PDF  PubReader

Lee , Kwon , Jung , and Kim: Neural Myerson Auction for Truthful and Energy-Efficient Autonomous Aerial Data Delivery

Haemin Lee , Sean Kwon , Soyi Jung and Joongheon Kim

Neural Myerson Auction for Truthful and Energy-Efficient Autonomous Aerial Data Delivery

Abstract: A successful deployment of drones provides an ideal solution for surveillance systems. Using drones for surveillance can provide access to areas that may be difficult or impossible to reach by humans or in-land vehicles gathering images or video recordings of a specific target in their coverage. Therefore, we introduces a data delivery drone to transfer collected surveillance data in harsh communication conditions. This paper proposes a Myerson auction-based asynchronous data delivery in an aerial distributed data platform in surveillance systems taking battery limitation and long flight constraints into account. In this paper, multiple delivery drones compete to offer data transfer to a single fixed-location surveillance drone. Our proposed Myerson auction based algorithm, which uses the truthful second-price auction (SPA) as a baseline, is to maximize the seller’s revenue while meeting several desirable properties, i.e., individual rationality and incentive compatibility while pursuing truthful operations. On top of this SPA-based operations, a deep learning based framework is additionally designed for delivery performance improvements.

Keywords: Auction , data delivery , deep learning , truthfulness , unmanned aerial networks (UAVs)

I. INTRODUCTION

IN recent years, an increasing number of enterprises, including Amazon, DHL, and Federal Express (FedEx), has been testing the viability of incorporating drone delivery into their commercial package delivery services [1]. Due to the natural trait of drones which can swiftly move and optimize their path to quickly complete their mission, their role is getting more extensive and diverse in delivery sector. Fig. 1 shows the drone delivery usages from simple warehouse logistic to various applications. Especially in the ongoing pandemic situation, drones are used for timely vaccine distribution during novel coronavirus (COVID-19) and future pandemics [2]. Furthermore, drones also facilitate the inspection of hard-toaccess areas configuring situational awareness [3]–[5], which is important for many applications such as remote sensing, search and rescue, and disaster response. As presented in Fig. 1, monitoring and data collection of smart sensor in mountainous areas or in harbor facilities are also possible. Due to the extensive purpose of UAVs in wireless systems, many configuration scenarios, including functionally-heterogenous UAV coordination, flexible UAV 3D deployment, and hierarchical architecture, have been addressed [6], [7]. The literature above leads to the necessity of studying current proposals and reorganizing such aerial access architectures toward a comprehensive access infrastructure for 6G networks.

Fig. 1.

Drone for delivery usages.
1.png

This paper proposes a data delivery service by the drone network in a surveillance system. With advances to AI, modeling, and simulation technologies, it has become essential to analyze data to extract potential values and create additional services [8], [9]. In this situation, a large amount of data accumulation is fundamentally required, including various range of information. In a series of processes in a data platform, i.e., data collection, data processing, and data analysis., drones can collect raw data and deliver it to the target point operating as a component of the platform. The monitoring data enables facility infrastructure management, spatial information acquisition, and adequate response to rising problems. In this paper, a surveillance drone is presented, locating at specific region, to monitor important points of interest (PoI). We assume the situation where the existing communication network is temporarily destroyed or overloaded due to unexpected events like natural disasters. It is sometimes unrealistic to allow nearby base station or other surveillance drone. In order to achieve the purpose of surveillance, the collected data has requirement that the total time should be no greater than a given maximum delay time to ensure the freshness of the data. Therefore, the accumulated data in destroyed network infrastructure should be delivered to areas where cellular communication is available. In this situation, transferring data directly from hovering surveillance drones to base stations is not efficient due to low power-to-data transmission efficiency. If the distance between the surveillance spot and the final destination, i.e., the base station where the data should be transferred is far, path loss is severe proportionally affecting reception sensitivity. In this regard, reliable and calamityresilient communication infrastructure is needed to deploy drone application services effectively in poor communication conditions.

This paper proposes an effective aerial data delivery surveillance platform with the delivery drone that directly transmits data by moving back and forth in the middle of two points. It might cause some extent of delay but more efficient in terms of the transmission rate. Surveillance drone collects data from its specific monitoring spots. Delivery drones usually hover around, and when they are eligible to transfer data, they fly straight to the destination. Then, they return with the data to the nearby base station contributing as a data provider in the big data platform. As a sequence, flying drones can facilitate rapid information dissemination by broadcasting common files among ground devices despite of the communication adversity. For example, it can bring the public interest by spreading the necessary information to be aware in public. We assume that the third-party operator pays the commercial delivery drones in return for delivery. For this reason, the delivery drones are willing to use up their energy to transfer the data trying their best to fulfill the given task. However, due to the destroyed infrastructure scenarios, surveillance drone can not assign data to multiple delivery drones. In other words, the delivery drones compete to deliver the collected data to the destination. By taking an econometric approach, matching between the two drones can be formulate as an auction where delivery drones act as buyer and surveillance drone acts as seller and auctioneer. Throughout the process, the objective is to maximize the seller’s revenue and buyer’s utility in the same time while guaranteeing truthful conditions. Then the surveillance drone hand over the collected data in its queue storage and gains the spatial benefit to take the new sensing data. In addition, the information of delivery drones is partially observable and therefore, the algorithm should be designed in a fully distributed manner. The general convex optimization method needs to know all the information of individual drones to derive the global optimal solution, which is impossible in high mobility and unpredictable connection situations in drone networks. However, the auction algorithm works effectively in resource allocation problems with partial information in a distributed manner. Moreover, the bidding phase in auction algorithm reflects the bidder’s intention used for realizing resource allocation.

This paper operates the series of auction process with deep learning auction networks. As the Myerson auction achieves revenue-optimal by transforming the bids through monotonic transformation functions, our neural network borrows the concept. The amount of delivery data and final payment of the winner are calculated through the neural network with the collected bids. Based on our method, performance evaluation confirms that the auction based matching between the delivery drone and surveillance drone maximizes the sellers revenue compared to the second-price auction (SPA).

Contributions. The main contributions of this research are three-fold and are summarized as follows.

This paper proposes a novel drone deployment for efficient surveillance data delivery in harsh condition, which is the first attempt to the best of our knowledge.

In addition, our algorithm is designed and implemented fundamentally based on SPA which is mainly used for truthful resource allocation.

Moreover, our proposed SPA-based algorithm is improved using deep learning framework in order to maximize the seller’s revenue and buyer’s utility in the SPAbased truthful auction settings. Finally, the performance of deep learning-based auction structure is compared with the traditional SPA.

