Fig. 2From: Positioning and power optimisation for UAV-assisted networks in the presence of eavesdroppers: a multi-armed bandit approachHeatmap for \({\overline{\Delta }}\) values due to the presence of UAV jammers on a circular region around AliceBack to article page