2022
DOI: 10.1109/jrfid.2022.3157653
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Learning Framework for UAV Detection and Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(23 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…Applications of transient signal detection include radar, microwave radiometry, radio astronomy, underwater acoustics, and RF fingerprinting [1][2][3][4][5][6]. Methods have included traditional signal processing and, more recently, the application of machine learning techniques [6]. We summarize a number of methods here, grouping them by method rather than by application.…”
Section: Overview Of State-of-the-artmentioning
confidence: 99%
“…Applications of transient signal detection include radar, microwave radiometry, radio astronomy, underwater acoustics, and RF fingerprinting [1][2][3][4][5][6]. Methods have included traditional signal processing and, more recently, the application of machine learning techniques [6]. We summarize a number of methods here, grouping them by method rather than by application.…”
Section: Overview Of State-of-the-artmentioning
confidence: 99%
“…In addition, there are also studies using other more complex analysis tools such as wavelet transform [35], phase space reconstruction [36], and other methods [37] to construct RFF features. For example, there is the latest research to decompose the signal by using Hilbert-Huang transform and wavelet packet transform, and then extract features from the time-frequency-energy domain of the signal [8].…”
Section: Steady-state-based Rffmentioning
confidence: 99%
“…Therefore, RFF offers a new approach to wireless device identification and authentication [7]. [8] As shown in Fig. 1, the RF signal has noticeable signal power state changes at the moment of transmit power switching.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, UAVs are used to carry out cybercrimes, for instance , utilizing UAV to eavesdrop on mobile phone users and hence violating the confidentiality of unsuspecting users sensitive data (Alajmi et al, 2017) . In addition, UAV can be used for a variety of illegal activities e.g., spying, terrorism (Chamola et al, 2021), illegal surveillance (Medaiyese et al, 2021), drug trafficking, fire arm smuggling and so on. With the current rise of UAVs misuse, these have open doors to a new era where finding effective and intelligent UAV detection and identification becomes a research challenge.…”
Section: Introductionmentioning
confidence: 99%
“…However, the drawback of their work was that it is time consuming. Medaiyese et al, (2021) developed a system for UAV detection and classification that is effective even in the presence of other wireless signal. Their technique exploited steady state RF signals transmitted by UAV and it flight controller.…”
Section: Introductionmentioning
confidence: 99%