II. PRELIMINARIES

A. Auction-based Resource Allocation

A traditionally well-known first-price auction (FPA) is a common type of auction that the bidder who submits the highest bid value to auctioneer (seller) is awarded and pays its bid value to the auctioneer. Here, suppose that N bidders, i.e., [TeX:] $$b_1, \cdots, b_N, \text { and } 1$$ auctioneer exist in the system, where the bid values are [TeX:] $$v_1, \cdots, v_N.$$ The auctioneer selects one bid value v∗ with [TeX:] $$v^*=\max \left\{v_1, \cdots, v_N\right\};$$ and the winner bidder b∗ will be the bidder who submitted bid value v∗. Suppose that the second highest bid value is v†. Then, the winner bidder b∗ does not need to pay v∗ amounts of bid values because slightly higher bid value than [TeX:] $$v^{\dagger}$$ will guarantee the winning. Therefore, individual bidders need to be strategic in FPA. However, the advent of those untruthful bidders does not make the incentivecompatible mechanism and FPA is not efficient [10].

On the other hand, the other type of auction mechanism is called second price auction (SPA). With SPA, the mechanism for selecting a winner is equivalent to FPA, where the payment by the winner is not the winner’s highest bid value but the second highest bid value. In the literature, the SPA is wellknown for its turthfulness [11], [12]. Therefore, SPA is widely used for truthful resource allocation in various distributed computing applications [13], [14]. However, one drawback in SPA is that the SPA cannot achieve revenue-optimal, i.e., the auctioneer cannot obtain maximum benefits because the second bid value will be given to the auctioneer rather than the highest.

In order to pursue revenue-optimal in SPA, various approaches have been studied. Among them, Myerson auction with the concept of virtual valuation is one of the well-known approaches [11], [15]. In order to numerically formulate the virtual valuation, monotonic increasing functions are generally used. According to the advances in deep neural network (DNN) research, the Myerson auction computation procedure can be approximated with the form of DNN. Therefore, this paper designs our proposed DNN-based autonomous aerial delivery scheduling algorithm with the name of neuralarchitectural Myerson auction.

B. Related and Previous Work

1) Data Delivery Research in Multi-Drone Networks: There have been several research on data acquisition frameworks in wireless sensor networks using drones with the goal of increasing the efficiency of the data gathering efforts. The proposed algorithm in [16] introduces a priority-based frame selection scheme to suppress the number of redundant data transmissions between sensor nodes and the drones. In addition, the algorithm in [17], [18] utilizes the drones as mobile data collectors for the randomly deployed sensor nodes. In this research, the proposed algorithm jointly optimizes the wake-up schedules sensor nodes and the trajectories of drones in order to minimize the maximum energy consumption (i.e., min-max criteria for fairness). Moreover, the proposed algorithm in [19] minimizes the drone’s total flight time while allowing each sensor to successfully upload a certain amount of data. Furthermore, the proposed algorithm in [20] provides adaptive surveillance and event-telecast video streaming services from drones to ground control stations with WiFi-direct link scheduling its associated dynamic configuration settings.

Our aerial data delivery scheduling with neural Myerson auction computation in this paper differs in scenario that the delivery drones compete to directly transfer the data. This approach superior from the other approaches because Given that the above researches focus on priority and energy efficiency aspects of the drone-based data collection process, our methods works in extremely poor conditions by sustainably enabling data transmission. Furthermore, our deep learningbased auction reduces the costs through one optimal delivery drone selection in the data collection process. This paper is in line with leading research on drone-based data delivery networks in that it considers the energy and coverage of drones as the bid values of individual drones. However, it differs from others in that it enables data delivery even when the communication infrastructure is poor or destroyed.

2) Previous Work in Auction-based Resource Allocation: The auction approach is an useful intuitive method for solving distributed scheduling and resource allocation problems in a distributed and truthful way. There exists inherent uncertainty regarding valuations for both auctioneers/sellers and buyers/bidders. The auctioneers is unsure about the values that bidders attach to the object being sold, i.e., the maximum amount each bidder is willing to pay. If the auctioneer knew the values precisely, it could just offer the object to the bidder with the highest value at or just below what this bidder is willing to pay. No bidder knows with certainty the values attached by other bidders and the knowledge of other bidders’ values would not affect how much the object is worth to a particular bidder [21]. With a massive volume of economic transactions is conducted through auctions, numerous research on limited resource allocation and scheduling problems has been conducted through auction-based computation processes [22]. In [23], a carrier collaboration problem with pick and delivery requests is considered in order to reduce their transportation costs and consequently increase their profits. A multi-round pricing-setting based combinatorial auction approach is proposed to solve the problem. The proposed algorithm in [24] sketches a self-organizing architecture for very large compute clouds and provides a relatively simple, scalable, and tractable solution to cloud resource allocation through the combinatorial auction. On the other hand, the proposed algorithm in [25] introduces an auction-based scheduling algorithm that plans to transfer items between robots to conduct deliveries in a more efficient way. The algorithm runs online and replans in response to new requests, dead vehicles, and shared information. Authors in [26] propose an auction-based incentive mechanism that achieves near-optimal long-term social welfare in collaborative computation offloading.

Among various auction-based scheduling and resource allocation algorithms, our considering Myerson auction is one of the most efficient revenue-optimal single-item auctions [27]. In order to numerically approximate the Myerson auction, DNNbased architecture can be utilized; and thus, learning-based Myerson auction algorithms for charging scheduling in wireless power transfer (WPT)-based multi-drone networks and electric vehicles are proposed in [11] and [28], respectively. In addition, the proposed algorithms in [29] and [30] solve resource allocation problems using DNN-based auctions in mobile edge computing and wireless virtualization, respectively. Furthermore, the proposed algorithm in [31] is for approximating auctions using deep learning to address the concerns of fairness while maintaining high revenue and strong incentive guarantees.

III. SYSTEM MODEL – AUTONOMOUS AERIAL MOBILITY

A. Overall Architecture

Our aerial data delivery for surveillance system consists of three elements, i.e., surveillance drone, delivery drone and base station. The computation during the auction is done on-device within a surveillance drone. Surveillance Drone S collects monitoring image while hovering over a specific region and these surveillance drone is managed by third party operators. Surveillance drone hovers around its specific area and collects information in different observation angles and heights, not being affected by its surrounded obstacles. However, due to its finite capacity, the amount of data that a surveillance drone can store is limited. These collected data contains features or anomalies on a particular region and needs to be delivered properly.

Delivery drone D moves toward to the surveillance drones to deliver the collected data. The two drones communicate using Wi-Fi Direct when it gets close. The transmission rate is 250 Mbps, transmission distance is up to 200 m, and it supports 1:N connection with devices at the same time. Note that data transmission can vary depending on the delivery drone’s battery capacity, specification, current location, etc. In our auction, the delivery drones bid privately, strategically based on their calculated valuation. In short, surveillance drone in remote and insecure area collects monitoring data in realtime and wants it to be processed. Delivery drones try to provide assistance in delivery as much as possible while in the air to earn revenue from third-party operators and deliver data to their area in charge. Thus, the delivery drones flying in the path naturally compete to deliver sensing data from the Surveillance drone. It is shown in Fig. 2 and their specification is in Table I. The operation of two types of the drone can be modeled as following two subsections.

