Soltani et al., 2020 - Google Patents
RF fingerprinting unmanned aerial vehicles with non-standard transmitter waveformsSoltani et al., 2020
View PDF- Document ID
- 100324493700551607
- Author
- Soltani N
- Reus-Muns G
- Salehi B
- Dy J
- Ioannidis S
- Chowdhury K
- Publication year
- Publication venue
- IEEE transactions on vehicular technology
External Links
Snippet
The universal availability of unmanned aerial vehicles (UAVs) has resulted in many applications where the same make/model can be deployed by multiple parties. Thus, identifying a specific UAV in a given swarm, in a manner that cannot be spoofed by software …
- 230000001702 transmitter 0 title description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6256—Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Soltani et al. | RF fingerprinting unmanned aerial vehicles with non-standard transmitter waveforms | |
| Bassey et al. | Intrusion detection for IoT devices based on RF fingerprinting using deep learning | |
| Samarakoon et al. | 5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network | |
| Reus-Muns et al. | Classifying UAVs with proprietary waveforms via preamble feature extraction and federated learning | |
| Jiao et al. | Advanced deep learning models for 6G: Overview, opportunities, and challenges | |
| Jafari et al. | IoT devices fingerprinting using deep learning | |
| Mao et al. | Deep learning for intelligent wireless networks: A comprehensive survey | |
| Abbas et al. | Radio frequency fingerprinting techniques for device identification: a survey | |
| WO2023012230A2 (en) | Generative adversarial-based attack in federated learning | |
| Ismail et al. | Evaluation of naïve bayesian algorithms for cyber-attacks detection in wireless sensor networks | |
| Manesh et al. | Performance comparison of machine learning algorithms in detecting jamming attacks on ADS-B devices | |
| Ramkumar et al. | Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks | |
| Takale et al. | Machine learning techniques for routing in wireless sensor network | |
| Wasilewska et al. | Artificial intelligence for radio communication context-awareness | |
| US20260032459A1 (en) | Adjusting biased data distributions for federated learning | |
| Jafari et al. | Signature-aware RF exploitation (SNARE) fingerprinting using deep learning to identify UAVs | |
| Trinh et al. | Mobile traffic classification through physical channel fingerprinting: A deep learning approach | |
| Granato et al. | Intrusion detection in wi-fi networks by modular and optimized ensemble of classifiers: an extended analysis | |
| US20240334193A1 (en) | Systems and methods for machine learned network activity profiling of devices | |
| Rahman et al. | Spectrum based wireless radio traffic classification using hybrid deep neural network | |
| Mishra et al. | Countermeasures for primary user emulation attack: a comprehensive review | |
| Soltani et al. | Unicorn: Urllc network traffic classification and ood detection for o-ran | |
| JOHN et al. | Deep Learning model-based malicious node detection system in wireless multimedia sensor Network | |
| Baccichet et al. | Compact Probe Request Fingerprinting with Asymmetric Pairwise Boosting | |
| Khowaja et al. | IIFNet: A fusion-based intelligent service for noisy preamble detection in 6G |