Fig. 4From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationUser data rate vs user ID: case of absence of malicious usersBack to article page