Fig. 2.

Drone operation model.
2.png
B. Drone Models

1) Surveillance Drone Model: Surveillance drone has its own data buffer size B, and data flow can be formulated with a queue. The surveillance drone stores image from the mounted camera every time step, and a certain amount is processed by the delivery drone. In this paper, the battery of surveillance drone is not considered, assuming that the nearby ground charging tower covers the surveillance drone. Suppose that S is the set of delivery drones that can participate in an auction of one-time steps, and let’s denote each delivery drone as [TeX:] $$d_i, \forall_i \in\{1, \cdots,|S|\}.$$ In following (1), Q(t) is the current queue size in storage, [TeX:] $$\alpha_i(t)$$ is the amount of single delivery drone can take, and [TeX:] $$\lambda(t)$$ is the size of stacking surveillance image in every time t. The amount of the data leaving the queue depends on the surveillance drone’s request, i.e.,

(1)
[TeX:] $$Q(t+1)=Q(t)+\sum_{\forall d_i \in \mathcal{S}}\left(1-I_i^S\right) \cdot \alpha_i(t)+\lambda(t)$$

(2)
[TeX:] $$\text { where } I= \begin{cases}0, & \text { scheduled }, \\ 1, & \text { otherwise }\end{cases}$.$

Surveillance drone hands over data to the selected delivey drone and acts in a way to maximize the profits as much as possible during the process. For the rotary-wing drone, the hovering power consumption [TeX:] $$P_h$$ can be represented as the sum of the power [TeX:] $$P_o$$ needed to turn the blade around (rotor) and the power[TeX:] $$P_i$$ needed to lift the weight of the drone, i.e.,

TABLE I

DRONE SPECIFICATION.
Surveillance drone Delivery drone
Model Phantom4 PRO Mavic 2
Size 1 ft (diagonal) [TeX:] $$322 \times 224 \times 84 \mathrm{~mm}$$
Weight 1388 g 907 g
Speed (max) 72 km/h 72 km/h
Flight time (max) 30 min 31 min
Battery capacity 5870 mAh 2970 mAh

where the parameters in this equation are summarized in Table II [34], [35].

2) Delivery Drone Model: In the case of a delivery drone, the battery capacity determines its performance. The delivery drone has two modes of flight: 1) Hovering along the path until it matches with the surveillance drone through auction, and 2) flying between two points for data delivery. In other words, the energy expenditure of delivery drones is the sum of hovering and traveling power consumption. The communication related energy is used for various communication functions such as signal transmission, computation, and signal processing. Typically, communication-related energy is not considered due to its relatively small value [17], [32], [33]. The energy consumption for time T with speed V can be formulated as follows where the value depend on several factors such as weight, air density, rotor disc area, blade angular velocity and etc as given in Table II [34], [35], i.e.,

(4)
[TeX:] $$\begin{aligned} E=T[ & P_0\left(1+\frac{3 V^2}{U_{t i p}^2}\right)+P_i\left(\sqrt{1+\frac{V^4}{4 v_0^4}}-\frac{V^2}{2 v_0^2}\right)^{1 / 2} \\ & \left.+\frac{1}{2} d_0 \rho s A V^3\right]. \end{aligned}$$

The model for a delivery drone in this paper is DIJ Mavic 2, and its specification is shown in the following Table I. The amount of energy can be calculated with the specification parameters. Delivery drones make decisions whether to join the auction in consideration of the amount of energy with the energy model.

3) Mobility Planning for Delivery Drones: This section presents the drone behavior while carrying out the delivery mission and the movement can be divided into three steps as shown in Fig. 3. The first step is to determine whether delivery drone can perform a given task as described in Algorithm 1. Surveillance drone in need of data transmission broadcasts the maximum allowed latency T and amount of required data D when requesting data to nearby delivery drones. Once the data amount is known, delivery drones can calculate the time [TeX:] $$t_{\text {transfer }}$$ for data delivery based on the Wi-Fi direct where the transmission rate is 250 Mbps. Through the difference between the maximum latency T and [TeX:] $$t_{\text {transfer }},$$ maximum flight time [TeX:] $$t_{\text {flight }}$$ is computable. We assume that delivery drones know the total flying distance [TeX:] $$l_i$$ from their current location to the final destination. The minimum required flight velocity [TeX:] $$v_{\min }$$ is obtained via distance [TeX:] $$l_i$$ and flight time [TeX:] $$t_{\text {fly }} .$$ Next, using (4), we can calculate the amount of energy consumed with constant flying speed [TeX:] $$v_{\min }.$$ Each delivery drone can determine whether they participate in the auction or not by comparing the remaining energy and the amount of energy required. Among the eligible delivery drones, the one selected as winner fly to the area where it can communicate with the surveillance. The winner drone receives the collected data over WiFi-direct. In the second step, the delivery drone flies all the way to the BS coverage. We assume that the drone is in a forward flight mode with constant speed on the journey. Refer to the subsection III-B for energy consumption along the path.

Fig. 3.

Delivery Drone Trajectory.
3.png

TABLE II

NOTATIONS.
Notation Value
Aircraft weight, N 8
Rotor radius, R 0.4
Rotor disc area, [TeX:] $$A=\pi R^2$$ 0.503
Number of blades, b 4
Rotor solodity,[TeX:] $$s=\frac{0.0157 b}{\phi R}$$ 0.05
Blade angular velocity, [TeX:] $$\Omega$$ 300
Tip speed of the rotor blade, [TeX:] $$U_{t i p}=\Omega R^2$$ 120
Fuselage drag ratio, [TeX:] $$d_0=\frac{0.0151}{s A}$$ 0.6
Air density, [TeX:] $$\rho$$ 1.225
Mean rotor-induced velocity in hovering, [TeX:] $$v_0=\sqrt{\frac{W}{s \rho A}}$$ 2.54
Profile drag coefficient, [TeX:] $$\delta$$ 0.012
Incremental correction factor to induced power, k 0.1

In the final step, a delivery drone that reaches the BS transfers the collected data. Then the BS distributes data to mobile devices in coverage. Alternatively, it can also be passed it to a big data platform, which enables data analysis through distributed data collections. After completing the mission, the delivery drone charges battery and start re-positioning.

