Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Review on Hardware Devices and Software Techniques Enabling Neural Network Inference Onboard Satellites
Neural networks (NNs) have proven their ability to deal with many computer vision tasks,
including image-based remote sensing such as the identification and segmentation of …
including image-based remote sensing such as the identification and segmentation of …
Evaluating Transport Layer Congestion Control Algorithms: A Comprehensive Survey
Congestion Control (CC) limits the transmission rate of data packets in the transport layer
protocol, eg, in TCP and QUIC, of a sending endpoint so as to mitigate the congestion in …
protocol, eg, in TCP and QUIC, of a sending endpoint so as to mitigate the congestion in …
Protecting autonomous UAVs from GPS spoofing and jamming: A comparative analysis of detection and mitigation techniques
P Joeaneke, O Obioha Val, OO Olaniyi… - … Olumide Samuel and …, 2024 - papers.ssrn.com
This study investigates the vulnerabilities of unmanned aerial vehicles (UAVs) to GPS
spoofing and jamming, addressing three key research questions:(1) What are the common …
spoofing and jamming, addressing three key research questions:(1) What are the common …
Rapidly Deployable Satellite-Based Emergency Communications Infrastructure
Communication infrastructure is crucial during emergencies because it ensures reliable
coordination and information dissemination for effective search and rescue missions …
coordination and information dissemination for effective search and rescue missions …
Responsible Deep Federated Learning-based Threat Detection for Satellite Communications
S Salim, N Moustafa, A Almorjan - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
Satellite communications (Satcoms) have become an indispensable part of modern society,
enabling various applications ranging from global connectivity to critical disaster …
enabling various applications ranging from global connectivity to critical disaster …
[HTML][HTML] Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications
In an age where global connectivity has become pivotal to socio-economic development,
satellite communication (SATCOM) systems have become the backbone of modern …
satellite communication (SATCOM) systems have become the backbone of modern …
[HTML][HTML] BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for securing social media-integrated internet of things systems
Abstract The integration of Social Media (SM) and the Internet of Things (IoT) is gradually
transforming the activities of SM users into valuable data streams that can be analyzed using …
transforming the activities of SM users into valuable data streams that can be analyzed using …
Cross-Domain Solutions (CDS): A Comprehensive Survey
V Sundaravarathan, H Alqalaf, A Siddiqui, K Kim… - IEEE …, 2024 - ieeexplore.ieee.org
A domain is commonly defined as a set of system resources, eg, computers, to which certain
users have prescribed access rights as governed by some security policies. The access …
users have prescribed access rights as governed by some security policies. The access …
A comprehensive overview of privacy, security and performance issues in flying Ad Hoc Networks
E Asituha - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
Flying Ad Hoc Networks (FANETs) represent an ever evolving area in wireless network
communications, despite this massive achievements, FANETs faces significant security …
communications, despite this massive achievements, FANETs faces significant security …
LED there be DoS: Exploiting variable bitrate IP cameras for network DoS
Variable-bitrate video streaming is ubiquitous in video surveillance and CCTV, enabling
high-quality video streaming while conserving network bandwidth. However, as the name …
high-quality video streaming while conserving network bandwidth. However, as the name …