Fig. 3From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationUser power investment xi vs user ID: case of absence of malicious usersBack to article page