{"id":"https://openalex.org/W4302369395","doi":"https://doi.org/10.1109/icc45855.2022.9839272","title":"OptiML: An Enhanced ML Approach Towards Design of SDN based UAV Networks","display_name":"OptiML: An Enhanced ML Approach Towards Design of SDN based UAV Networks","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4302369395","doi":"https://doi.org/10.1109/icc45855.2022.9839272"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9839272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839272","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000568197","display_name":"Sunitha Safavat","orcid":"https://orcid.org/0009-0005-6744-6271"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sunitha Safavat","raw_affiliation_strings":["Howard University,Data Science and Cybersecurity Center (DSC2),Department of Electrical Engineering and Computer Science,Washington,DC,USA,20059"],"affiliations":[{"raw_affiliation_string":"Howard University,Data Science and Cybersecurity Center (DSC2),Department of Electrical Engineering and Computer Science,Washington,DC,USA,20059","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":"https://orcid.org/0000-0003-3638-3464"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B. Rawat","raw_affiliation_strings":["Howard University,Data Science and Cybersecurity Center (DSC2),Department of Electrical Engineering and Computer Science,Washington,DC,USA,20059"],"affiliations":[{"raw_affiliation_string":"Howard University,Data Science and Cybersecurity Center (DSC2),Department of Electrical Engineering and Computer Science,Washington,DC,USA,20059","institution_ids":["https://openalex.org/I137853757"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000568197"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":null,"apc_paid":null,"fwci":3.6063,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.95697056,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7996376752853394},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6820424199104309},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4554658830165863},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44444185495376587},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4261135458946228},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3281424641609192}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7996376752853394},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6820424199104309},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4554658830165863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44444185495376587},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4261135458946228},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3281424641609192}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9839272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839272","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1518269064","https://openalex.org/W2292581910","https://openalex.org/W2536380892","https://openalex.org/W2618793871","https://openalex.org/W2743800322","https://openalex.org/W2784145041","https://openalex.org/W2790739613","https://openalex.org/W2952566294","https://openalex.org/W2962886534","https://openalex.org/W2963035841","https://openalex.org/W2981214342","https://openalex.org/W2990204812","https://openalex.org/W2994083428","https://openalex.org/W3036004996","https://openalex.org/W3109481749","https://openalex.org/W3192519096","https://openalex.org/W4239116056","https://openalex.org/W6799200307"],"related_works":["https://openalex.org/W1975451135","https://openalex.org/W2890570089","https://openalex.org/W2989915292","https://openalex.org/W2295628284","https://openalex.org/W3148968234","https://openalex.org/W4220837700","https://openalex.org/W145760256","https://openalex.org/W2028086369","https://openalex.org/W2123841989","https://openalex.org/W2129477171"],"abstract_inverted_index":{"Unmanned":[0],"Aerial":[1],"Vehicles":[2],"(UAV)":[3],"network":[4,145,174,244,252],"has":[5],"been":[6],"explored":[7],"widely":[8],"in":[9,35,43,272],"recent":[10],"years.":[11],"The":[12,105,147,209,257],"deployment":[13],"of":[14,76,92,109,118,139,150,161,173,203,211,255],"small":[15],"to":[16,62,73,88,192,227,232],"medium-scale":[17],"UAVs":[18,54,119,151,168],"are":[19,60,225,237],"being":[20],"considered":[21],"for":[22,99],"several":[23],"real-time":[24,56],"applications":[25],"such":[26],"as":[27,152],"monitoring,":[28],"surveillance,":[29],"search":[30],"and":[31,47,64,103,115,134,137,165,196,220,250,269],"rescue":[32],"services.":[33],"Throughput":[34],"the":[36,49,65,90,158,171,183,194,229,241,248],"communication":[37,68],"model":[38],"plays":[39],"a":[40,83,93],"vital":[41],"role":[42],"improvising":[44],"available":[45],"capacity":[46,175],"balancing":[48],"data":[50,58,199,254],"traffic":[51,253],"loads.":[52],"Often":[53],"carry":[55],"sensitive":[57],"which":[59],"vulnerable":[61,72],"cyber-attacks":[63],"UAVs\u2019":[66],"wireless":[67],"networks":[69],"become":[70],"more":[71],"various":[74],"forms":[75],"cyber-attacks.":[77],"In":[78],"this":[79],"paper,":[80],"we":[81],"propose":[82],"secure":[84],"machine":[85],"learning-based":[86],"approach":[87,107,259],"maximize":[89],"throughput":[91],"Software":[94],"Defined":[95],"Network":[96],"(SDN)":[97],"controller":[98,125,178],"better":[100],"UAV":[101,274],"communications":[102],"security.":[104],"proposed":[106,258],"consist":[108],"three":[110],"steps,":[111],"a)":[112],"optimal":[113,169],"placement":[114,126],"user":[116],"association":[117],"using":[120,127,142,186,262],"Genetic":[121],"algorithm":[122],"b)":[123],"SDN":[124,177],"shortest":[128,184],"path":[129,185],"via":[130],"single":[131],"connected":[132],"graph":[133],"c)":[135],"creation":[136],"detection":[138,202],"DDoS":[140,204,233],"attack":[141],"Feedforward":[143,242],"neural":[144,243],"classifier.":[146],"best":[148],"position":[149],"base":[153,163],"stations":[154],"is":[155,179,206,260],"obtained":[156],"from":[157],"energy\u2019s":[159],"estimation":[160],"previous":[162],"station":[164],"users.":[166],"After":[167],"placement,":[170],"availability":[172],"under":[176],"done":[180],"by":[181],"finding":[182],"bellman":[187],"ford":[188],"algorithm.":[189],"It":[190],"intends":[191],"balance":[193],"loads":[195],"generate":[197],"traffic-free":[198],"transmission.":[200],"Additionally,":[201],"attacks":[205],"also":[207],"studied.":[208],"combination":[210],"two":[212],"feature":[213],"reduction":[214],"techniques,":[215],"Principal":[216],"Component":[217],"Analysis":[218,223],"(PCA)":[219],"Linear":[221],"Discriminant":[222],"(LDA)":[224],"employed":[226],"find":[228],"features":[230,236],"relevant":[231],"attacks.":[234],"These":[235],"then":[238],"fed":[239],"into":[240],"classifier":[245],"that":[246],"classifies":[247],"normal":[249],"abnormal":[251],"UAVs.":[256],"evaluated":[261],"simulations.":[263],"Experimental":[264],"results":[265],"show":[266],"high":[267],"efficiency":[268],"security":[270],"measures":[271],"SDN-based":[273],"networks.":[275]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
