Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Unmanned aerial vehicles' remote identification: A tutorial and survey
UAV remote identification is an emerging technology that allows ground observers to identify
a drone in the airspace and obtain information about it and its operator. The goal is to …
a drone in the airspace and obtain information about it and its operator. The goal is to …
Secure UAV (drone) and the great promise of AI
UAVs have found their applications in numerous applications from recreational activities to
business in addition to military and strategic fields. However, research on UAVs is not going …
business in addition to military and strategic fields. However, research on UAVs is not going …
Privacy-aware remote identification for unmanned aerial vehicles: current solutions, potential threats, and future directions
The Federal Aviation Administration (FAA) recently introduced a new standard, namely,
remote identification, to improve accountability for unmanned aerial vehicles (UAVs) …
remote identification, to improve accountability for unmanned aerial vehicles (UAVs) …
Smart flood detection with AI and blockchain integration in Saudi Arabia using drones
Global warming and climate change are responsible for many disasters. Floods pose a
serious risk and require immediate management and strategies for optimal response times …
serious risk and require immediate management and strategies for optimal response times …
A review on software-based and hardware-based authentication mechanisms for the Internet of Drones
During the last few years, a wide variety of Internet of Drones (IoD) applications have
emerged with numerous heterogeneous aerial and ground network elements …
emerged with numerous heterogeneous aerial and ground network elements …
A verifiably secure ECC based authentication scheme for securing IoD using FANET
Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee
secure communication through unfavorable and unsafe channels. The speedy development …
secure communication through unfavorable and unsafe channels. The speedy development …
Public blockchain-envisioned security scheme using post quantum lattice-based aggregate signature for internet of drones applications
Due to high effectiveness and robust security protocols, lattice-based cryptography becomes
a very broadly applicable optimistic post-quantum technique that is recently used in public …
a very broadly applicable optimistic post-quantum technique that is recently used in public …
Game theory-based optimal cooperative path planning for multiple UAVs
This paper presents new cooperative path planning algorithms for multiple unmanned aerial
vehicles (UAVs) using Game theory-based particle swarm optimization (GPSO). First, the …
vehicles (UAVs) using Game theory-based particle swarm optimization (GPSO). First, the …
Risks of drone use in light of literature studies
This article aims to present the results of a bibliometric analysis of relevant literature and
discuss the main research streams related to the topic of risks in drone applications. The …
discuss the main research streams related to the topic of risks in drone applications. The …
LMAS-SHS: A lightweight mutual authentication scheme for smart home surveillance
The network-enabled smart objects are evolving everywhere in the modern era to solve
numerous problems like real-world data collection from the environment, communication …
numerous problems like real-world data collection from the environment, communication …