Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] RF/WiFi-based UAV surveillance systems: A systematic literature review
Abstract The deployment of Unmanned Aerial Vehicles (UAVs) has gained increasing
interest in various applications during recent years due to its multiple features. At the same …
interest in various applications during recent years due to its multiple features. At the same …
Internet of Things
GP Picco, H Ma, Y He, M Li, N Patwari, S Sigg… - ACM Transactions …, 2023 - dl.acm.org
Snoo** keystrokes (aka, keystroke inference attacks) seriously threatens information
security and privacy. By launching such an attack, an adversary has an opportunity to steal …
security and privacy. By launching such an attack, an adversary has an opportunity to steal …
Physical-layer challenge-response authentication for drone networks
F Mazzo, S Tomasin, H Zhang… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
Authenticating the communications among drones operating as a network (or a swarm) is
crucial for the control of the network. When drones are in turn supporting communications …
crucial for the control of the network. When drones are in turn supporting communications …
A deep q-learning based, base-station connectivity-aware, decentralized pheromone mobility model for autonomous UAV networks
Wireless networks consisting of low size, weight, and power, fixed-wing unmanned aerial
vehicles (UAVs) are used in many applications, such as search, monitoring, and information …
vehicles (UAVs) are used in many applications, such as search, monitoring, and information …
A Hybrid Reactive Routing Protocol for Decentralized UAV Networks
Wireless networks consisting of low SWaP, FW-UAVs are used in many applications, such
as monitoring, search and surveillance of inaccessible areas. A decentralized and …
as monitoring, search and surveillance of inaccessible areas. A decentralized and …
Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Drones are expected to be used for many tasks in the future and require secure
communication protocols. In this work, we propose a novel physical layer authentication …
communication protocols. In this work, we propose a novel physical layer authentication …
Time-efficient approximate trajectory planning for AoI-centered multi-UAV IoT networks
The gathering of data produced by ground Internet of Things (IoT) devices can be facilitated
with the assistance from Unmanned Aerial Vehicles (UAVs) especially in hard-to-reach …
with the assistance from Unmanned Aerial Vehicles (UAVs) especially in hard-to-reach …
SoftFarmNet: reconfigurable Wi-Fi HaLow networks for precision agriculture
Networks deployed for Internet of Agricultural Things (IoAT) applications are often deployed
in remote areas with limited coverage and a lack of standardization across sensing devices …
in remote areas with limited coverage and a lack of standardization across sensing devices …
[HTML][HTML] Pipe Routing with Topology Control for Decentralized and Autonomous UAV Networks
This paper considers a decentralized and autonomous wireless network of low SWaP (size,
weight, and power) fixed-wing UAVs (unmanned aerial vehicles) used for remote …
weight, and power) fixed-wing UAVs (unmanned aerial vehicles) used for remote …
[HTML][HTML] The Possibility of Improving the Range and Quality of Air-to-Ground WebRTC-Based IoT Communication in Emergency Situations by Employing an External …
K Wajda, A Chodorek… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
The proliferation of new services, either interpersonal or machine-oriented, has generated
new demands concerning the flexibility and efficiency of transmission. The ubiquity of …
new demands concerning the flexibility and efficiency of transmission. The ubiquity of …