FFT-based DOA estimation for coprime MIMO radar: A hardware-friendly approach

Z Zhang, C Zhou, Y Gu, Z Shi - 2018 IEEE 23rd International …, 2018 - ieeexplore.ieee.org
In this paper, we present a fast Fourier transform (FFT)-based direction-of-arrival (DOA)
estimation algorithm for coprime multiple-input multiple-output (MIMO) radar, where both the …

Sequential fusion based approach for estimating range gate pull-off parameter in a networked radar system: An ECCM algorithm

P Lingadevaru, B Pardhasaradhi, P Srihari - IEEE Access, 2022 - ieeexplore.ieee.org
Networked radar is an emerging and effective alternative to traditional radar systems to
provide improved performance by fusing information from multiple radars. Further …

Hierarchical Average Fusion with GM-PHD Filters Against FDI and DoS Attacks

H Yang, T Li, J Yan, V Elvira - IEEE Signal Processing Letters, 2024 - ieeexplore.ieee.org
We address the multisensor multitarget tracking problem based on a hierarchical sensor
network. In this setup, there is a fusion center, several cluster heads, and many sensors …

A novel application of the CORAS framework for ensuring cyber hygiene on shipboard RADAR

G Kayisoglu, P Bolat, K Tam - Journal of Marine Engineering & …, 2024 - Taylor & Francis
Radio Detection and Ranging (RADAR) equipment is a significant information and
navigational system onboard vessels and a critical part of a ship's cyber space. It is an …

RadArnomaly: Protecting radar systems from data manipulation attacks

S Cohen, E Levy, A Shaked, T Cohen, Y Elovici… - Sensors, 2022 - mdpi.com
Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In
many cases, information regarding the objects detected by a radar system is sent to, and …

Performance bounds for cyberattack detectors using multiple observations

O Toker - SoutheastCon 2022, 2022 - ieeexplore.ieee.org
In this paper, we consider False Data Injection (FDI) attacks with small injected error, and
derive risk upper bounds for cyberattack detectors using multiple observations. FDI attacks …

Multisensor-multitarget tracking based on belief propagation against false data injection attacks and denial of service attacks

Y Yu, Y Liang - Digital Signal Processing, 2022 - Elsevier
This paper is concerned with the multisensor multitarget tracking where the sensor network
can potentially be compromised by adversarial attacks, including false data injection (FDI) …

Distributed trust‐based unscented Kalman filter for non‐linear state estimation under cyber‐attacks: The application of manoeuvring target tracking over wireless …

M Adeli, M Hajatipour, MJ Yazdanpanah… - IET Control Theory & …, 2021 - Wiley Online Library
This paper is concerned with secure state estimation of non‐linear systems under malicious
cyber‐attacks. The application of target tracking over a wireless sensor network is …

[PDF][PDF] Optimal hybrid deep learning enabled attack detection and classification in IoT environment

FF Alruwaili - Comput. Mater. Contin., 2023 - cdn.techscience.cn
The Internet of Things (IoT) paradigm enables end users to access networking services
amongst diverse kinds of electronic devices. IoT security mechanism is a technology that …

A survey on obstacles to the widespread use of connected and automated vehicles

S Uysal, MT Sandıkkaya - Journal of Ambient Intelligence and …, 2024 - content.iospress.com
Abstract Connected and Automated Vehicles (CAVs) are rapidly evolving technology with
great benefits such as reducing gas emissions and decreasing traffic congestion. They have …