IV. LEARNING-BASED OPTIMAL AUCTION FOR AUTONOMOUS AERIAL DELIVERY

A. Auction Design Concepts

In a single-item mechanism [TeX:] $$M=(g(\mathbf{b}), p(\mathbf{b}))$$ with a set of N of n bidders consists of an allocation and payment rule. Allocation rule choose a feasible allocation [TeX:] $$\mathbf{g}(\mathbf{b}) \in X \subseteq R^n$$ as a function of the bids, which is [TeX:] $$\sum g_i(b) \leq 1.$$ Payment rule choose payments [TeX:] $$\mathbf{p}(\mathbf{b}) \in R^n$$ as a function of the bids. And Bidder i has utility [TeX:] $$u_i(\mathbf{b})=v_i \cdot g_i(\mathbf{b})-p_i(\mathbf{b}).$$ In our auction settings, allocation and payment rule follows a standard SPA and only the concept of Myerson’s virtual valuation is added. To truthfully allocate items, the mechanism must deter the presence of malicious bidders . Here are several desirable properties that a truthful mechanism should hold.

Definition 1 (Individual Rationality (IR)): A truthful mechanism M = (g(b), p(b)) is individually rational for all bidders, if their utilities are more than 0.

(5)
[TeX:] $$U_i(b) \geq 0, \forall i \in N$$

Definition 2 (Incentive Compatibility (IC)): A truthful mechanism g(b), p(b) is incentive compatible if no requester can improve its utility by misreporting its bid.

(6)
[TeX:] $$U_i\left(b_i, b_{-i}\right) \geq U_i\left(\hat{b}_i, b_{-i}\right), \forall \hat{b}_i \in \eta(i), \forall i \in N.$$

Definition 3 (Budget Balance (BB)): A truthful mechanism g(b), p(b) is individually rational for all bidders, if their utilities are more than 0.

(7)
[TeX:] $$p_i(b) \leq B_i, \forall i \in N.$$

With the allocation, payment rule and the monotonic transform function, the objective of maximizing the surveillance drone’s revenue can be achieved. The computed revenue for winning bidder is R(g(b), p(b)), which can be formulated as,

(8)
[TeX:] $$R(g(\mathbf{b}), p(\mathbf{b}))=E_{\mathbf{b} \sim F}\left\{\sum_{i \in N}\left(p_i(\mathbf{b})-c\right) \cdot g_i(\mathbf{b})\right\},$$

where c is the processing cost of surveillance drone for transmitting a unit of data to winner drone. And we assume that every bidder’s private valuations follows the same distribution as in (19). Therefore, our auction problem can be formulated as,

(9)
[TeX:] $$\max R(g((b)), p((b)))$$

(10)
[TeX:] $$\begin{array}{ll} \text { s.t. } & \text { IR : } U_i(b) \geq 0, \forall i \in N \\ & \text { IC : } U_i\left(b_i, b_{-i}\right) \geq U_i\left(\hat{b}_i, b_{-i}\right), \end{array}$$

(11)
[TeX:] $$\forall \hat{b}_i \in \eta(i), \forall i \in N$$

(12)
[TeX:] $$\mathrm{BB}: p_i(b) \leq B_i, \forall i \in N,$$

where this optimization program satisfies when [TeX:] $$\phi$$ is a strictly monotone.

B. Auction Design for Delivery Drone Scheduling

1) Auction-based Delivery Drone Scheduling Process: To start the auction process in Fig. 4, a surveillance drone in need broadcasts an auction start message and its delivery conditions, i.e., minimum data amount D, maximum delay time T. The delivery drone in coverage (1) receives the auction request message and delivery conditions. (2) In the participation decision stage, each delivery drone that receives the start message first determines whether it is available to attend the auction. A comparison between the minimum required energy for data transport and the residual energy for each individual drone is needed. (3) The participating delivery drones bid based on their valuation to increase their utilities. (4) Then the surveillance drone collects all bids from the delivery drone and which are in transform form. (5) The drone with the highest allocation probability becomes a winner and pays final the determined payment and is detailed in Section IV-C.

Fig. 4.

Auction computation process.
4.png

Algorithm 1
Candidate selection
pseudo1.png

2) Individual Bid Valuation: Drones independently determine the bid value according to their valuations. The valuation of drones can be modeled with ground demand in area as [TeX:] $$d_i$$ and the sacrificed energy ratio as [TeX:] $$p_i$$ in (13).

(13)
[TeX:] $$v_i=\frac{d_i}{p_i}.$$

Here, the demand of mobile devices in the base station coverage, which is the drone’s final destination, can be denoted as di, and its value is in range 0 to 1. The delivery drones have the mission of providing information to the ground users in the area covered by the drone. The initial amount of individual energy can be denoted as [TeX:] $$a_i,$$ the amount of total energy for the delivery mission as [TeX:] $$e_i,$$ and the residual energy as [TeX:] $$\gamma_i,$$ i.e., [TeX:] $$e_i=a_i+r_i.$$ Then the ratio of consumption energy to initial energy can be denoted as [TeX:] $$p_i=a_i / e_i.$$ It can be calculated with the drone energy model [33], in consideration of minimum data amount, maximum delay time, distance, and drone specification. In general, when the value of [TeX:] $$d_i$$ is larger, the drones are willing to join the auction and pay cost for the chance to match with the surveillance drone. On the contrary, when the [TeX:] $$p_i$$ is large, the drones would be less incentive to join the auction. Bidders’ valuation profile is drawn from a distribution fV (v). Thus, the distribution fV (v) can be determined based on the distribution of [TeX:] $$d_i \text { and } p_i$$ denoted as fD(d) and fP (p) respectively.

Due to the deficiency of prior knowledge, we assume the two variables d, p are independent and uniformly distributed in range [TeX:] $$d_i \sim U\left[d_{\min }, d_{\max }\right] \text { and } p_i \sim U\left[p_{\min }, p_{\max }\right].$$ To apply the Jacobian transformation, v is set as [TeX:] $$v=\frac{d}{p} \text { and } z \text { is } z=p,$$ then d and p is [TeX:] $$d=p \times v, p=z$$ respectively. The Jacobian matrix is as follows and determinant J is equal to z, i.e.,

[TeX:] $$J=\left|\begin{array}{ll} \frac{\partial_d}{\partial_v} & \frac{\partial_d}{\partial_z} \\ \frac{\partial_p}{\partial_v} & \frac{\partial_p}{\partial_z} \end{array}\right|=\left|\begin{array}{ll} z & v \\ 0 & 1 \end{array}\right|=z$$

Given that the d and p follow uniform distribution, the joint distribution fV,Z (v, z) can be obtained as,

(14)
[TeX:] $$f_{V, Z}(v, z)=f_{D, P}(d(v, z), p(v, u))|J(V, Z)|$$

(15)
[TeX:] $$=f_d(v, z) f_p(z)|z|$$

(16)
[TeX:] $$=\frac{1}{\left(d_{\max }-d_{\min }\right)\left(p_{\max }-p_{\min }\right)}|z|.$$

As a sequence, the distribution of v, i.e., fV (v), which is the marginal function can be derived as,

(17)
[TeX:] $$f_V(v)=\int f_{V, U}(v, u) d u$$

(18)
[TeX:] $$=\int_{p_{\min }}^{p_{\max }} \frac{1}{\left(d_{\max }-d_{\min }\right)\left(p_{\max }-p_{\min }\right)}|u| d u$$

(19)
[TeX:] $$=\frac{p_{\max }+p_{\min }}{2\left(d_{\max }-d_{\min }\right)}$$

Therefore, each drone submits bid according to its private value, where it is in between [TeX:] $$v \sim\left[p_{\min } / d_{\max } ; p_{\max } / d_{\min }\right].$$

When delivery drones compete for data delivery, there is a possibility of malicious drone bids higher than its value. Our auction needs to let the participants act truthfully to ensure system stability and achieve revenue-optimal in the same time. Since Myerson presents provable analytical results for single item auction which can optimize the auctioneer revenue where each buyer has its own private valuation of the resource while guarantees truthfulness [27], we used a variant of Myerson auction using deep learning.

