2019 International Conference on Robotics and Automation (ICRA) 2019
DOI: 10.1109/icra.2019.8794385
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware Synthesis of Human-UAV Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Since automatons are asset compelled and constrained, adaptable coordination procedures such those proposed can improve the system execution keeping up higher proficiency in the assignment execution. Elfar et al (2019) combined cooperation protocol for human-unmanned aircraft vehicle (H-UAV) order and control frameworks, where the human administrator helps in verifying the UAV by discontinuously performing geo area errands to affirm its announced area. They originally exhibited a stochastic game-based model for the framework that records for both the administrator and a foe fit for propelling stealthy false-information infusion at-tacks, making the UAV veer off from its way.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since automatons are asset compelled and constrained, adaptable coordination procedures such those proposed can improve the system execution keeping up higher proficiency in the assignment execution. Elfar et al (2019) combined cooperation protocol for human-unmanned aircraft vehicle (H-UAV) order and control frameworks, where the human administrator helps in verifying the UAV by discontinuously performing geo area errands to affirm its announced area. They originally exhibited a stochastic game-based model for the framework that records for both the administrator and a foe fit for propelling stealthy false-information infusion at-tacks, making the UAV veer off from its way.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Following the system described in Example 2, we now consider the composed HIG G H = M adv M uav M as shown in Fig. 4; the HIG-based model incorporates standard models of a UAV (M uav ), an adversary (M adv ), and a geolocation-task advisory system (M as ) (e.g., as introduced in [11,12]). Here, the probability of a successful detection p(v T , v B ) is a function of both the location the UAV believes to be its current location (v B ) as well as the ground truth location that the UAV actually occupies (v T ).…”
Section: Stochastic Gamesmentioning
confidence: 99%
“…Unmanned airborne systems (UASs), especially small unmanned airborne systems (S-UASs), are used in military reconnaissance, search, and intelligence work in areas that are not safe for humans, as well as in remote sensing areas; data collection is used due to its data storage, analysis, and decision capabilities [ 9 ]. Work performed in areas that are not safe for humans and difficult to access can be performed thanks to human–UAV interactions [ 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 ]. One of the areas where human UAV–interactions are used is computer-vision-based hand gesture recognition applications, which enable users to determine hand gestures using pattern recognition algorithms [ 23 , 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…As UAVs can work alone or move in a herd, they have achieved successful results in challenging missions [ 11 , 29 ]. Work that needs to be performed in unsafe and difficult-to-access areas can now be done using human–UAV interactions [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 43 ]. Human–UAV interactions are only used for information exchange in some applications, while some applications employ physical contact or force exchange.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation