Fig. 1From: Positioning and power optimisation for UAV-assisted networks in the presence of eavesdroppers: a multi-armed bandit approachSystem modelBack to article page