Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Gps spoofing attacks in fanets: A systematic literature review
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to
accomplish a common mission. The widespread acceptance of UAVs due to their low cost …
accomplish a common mission. The widespread acceptance of UAVs due to their low cost …
[HTML][HTML] Advances in UAV avionics systems architecture, classification and integration: A comprehensive review and future perspectives
HA Hashim - Results in Engineering, 2024 - Elsevier
Avionics systems of an Unmanned Aerial Vehicle (UAV) or drone are the critical electronic
components found onboard that regulate, navigate, and control UAV travel while ensuring …
components found onboard that regulate, navigate, and control UAV travel while ensuring …
Leo satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm
Due to their low orbit, low-Earth-orbit (LEO) satellites possess advantages such as minimal
transmission delay, low link loss, flexible deployment, diverse application scenarios, and low …
transmission delay, low link loss, flexible deployment, diverse application scenarios, and low …
Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions
Electric and Flying Vehicles (EnFVs) represent a transformative shift in transportation,
promising enhanced efficiency and reduced environmental impact. However, their …
promising enhanced efficiency and reduced environmental impact. However, their …
Impact of dataset and model parameters on machine learning performance for the detection of GPS spoofing attacks on unmanned aerial vehicles
GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These attacks
manipulate the true state of the unmanned aerial vehicles, potentially misleading the system …
manipulate the true state of the unmanned aerial vehicles, potentially misleading the system …
A study of the data security attack and defense pattern in a centralized UAV–cloud architecture
An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the
interest of several communities because of its capacity to increase the safety and …
interest of several communities because of its capacity to increase the safety and …
Secure wireless-powered NOMA communications in multi-UAV systems
D Diao, B Wang, K Cao, J Weng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates the green and secure communications of multi-UAV NOMA systems.
A joint energy transfer and artificial noise (ETAN) scheme is proposed to enhance the …
A joint energy transfer and artificial noise (ETAN) scheme is proposed to enhance the …
Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs)
Abstract Unmanned Aerial Vehicles (UAVs) have been gaining popularity in various
commercial, civilian, and military applications due to their efficiency and cost-effectiveness …
commercial, civilian, and military applications due to their efficiency and cost-effectiveness …
Sok of machine learning and deep learning based anomaly detection methods for automatic dependent surveillance-broadcast
N Çevik, S Akleylek - Ieee Access, 2024 - ieeexplore.ieee.org
This paper focuses on the vulnerabilities of ADS-B, one of the avionics systems, and the
countermeasures taken against these vulnerabilities proposed in the literature. Among the …
countermeasures taken against these vulnerabilities proposed in the literature. Among the …
Fixed-wing unmanned aerial vehicle 3d-model-based tracking for autonomous landing
The vast increase in the available computational capability has allowed the application of
Particle-Filter (PF)-based approaches for monocular 3D-model-based tracking. These filters …
Particle-Filter (PF)-based approaches for monocular 3D-model-based tracking. These filters …