Computer Science ›› 2025, Vol. 52 ›› Issue (11): 444-451.doi: 10.11896/jsjkx.250300079
• Information Security • Previous Articles
ZHANG Meng1,2, QIAO Jinlan3
CLC Number:
| [1]KUMAWAT H C,CHAKRABORTY M,RAJ A A B,et al.Architecture for Micro-Doppler-Based Small Unmanned Aerial Vehicle(SUAV) Targets' Detection and Classification[J].IEEE Transactions on Instrumentation and Measurement,2022,71:8504011. [2]SUN Y,ABEYWICKRAMA S,JAYASINGHE L,et al.Micro-Doppler signature-based detection,classification,and localization of small UAV with long short-term memory neural network[J].IEEE Transactions on Geoscience and Remote Sensing,2020,59(8):6285-6300. [3]YAN J,HU H,GONG J,et al.Exploring Radar Micro-Doppler Signatures for Recognition of Drone Types [J].Drones,2023,7(4):280. [4]HAN S K,LEE J H,JUNG Y H.Convolutional Neural Network-Based Drone Detection and Classification Using Overlaid Frequency-Modulated Continuous-Wave Range-Doppler Images [J].Sensors,2024,24(17):5805. [5]ZHANG P,LI G,HUO C,et al.Exploitation of multipath micro-Doppler signatures for drone classification[J].IET Radar,Sonar &Navigation,2020,14(4):586-592. [6]ZHENG Y,ZHANG X,WANG S,et al.Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification [J].Drones,2024,8(8):391. [7]HAN J,YU Z,YANG J.Real-world UAV recognition based on radio frequency fingerprinting with Transformer[J/OL].https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/cmu2.70004. [8]LI Z,CHEN B,CHEN X,et al.Reliable digital forensics in the air:Exploring an RF-based drone identification system[C]//Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies.2022:1-25. [9]NIE W,HAN Z C,ZHOU M,et al.UAV Detection and Identification Based on WiFi Signal and RF Fingerprint [J].IEEE Sensors Journal,2021,21(12):13540-13550. [10]XIE Y,JIANG P,GU Y,et al.Dual-Source Detection and Identification System Based on UAV Radio Frequency Signal [J].IEEE Transactions on Instrumentation and Measurement,2021,70:1-15. [11]SWINNEY C J,WOODS J C.RF detection and classification of unmanned aerial vehicles in environments with wireless interfe-rence[C]//2021 International Conference on Unmanned Aircraft Systems(ICUAS).IEEE,2021:1494-1498. [12]MPOUZIOTAS D,KARVELIS P,STYLIOS C.Advanced Computer Vision Methods for Tracking Wild Birds from Drone Foo-tage [J].Drones,2024,8(6):259. [13]ASHRAF M W,SULTANI W,SHAH M.Dogfight:Detecting drones from drones videos[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:7067-7076. [14]BEHERA D K,RAJ A B.Drone detection and classificationusing deep learning[C]//2020 4th International Conference on Intelligent Computing and Control Systems(ICICCS).IEEE,2020:1012-1016. [15]SHI Q,LI J.Objects detection of UAV for anti-UAV based on YOLOv4[C]//2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology(ICCASIT).IEEE,2020:1048-1052. [16]DONG Q,LIU Y,LIU X.Drone sound detection system based on feature result-level fusion using deep learning[J].Multimedia Tools and Applications,2023,82(1):149-171. [17]AYDIN I·,KIZILAY E.Development of a new light-weight convolutional neural network for acoustic-based amateur drone detection[J].Applied Acoustics,2022,193:108773. [18]BERNARDINI A,MANGIATORDI F,PALLOTTI E,et al.Drone detection by acoustic signature identification[J].Electronic Imaging,2017,29:60-64. [19]ANWAR M Z,KALEEM Z,JAMALIPOUR A.Machine learning inspired sound-based amateur drone detection for public safety applications[J].IEEE Transactions on Vehicular Technology,2019,68(3):2526-2534. [20]KOLAMUNNA H,DAHANAYAKA T,LI J,et al.Droneprint:Acoustic signatures for open-set drone detection and identification with online data[C]// Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies.2021:1-31. [21]RAMESH S,PATHIER T,HAN J.Sounduav:Towards deliverydrone authentication via acoustic noise fingerprinting[C]//Proceedings of the 5th Workshop on Micro Aerial Vehicle Networks,Systems,and Applications.2019:27-32. [22]DIAO Y,ZHANG Y,ZHAO G,et al.Drone authentication via acoustic fingerprint[C]//Proceedings of the 38th Annual Computer Security Applications Conference.2022:658-668. [23]ZHANG M,LU L,WU Y,et al.DroneAudioID:A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery[J].IEEE Transactions on Information Forensics and Security,2025,20:1447-1461. [24]MUGISHA S,WASSAJJA M.Review and analysis on digital filter design in digital signal processing [J].KIU Journal of Science Engineering and Technology,2024,3(2):12-20. [25]HAYES B,SHIER J,FAZEKAS G,et al.A review of differentiable digital signal processing for music and speech synthesis [J].arXiv:2308.15422,2023. [26]NOGUEIRA A F R,OLIVEIRA H S,MACHADO J J M,et al.Sound Classification and Processing of Urban Environments:A Systematic Literature Review [J].Sensors,2022,22(22):8608. |
| [1] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
| [2] | LIU Hongle, CHEN Juan, FU Cai, HAN Lansheng, GUO Xiaowei, JIANG shuai. Authorship Gender Recognition of Source Code Based on Multiple Mixed Features [J]. Computer Science, 2025, 52(8): 51-61. |
| [3] | SUN Qiming, HOU Gang, JIN Wenjie, HUANG Chen, KONG Weiqiang. Survey on Fuzzing of Embedded Software [J]. Computer Science, 2025, 52(7): 13-25. |
| [4] | CHEN Jinyin, XI Changkun, ZHENG Haibin, GAO Ming, ZHANG Tianxin. Survey of Security Research on Multimodal Large Language Models [J]. Computer Science, 2025, 52(7): 315-341. |
| [5] | ZHANG Guanghua, CHEN Fang, CHANG Jiyou, HU Boning, WANG He. Accelerating Firmware Vulnerability Discovery Through Precise Localization of IntermediateTaint Sources and Dangerous Functions [J]. Computer Science, 2025, 52(7): 379-387. |
| [6] | WANG Yun, ZHAO Jianming, GUO Yifeng, ZHOU Huanhuan, ZHOU Wuai, ZHANG Wanzhe, FENG Jianhua. Automation and Security Strategies and Empirical Research on Operation and Maintenance of Digital Government Database [J]. Computer Science, 2025, 52(6A): 240500045-8. |
| [7] | YU Yiming, CHEN Yuanzhi, LANG Jun. Analysis of DNS Threats and the Challenges of DNS Security [J]. Computer Science, 2025, 52(6A): 240900140-8. |
| [8] | ZHU Keda, CAI Ruijie, LIU Shengli. Large Scale Network Defense Algorithm Based on Temporal Network Flow Watermarking Technology [J]. Computer Science, 2025, 52(6A): 240900110-6. |
| [9] | XIA Zhuoqun, ZHOU Zihao, DENG Bin, KANG Chen. Security Situation Assessment Method for Intelligent Water Resources Network Based on ImprovedD-S Evidence [J]. Computer Science, 2025, 52(6A): 240600051-6. |
| [10] | LI Weifeng, XIE Jiangping. Study on System Security Testing Method Based on Digital Twin [J]. Computer Science, 2025, 52(6A): 240700068-7. |
| [11] | WEI Youyuan, SONG Jianhua, ZHANG Yan. Survey of Binary Code Similarity Detection Method [J]. Computer Science, 2025, 52(6): 365-380. |
| [12] | JIANG Yufei, TIAN Yulong, ZHAO Yanchao. Persistent Backdoor Attack for Federated Learning Based on Trigger Differential Optimization [J]. Computer Science, 2025, 52(4): 343-351. |
| [13] | CHEN Yanfeng, FENG Zhiwei, DENG Qingxu, WANG Yan. Survey of Sensor Attack Defense Strategies for Cyber Physical Systems [J]. Computer Science, 2025, 52(4): 4-13. |
| [14] | CAO Mingwei, ZHANG Di, PENG Shengjie, LI Ning, ZHAO Haifeng. Survey of Metaverse Technology Development and Applications [J]. Computer Science, 2025, 52(3): 4-16. |
| [15] | LUO Zhengquan, WANG Yunlong, WANG Zilei, SUN Zhenan, ZHANG Kunbo. Study on Active Privacy Protection Method in Metaverse Gaze Communication Based on SplitFederated Learning [J]. Computer Science, 2025, 52(3): 95-103. |
|
||