Fig. 5.

Deep learning auction framework.
5.png
C. Neural Myerson Auction for Optimal Delivery

This section presents how deep learning-based auction maximizes the expected revenue of surveillance drone while guaranteeing truthfulness and revenue-optimal. The monotonic network is used for random sampling for approximating pseudooptimal revenue values. In addition, allocation networks and payment networks are for determining the winner drone and the payment, respectively. Detailed neural architectures for deep learning to solve our proposed auction-based problems are organized in Algorithm 2 and presented as following subsections, i.e., monotonic networks (refer to Section IV-C1), allocation networks (refer to Section IV-C2), and payment networks (refer to Section IV-C3)

1) Virtual Valuation Function: Our virtual valuation function in auction network is denoted as [TeX:] $$\phi_i$$ and takes the role of virtual valuation in Myerson auction [30]. The input bids [TeX:] $$b_i$$ of delivery drones are transformed to [TeX:] $$\overline{b_i}$$ as it passes the monotonic network which consists max/min operations over several linear functions. Monotonic network [TeX:] $$\phi_i$$ uses K groups of J linear functions and is defined as follows [30].

2) Winner Determination Function: The SPA allocation network maps the surveillance drone and delivery drone with the highest non-zero transform bid. The layer of softmax draws the allocation probabilities as an output with the transformed bids [TeX:] $$\overline{b_i}$$ and dummy input [TeX:] $$b_{N+1}=0.$$ Semantically, the softmax is used for taking the maximum value. The allocation network with softmax can be represented as follows,

(20)
[TeX:] $$g_i(\bar{b})=\operatorname{softmax}_i\left(\bar{b}_1, \cdots, \bar{b}_{N+1} ; k\right)$$

(21)
[TeX:] $$=\frac{e^{k \bar{b}_i}}{\sum_{j=1}^{N+1} e^{k \bar{b}_j}}, \forall i \in N$$

where k is a parameter of softmax function and it determines the quality of the approximation [11], [30].

Algorithm 2
Deep learning-based auction algorithm
pseudo2.png

3) Payment Function: The payment network determines the final payment to the winner delivery drone. Payment network uses a ReLU activation function as follows to make the payment non-negative,

(22)
[TeX:] $$p_i^0(\bar{b})=\operatorname{Re} L U\left(\max _{\forall j \neq i} \overline{b_j}\right), \forall i \in N.$$

Finally, the final payment of the winner delivery drone to surveillance drone can be calculated as follows,

(23)
[TeX:] $$p_i=\phi_i^{-1}\left(p_i^0(\bar{b})\right).$$

4) Neural Network Training and Complexity: Neural architecture trains parameters [TeX:] $$w_{k j}^i \text { and } \beta_{k j}^i$$ with the valuation profiles as the training set and minimize the loss function. Here, we defined the loss function as the negative revenue in Myerson auction. The loss function [TeX:] $$\hat{R}$$is defined as follows,

(24)
[TeX:] $$\hat{R}(w, \beta)=-\sum_{i=1}^N g_i^{(w, \beta)}\left(v^s\right) p_i^{(w, \beta)}\left(v^s\right).$$

The results of allocation networks and payment networks are used for training parameters, and we used the stochastic gradient descent optimizer to train the loss function [TeX:] $$\hat{R}$$.

In deep learning computation procedures, we have two phases, i.e., (i) training phase and (ii) inference phase. During the training phase, it takes time for training for cost function minimization with iterative computation such as stochastic gradient descent for backward propagation. Most work evaluates the complexity as a training time. The training time was around 5 minutes running on the CPU (Intel i7, 8 cores) and RAM (16GB). On the other hand, during the inference phase, conducting simple dense layer computation with trained optimal/approximated parameters is required which are the matrix computation and activation function computation. Therefore, the computation time consists of a monotonic network computation with several layers (i.e., the algorithm complexity can be linearly scaled). It can be represented as [TeX:] $$\left(O_M(m)+O_A(m)\right) \times N L, \text { where } O_M(m) \text { and } O_A(m)$$ is the computation complexity of the matrix operation for each layer [29]. Here, m and NL denotes node number and number of layers. After the training, the real-time execution in the inference phase can be done within a seconds.

Fig. 6.

Example of drone deployment.
6.png

5) Auction Properties: In previous section, we define the truthful characteristics and the auction network consisting allocation rule g and payment rule p. According to Myerson theorem, we can guarantee the truthful condition IR and IC.

Theorem 1 (Myerson [27]): For single parameter environments, any set of strictly monotone functions [TeX:] $$\phi_1, \phi_2, \cdots, \phi_N,$$ an auction that assigns an item to the bidder with highest virtual valuation [TeX:] $$\phi_i\left(v_i\right)$$ and the payment is determined by the second highest virtual valuation is IR and IC.

Let the neural architecture that have K groups and the outputs are denoted by [TeX:] $$t_1, t_2, \cdots, t_R . \text { Let } h_r$$ denote the number of hyperplanes within group [TeX:] $$r, r=1,2, \cdots, R.$$ The parameters of the hyperplanes are denoted by [TeX:] $$\mathbf{W}_{(r, 1)}, \mathbf{W}_{(r, 2)}, \cdots, \mathbf{W}_{\left(r, h_r\right)},$$ where the matrix of all weights and biases is denoted by W. Then, the output at group [TeX:] $$r \text { is } t_r(x)=\min _j\left(\mathbf{w}_{(r, j)}\right. \text {. } \left.\mathrm{x}+\theta_{(r, j)}\right), 1 \leq j \leq h_r$$ and the final output is [TeX:] $$\mathrm{O}_{\mathrm{x}}= \max _r t_r(x)$$ [37], which is same as our virtual valuation network in IV-C1. This network obeys increasing monotonicity when all weights in the first layer are constrained to be positive [37], which is the satisfied condition in our system.

