ARID: Anonymous remote identification of unmanned aerial vehicles

P Tedeschi, S Sciancalepore, R Di Pietro - Proceedings of the 37th …, 2021 - dl.acm.org
To enable enhanced accountability of Unmanned Aerial Vehicles (UAVs) operations, the US-
based Federal Avionics Administration (FAA) recently published a new dedicated regulation …

Research and application of a Model selection forecasting system for wind speed and theoretical power generation in wind farms based on classification and wind …

X Huang, C Wang, S Zhang - Energy, 2024 - Elsevier
This study focuses on ensuring the stable operation of the power grid by accurately
forecasting the theoretical power generation capacity of wind turbine units, especially in …

Experimental study on low-altitude UAV-to-ground propagation characteristics in campus environment

Y Zhang, J Lu, H Zhang, Z Huang, C Briso-Rodríguez… - Computer Networks, 2023 - Elsevier
In recent years, unmanned aerial vehicle (UAV)-to-ground wireless channels have become
focused areas. Thus a better understanding of UAV-to-ground wireless channel …

Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning

S Sciancalepore, F Kusters… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The current state of the art on jamming detection relies on link-layer metrics. A few examples
are the bit-error rate (BER), the packet delivery ratio, the throughput, and the signal-to-noise …

BloodHound: Early Detection and Identification of Jamming at the PHY-layer

S Alhazbi, S Sciancalepore… - 2023 IEEE 20th Consumer …, 2023 - ieeexplore.ieee.org
Traditional jamming detection techniques, adopted in static networks, require the receiver
(under jamming) to infer the presence of the jammer by measuring the effects of the jamming …

Energy-harvesting based jammer localization: A battery-free approach in wireless sensor networks

A Hussain, P Tedeschi, G Oligeri… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Wireless enabling technologies in critical infrastructures are increasing the efficiency of
communications. Most of these technologies are vulnerable to jamming attacks. Jamming …

Obfuscated Location Disclosure for Remote ID Enabled Drones

A Brighente, M Conti, M Schotsman… - arXiv preprint arXiv …, 2024 - arxiv.org
The Remote ID (RID) regulation recently introduced by several aviation authorities
worldwide (including the US and EU) forces commercial drones to regularly (max. every …

Real-Time Jamming Detection via Deep Learning

RAM Ali - 2023 - search.proquest.com
Wireless communication systems are vulnerable to intentional jamming that can result in
significant disruptions to critical infrastructure, military communications, and civilian …