cooperative jamming," IEEE Trans. Veh. Tech., Vol. 67, No. 10, 9385-9392, Oct. 2018.
doi:10.1109/TVT.2018.2853723 Google Scholar
11. Zhong, C., J. Yao, and J. Xu, "Secure UAV communication with cooperative jamming and trajectory control," IEEE Commun. Lett., Vol. 23, No. 2, 286-289, Feb. 2019.
doi:10.1109/LCOMM.2018.2889062 Google Scholar
12. Li, A., Q. Wu, and R. Zhang, "UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel," IEEE Wireless Commun. Lett., Vol. 8, No. 1, 181-184, Feb. 2019.
doi:10.1109/LWC.2018.2865774 Google Scholar
13. Perera, T., D. Jayakody, S. Sharma, S. Chatzinotas, and J. Li, "Simultaneous wireless information and power transfer (SWIPT): Recent advances and future challenges," IEEE Commun. Surv. Tut., Vol. 20, No. 1, 264-302, Quart. 1st, 2018.
doi:10.1109/COMST.2017.2783901 Google Scholar
14. Hong, X., P. Liu, F. Zhou, S. Guo, and Z. Chu, "Resource allocation for secure UAV-assisted SWIPT systems," IEEE Access, Vol. 7, 24248-24257, Feb. 2019.
doi:10.1109/ACCESS.2019.2897226 Google Scholar
15. Huang, F., J. Chen, H. Wang, G. Ding, Z. Xue, Y. Yang, and F. Song, "UAV-assisted SWIPT in internet of things with power splitting: Trajectory design and power allocation," IEEE Access, Vol. 7, 68260-68270, Jun. 2019.
doi:10.1109/ACCESS.2019.2918135 Google Scholar
16. Boyd, S. and L. Vandenberghe, Convex Optimization, Cambridge Univ. Press, Cambridge, UK, 2004.
doi:10.1017/CBO9780511804441
17. Gao, H., T. Lv, W. Wang, and N. C. Beaulieu, "Energy-efficient and secure beamforming for selfsustainable relay-aided multicast networks," IEEE Signal Process. Lett., Vol. 23, No. 11, 1509-1513, Nov. 2016.
doi:10.1109/LSP.2016.2600105 Google Scholar
18., Grant, M. and S. Boyd, CVX: Matlab software for disciplined convex programming, version 2.0 beta, Sep. 2012, Available: http://cvxr.com/cvx.