V. PERFORMANCE EVALUATION

A. Evaluation Setup

1) Simulation Environment: For the simulation study, we placed four base stations are placed at the edge of [TeX:] $$7 \mathrm{~km} \times 7 \mathrm{~km}$$ size map and surveillance drone was placed in the center and delivery drones were randomly placed at 150 to 150 m high. Fig. 6 shows an example of drone deployment in 3D space and their position is listed in Table III checked with candidate availability. In this example, 15 delivery drones exist around the surveillance drone and only 5 of them are available to attend the auction. Each delivery drones consider its energy and, total round-trip distance from the initial location to the base station via surveillance drone.

2) Algorithmic Setting - Bid Valuation: We constructed the bid sets by randomly allocate the parameter value of the drone energy model. The initial energies of the drone battery are randomized in [2300, 2970] mAh with an output voltage of 7.6V. For the stable drone operation, we calculated the actual available amount based on 80 percent of the initial energies of the battery. As a sequence, we can derive the value [TeX:] $$p_i$$ which is the sacrificed energy ratio. And for the [TeX:] $$d_i$$ other component of private valuation, we randomly selected within [0, 1]. Table IV shows the 10 computed bidding samples of five actual participating delivery drones’. The values are various in the range between 0 to 1.

TABLE III

LOCATIONS.
Location Availability
Surveillance drone (3.5000, 3.5000, 0.1500)
Delivery drone 1 (5.3891, 6.4843, 0.1018) V
Delivery drone 2 (1.0263, 6.9607, 0.1159) V
Delivery drone 3 (2.1797, 3.9923, 0.1275) V
Delivery drone 4 (5.4356, 4.6516, 0.1272) V
Delivery drone 5 (5.5366, 2.5679, 0.1233) V
Delivery drone 6 (3.9473, 3.9079, 0.1090) X
Delivery drone 7 (1.0103, 3.1432, 0.1151) X
Delivery drone 8 (5.8648, 1.8963, 0.1249) X
Delivery drone 9 (5.1225, 4.2144, 0.1005) X
Delivery drone 10 (2.2145, 3.5348, 0.1146) X
Delivery drone 11 (1.6754, 1.7261, 0.1365) X
Delivery drone 12 (4.2649, 3.7917, 0.1014) X
Delivery drone 13 (5.5730, 6.9398, 0.1363) X
Delivery drone 14 (3.8859, 5.2690, 0.1314) X
Delivery drone 15 (1.8138, 4.2915, 0.1307) X
Base station 1 (6.5000, 0.5000, 0.0700)
Base station 2 (0.5000, 0.5000, 0.0700)
Base station 3 (0.5000, 6.5000, 0.0700)
Base station 4 (6.5000, 6.5000, 0.0700)

TABLE IV

DATA SAMPLE OF DELIVERY DRONES’ BIDDING VALUE.
No. Drone 1 Drone 2 Drone 3 Drone 4 Drone 5
1 0.6802 0.4398 0.8589 0.7860 0.9420
2 0.4552 0.5123 0.7315 0.7600 0.8045
3 0.5243 0.5373 0.7308 0.8233 0.8677
4 0.6319 0.7585 0.8090 0.8902 0.9144
5 0.4284 0.4567 0.5891 0.7790 0.8126
6 0.3749 0.6617 0.7290 0.8664 0.9306
7 0.3347 0.6277 0.4597 0.6433 0.9502
8 0.3958 0.6565 0.7721 0.8753 0.9711
9 0.5070 0.5135 0.5687 0.6221 0.8643
10 0.1269 0.4253 0.5004 0.8880 0.9848

However, neither the prior knowledge of the valuation’s distribution nor the real-world data is available in our situation. So the bid set is constructed based on the valuation of drones with the distribution assumptions. The auction simulation works through a randomly constructed bid set and infer results from it.

Fig. 7.

Revenue comparison graph by auction method and number of participating bidders.
7.png

Fig. 8.

The gap between DLA and SPA.
8.png

TABLE V

SIMULATION PARAMETERS.
Parameter Value
Number of bidders (N) 5, 7
Number of groups (K) 5
Number of linear functions (J) 3
Number of iterations 500
Approximate quality k 1
Distribution of valuation [TeX:] $$f_V(v)$$ ∼ U[0.5, 1]
B. Evaluation Results

This section presents the DLA (deep learning-based optimal auction) for data delivery and the proposed deep learning based optimal auction compared with SPA as a baseline. The neural network runs on the pyTorch library. Evaluation was performed under where the numbers of delivery drones are 5 and 7 with the distribution of valuation [TeX:] $$f_V(v) \sim U[0.5,1]$$\ and the neural network has 5 groups and 3 linear functions. Overall 500 iterations were done with approximation quality k is 1. The simulation parameters are organized in Table V.

The results in Fig. 7 shows revenue comparison between SPA and DLA in 4 different plottings. In Fig. 7(a), revenues comparison for 5 bidders and 10 bidders are shown over the iterations. The revenue obtained from the deep learning auction is higher than the baseline SPA for all cases. Fig. 7(b) represents the case where the participation of the five and ten bidder’s in each of the DL and SPA process is shown as a CDF of their revenue. The graph shows that the revenue of the 10 bidders is higher than that of 5 bidders. It can be confirmed that our simulation reflects the obvious phenomenon that the bidding value increases as the number of competitors increases. The experiment results compare the top 25 percentile, 50 percentile, and 75 percentile value of CDF as listed in Table VI. The mean value (i.e., 50% of CDF) is 0.7055, 0.7660, 0.7357, and 0.8480, confirming the revenue increase through numerical values.

Fig. 8(a) shows the 300 individual deep learning auction results. The revenue gap between spa and DLA is obtained for each iteration, and sorted in ascending order. That is, the corresponding graph shows the range of gaps that can occur over iterations. Overall, the revenue is improved, and the largest increase was up to 0.6. Fig. 8(b) shows the 10 cases of experiments in random order. The number on the X-axis represents the indices of individual cases. The result compares the revenue of surveillance drone via deep learning auction with SPA in barplot. Fig. 8 confirms that the value is generally larger than the SPA. Through the barplot, we can confirm DLA can improve SPA’s undervalued revenue due to its mechanism.

TABLE VI

STATISTIC OF CDF IN FIG. 6(B).
SPA with 5 bidders DLA with 5 bidders SPA with 10 bidders DLA with 10 bidders
25% 0.4987 0.7514 0.7059 0.8222
50% 0.6598 0.8672 0.7970 0.9132
75% 0.7684 0.9368 0.8601 0.9578

Fig. 9.

