An acoustic-based surveillance system for amateur drones detection and localization

Z Shi, X Chang, C Yang, Z Wu… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Due to cost reduction and device miniaturization, amateur drones are now widely used in
numerous civilian and commercial applications. However, the abuse of amateur drones has …

Blockchain-enabled trustworthy group communications in UAV networks

K Gai, Y Wu, L Zhu, KKR Choo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are increasingly deployed in networked environments,
such as places of mass gatherings, smart cities and smart nations. For example, UAVs can …

Road-map aided GM-PHD filter for multivehicle tracking with automotive radar

K Shi, Z Shi, C Yang, S He, J Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, accurate and real-time vehicle tracking is critical to ensure the safety of
intelligent vehicles. However, tracking in the complex traffic environments still remains a …

Road-map aided gaussian mixture labeled multi-bernoulli filter for ground multi-target tracking

C Yang, X Cao, Z Shi - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Ground multi-target tracking (MTT) is one of the core tasks of airborne ground moving target
indicator (GMTI) radar and automotive radar. However, ground MTT still remains a …

A labeled rfs-based framework for multiple integrity attackers detection and identification in cyber-physical systems

C Yang, L Mo, X Cao, H Zhang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The problem of multiple integrity attacks (attackers) detection and identification (MIADI) in
cyber–physical systems (CPSs) is still a challenging problem to date. The goal of this article …

Deep learning driven security in digital twins of drone network

J Wu, J Guo, Z Lv - ICC 2022-IEEE International Conference on …, 2022 - ieeexplore.ieee.org
This study aims to explore the security issues and computational intelligence of drone
information system based on deep learning. Targeting at the security issues of the drone …

Distributed Multiple Attacks Detection via Consensus AA-GMPHD Filter

C Yang, X Cao, L He, H Zhang - IEEE Transactions on Systems …, 2023 - ieeexplore.ieee.org
This article is concerned with the problem of multiple attacks detection (MAD) for distributed
sensor networks (SNs) under multiple malicious attacks. The goal of this article is to develop …

Output resilient containment control of heterogeneous systems with active leaders using reinforcement learning under attack inputs

Q Li, L Xia, R Song - IEEE Access, 2019 - ieeexplore.ieee.org
The optimal solution to the distributed output containment control problem of heterogeneous
multiple-agent systems (MASs) with unknown active leaders under attack inputs by using …

Sharpening the edge: Towards improved edge computing environment for mobile and IoT applications

CM Diaz, KKR Choo, A Zunino - Future Generation Computer Systems, 2020 - Elsevier
Cloud architectures and related technologies will play an increasingly important role in our
society, particularly as mobile devices (eg laptops, smartphones, and tablets) and Internet of …

Prism: Priority-aware service availability in multi-uav networks for iot applications

A Bera, S Misra, C Chatterjee - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
This work sketches a location priority-aware service availability scheme for use in a cellular-
enabled multiple unmanned aerial vehicle (UAV) networks for Internet-of-Things (IoT) …