The changes from the advent of false bidder.
9.png

Fig. 9 presents the changes from the advent of a false bidder drone. Fig. 9(a) shows the revenue changes due to the particular bidder’s untruthful behavior. The experiment assumes the situation when five bidders bid for the item and one drone happens to false bid. The second-highest bid is 0.7832, and the truthful value of the malicious drone is 0.8408. We set the fake value by adjusting the false rate from 0.2 to 2.0. False rate is a multiplying value that indicates how much to adjust from the initial truthful value. The black line is the actual value taken by the winner drone in a deep learning auction, and the blue line is the fixed payment of the winner in the SPA. The payment change of the fake bidder over the false rate is in a red line. When the fake bidder drone submits a bid 0.2-0.8 times larger than the actual value, it has no chance to win the auction. When the fake bidder drone submits a bid 1.2-2.0 times larger than the actual value, it becomes the winner but overpays its valuation. In terms of the utility of individual drones, the loss leads the utility negative. Therefore, there is no reason for a delivery drone to fake bid suffering the needless loss and shows our system prevents untruthful behavior. Fig. 9(b) shows that bidders have no incentive to false bid in the same manner. The probability increases as the false rate increases, but the utility gradually decreases. With the false rate is equal to 1, the left and right sides of the graph show polar opposite characteristics. When the false rate is in 0.2–0.8, there is a little chance of winning, and when it is in 1.2–2.0, there is a high probability. However, when the false rate is 0.2–0.8, the false bidder cannot win the auction, thus the utility is zero. In addition, when it is 1.2–2.0, it has to pay more than its valuation, so it goes negative.

VI. CONCLUDING REMARKS AND FUTURE WORK

In this paper, an asynchronous data drone delivery is possible in aerial surveillance big data platforms. With the deeplearning auction, our platform achieves the initial objective of maximizing the revenue of the surveillance drone. The evaluation results confirm that the auction-based matching problem between the delivery drone and surveillance drone gives distinct revenue benefits compared to the traditional SPA. The results also give the reasonable inference that the participating drones are avoided from fake bidding.

For future research directions, a deep learning-based multiitem auction can be considered to extend our proposed algorithm, e.g., the multi-item auction which processes data from multiple surveillance drones in distributed regions can be operated in realistic environment. Furthermore, we can redesign our proposed algorithm based on various realistic assumptions, e.g., various types and operators among drones and the corresponding limitations in terms of control and coordination. We will also redesign our proposed algorithm based on various realistic assumptions, e.g., various types and operators among drones and the corresponding limitations in terms of control and coordination. Lastly, we will also research whether reverse or other auction methods can be applied to drone-based emerging applications.

Biography

Haemin Lee

Haemin Lee has been with Korea University, Seoul, Republic of Korea, since September 2020, and she is currently a Ph.D. candidate at the Department of Electrical and Computer Engineering, Seoul, Republic of Korea. She received the B.S. degree in Statistics from Sookmyung Women’s University, Seoul, Republic of Korea, in 2019. Her research focuses include deep learning algorithms and their applications to communication networks.

References

  • 1 F. Zhang, X. Zhou, and M. Sun, "Constrained VCG auction for spatial spectrum reuse with flexible channel evaluations," in Proc. IEEE GLOBECOM, Dec. 2017, pp. 1-6.doi:[[[10.1109/glocom.2017.8254091]]]
  • 2 A. Verma, P. Bhattacharya, M. Zuhair, S. Tanwar and N. Kumar, "VaCoChain: Blockchain-based 5G-assisted UAV vaccine distribution scheme for future pandemics," IEEE J. Biomed. Health Inform., early access, Aug. 2021.doi:[[[10.1109/JBHI.2021.3103404]]]
  • 3 R. Geraldes, A. Gonçalves, T. Lai, M. Villerabel, W. Deng, A. Salta, K. Nakayama, Y . Matsuo, and H. Prendinger, "UAV-based situational awareness system using deep learning," IEEE Access, vol.7, pp. 122583122594, Sep. 2019.doi:[[[10.1109/ACCESS.2019.2938249]]]
  • 4 S. Jung and J. Kim, "Adaptive and stabilized real-time super-resolution control for UAV-assisted smart harbor surveillance platforms," J. RealTime Image Process., vol.18, no.5, pp. 1815-1825, Oct. 2021.doi:[[[10.1007/s11554-021-01163-2]]]
  • 5 D. Kim, S. Park, J. Kim, J. Bang, S. Jung, "Stabilized adaptive sampling control for reliable real-time learning-based surveillance systems," J. Commun. Netw., vol.23, no.2, pp. 129-137, Apr. 2021.doi:[[[10.23919/jcn.2021.000009]]]
  • 6 M. Mozaffari, A. Kasgari, W. Saad, M. Bennis, and M. Debbah, "Beyond 5G with UAVs: Foundations of a 3D wireless cellular network," IEEE Trans. Wireless Commun., vol.18, no.1, pp. 357-372, Jan. 2019.doi:[[[10.1109/TWC.2018.2879940]]]
  • 7 D. Liu, Y . Xu, J. Wang, Y . Xu, A. Anpalagan, Q. Wu, H. Wang, and L. Shen, "Self-organizing relay selection in UAV communication networks: A matching game perspective," IEEE Wireless Commun., vol.26, no.6, pp. 102-110, Oct. 2019.doi:[[[10.1109/MWC.001.1700434]]]
  • 8 W. Na, J. Park, C. Lee, Cheol, K. Park, Kyoungjun, J. Kim and S. Cho, "Energy-efficient mobile charging for wireless power transfer in Internet of Things networks," IEEE Internet Things J., vol.5, no.1, pp. 79-92, Nov. 2017.doi:[[[10.1109/jiot.2017.2772318]]]
  • 9 S. Park, W. Shin, M. Choi, J. Kim, "Joint mobile charging and coveragetime extension for unmanned aerial vehicles," IEEE Access, vol.9, pp. 94053-94063, Jun. 2021.doi:[[[10.1109/ACCESS.2021.3093431]]]
  • 10 E. Maskin, "Auctions and efficiency." In: Dewatripont, M., Hansen, L., Turnovsky, S. (Eds.), Advances in economic theory (invited lectures from the 8th World Congress of the Econometric Society). Cambridge Univ. Press, pp. 1-24.custom:[[[-]]]
  • 11 M. Shin, J. Kim, and M. Levorato, "Auction-Based charging scheduling with deep learning framework for multi-drone networks," IEEE Trans. Veh. Technol., vol.68, no.5, pp. 4235-4248, May 2019.doi:[[[10.1109/tvt.2019.2903144]]]
  • 12 X. Wang, X.chen, and W. Wu, "Towards truthful auction mechanisms for task assignment in mobile device clouds," in Proc. IEEE INFOCOM, Atlanta, GA, USA, May 2017, pp. 1-9.doi:[[[10.1109/infocom.2017.8057198]]]
  • 13 L. Park, S. Jeong, D. S. Lakew, J. Kim, and S. Cho, "New challenges of wireless power transfer and secured billing for Internet of electric vehicles," IEEE Commun. Mag., vol.57, no.3, pp. 118-124, Mar. 2019.doi:[[[10.1109/mcom.2018.1800291]]]
  • 14 L. Park, S. Jeong, J. Kim, and S. Cho, "Joint geometric unsupervised learning and truthful auction for local energy market," IEEE Trans. Ind. Electron., vol.66, no.2, pp. 1499-1508, Feb. 2019.doi:[[[10.1109/tie.2018.2849979]]]
  • 15 W. Sun, J. Liu, Y . Yue and H. Zhang, "Double auction-based resource allocation for mobile edge computing in industrial Internet of things," IEEE Trans. Ind. Inform., vol.14, no.10, pp. 4692-4701, Oct. 2018.doi:[[[10.1109/tii.2018.2855746]]]
  • 16 S. Say, H. Inata, J. Liu, and S. Shimamoto, "Priority-based data gathering framework in UAV-assisted wireless sensor networks," IEEE Sensors J., vol. 16, no.14, pp. 5785-5794, Jul. 2016.doi:[[[10.1109/JSEN.2016.2568260]]]
  • 17 C. Zhan, Y . Zeng, and R. Zhang, "Energy-efficient data collection in UAV enabled wireless sensor network," IEEE Wireless Commun. Lett., vol.7, no.3, pp. 328-331, Jun. 2018.doi:[[[10.1109/LWC.2017.2776922]]]
  • 18 D. Huynh-Van, T. Do, L. Nguyen, M. Le, N. V o and T. Duong, "Realtime optimised path planning and energy consumption for data collection in UAV-aided intelligent wireless sensing," IEEE Trans. Ind. Inform., pp. 1-1, Sep. 2021.doi:[[[10.1109/TII.2021.3114358]]]
  • 19 J. Gong, T. Chang, C. Shen, and X. Chen, "Flight time minimization of UAV for data collection over wireless sensor networks," IEEE J. Sel. Areas Commun., vol.36, no.9, pp. 1942-1954, Sep. 2018.doi:[[[10.1109/JSAC.2018.2864420]]]
  • 20 C. Singhal and B. Chandana, "Aerial-SON: UAV-based self-organizing network for video streaming in dense urban scenario," in Proc. IEEE COMSNETS, Jan. 2021, pp. 7-12.doi:[[[10.1109/COMSNETS51098.2021.9352853]]]
  • 21 V . Krishna, Auction Theory, Academic Press, 2009.doi:[[[10.1017/9781108649919.020]]]
  • 22 p. Klemperer, "Auction Theory: A Guide to the literature," J. Econ Surv., vol.13, no.3, pp. 227-286, 1999.doi:[[[10.1111/1467-6419.00083]]]
  • 23 B. Dai, H. Chen, and G. Yang, "Price-setting based combinatorial auction approach for carrier collaboration with pickup and delivery requests," Operational Research, vol.14, no.3, pp. 361-386, Feb. 2014.doi:[[[10.1007/s12351-014-0141-1]]]
  • 24 D. C. Marinescu, A. Paya, J. P. Morrison and P. Healy, "An auction-driven self-organizing cloud delivery model," arXiv preprint arXiv:1312.2998, Dec. 2013.custom:[[[-]]]
  • 25 B. Coltin and M. Veloso, "Online pickup and delivery planning with transfers for mobile robots," in Proc. IEEE ICRA, Jeju, Republic of Korea, May 2014, pp. 5786-5791.doi:[[[10.1109/icra.2014.6907709]]]
  • 26 He, Junyi and Zhang, Di and Zhou, Yuezhi and Zhang, Yaoxue, "A truthful online mechanism for collaborative computation offloading in mobile edge computing," IEEE Trans. Ind. Inform., vol.16, no.7, pp. 4832-4841, Jul. 2020.doi:[[[10.1109/tii.2019.2960127]]]
  • 27 R. Myerson, "Optimal auction design," Math. of Operations Res., vol.6, no.1, pp. 58-73, Feb. 1981.doi:[[[10.1287/moor.6.1.58]]]
  • 28 H. Lee, Haemin, S. Jung, and J. Kim, "Truthful electric vehicle charging via neural-architectural myerson auction," ICT Express, vol.7, no.2, pp. 196-199, Jun. 2021.doi:[[[10.1016/j.icte.2021.03.009]]]
  • 29 K. Zhu, Y . Xu, J. Qian, and D. Niyato, "Revenue-optimal auction for resource allocation in wireless virtualization: A deep learning Approach," in Proc. IEEE ICPADS, Tianjin, China, Dec. 2019.doi:[[[10.1109/tmc.2020.3021416]]]
  • 30 N. Luong, Z. Xiong, P. Wang, and D. Niyato, "Optimal auction for edge computing resource management in mobile blockchain networks: A deep learning approach," in Proc. IEEE ICC, Kansas City, MO, USA, May 2018, pp. 1-6.doi:[[[10.1109/icc.2018.8422743]]]
  • 31 K. Kuo, A. Ostuni, E. Horishny, M. J. Curry, S. Dooley, P.-y. Chiang, T. Goldstein and J. P. Dickerson, "ProportionNet: Balancing fairness and revenue for auction design with deep learning," arXiv preprint arXiv:2010.06398, Oct. 2020.custom:[[[-]]]
  • 32 A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L. Giordano, A. GarciaRodriguez, and J. Yuan, "Survey on UAV cellular commun.: Practical aspects, standardization advancements, regulation, and security challenges," IEEE Commun. Surv. and Tut., vol.21, no.4, pp. 3417-3442, Mar. 2019.doi:[[[10.1109/COMST.2019.2906228]]]
  • 33 Y . Zeng, J. Xu, and R. Zhang, "Energy minimization for wireless communication with rotary-wing UAV ," IEEE Trans. Wireless Commun., vol.18, no.4, pp. 2329-2345, Mar. 2019.doi:[[[10.1109/TWC.2019.2902559]]]
  • 34 L. Pugliese, F. Guerriero, D. Zorbas, and T. Razafindralambo, "Modelling the mobile target covering problem using flying drones," Optim. Lett., vol.10, no.5, pp. 1021-1052, Jun. 2016.doi:[[[10.1007/s11590-015-0932-1]]]
  • 35 D. Zorbas, L. Pugliese, T. Razafindralambo, and F. Guerriero, "Optimal drone placement and cost-efficient target coverage," J. Netw. Comput. Appl., vol.75, pp. 16-31, Nov. 2016.doi:[[[10.1016/j.jnca.2016.08.009]]]
  • 36 W. J. Yun, S. Park, J. Kim, M. Shin, S. Jung, D. Mohaisen, and J.-H. Kim, "Cooperative multi-agent deep reinforcement learning for reliable surveillance via autonomous multi-UAV control," IEEE Trans. Ind. Inform., vol. 18, no. 10, Oct. 2022.doi:[[[10.1109/TII.2022.3143175]]]
  • 37 H. Daniels and M. Velikova, "Monotone and partially monotone neural networks," IEEE Trans. Neural Netw., vol.21, no.6, pp. 906-917, Apr. 2010.doi:[[[10.1109/tnn.2010.2044803]]]