{"id":"https://openalex.org/W4408358296","doi":"https://doi.org/10.1109/mis.2025.3549693","title":"UASDefMeta: A Meta-Learning-Based Defense Approach for Detecting Unmanned Aerial Systems Eavesdropping in Mission-Critical Applications","display_name":"UASDefMeta: A Meta-Learning-Based Defense Approach for Detecting Unmanned Aerial Systems Eavesdropping in Mission-Critical Applications","publication_year":2025,"publication_date":"2025-03-12","ids":{"openalex":"https://openalex.org/W4408358296","doi":"https://doi.org/10.1109/mis.2025.3549693"},"language":"en","primary_location":{"id":"doi:10.1109/mis.2025.3549693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mis.2025.3549693","pdf_url":null,"source":{"id":"https://openalex.org/S114241109","display_name":"IEEE Intelligent Systems","issn_l":"1541-1672","issn":["1541-1672","1941-1294"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076112103","display_name":"Hassan El Alami","orcid":"https://orcid.org/0000-0003-1403-5688"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hassan El Alami","raw_affiliation_strings":["Howard University, Washington, D.C., USA","Howard University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Howard University, Washington, D.C., USA","institution_ids":["https://openalex.org/I137853757"]},{"raw_affiliation_string":"Howard University, Washington, DC, USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":"https://orcid.org/0000-0003-3638-3464"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B. Rawat","raw_affiliation_strings":["Howard University, Washington, D.C., USA","Howard University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Howard University, Washington, D.C., USA","institution_ids":["https://openalex.org/I137853757"]},{"raw_affiliation_string":"Howard University, Washington, DC, USA","institution_ids":["https://openalex.org/I137853757"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076112103"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":null,"apc_paid":null,"fwci":2.8414,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89818461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"40","issue":"5","first_page":"16","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9155974388122559},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7831918001174927},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4481184780597687},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3663811683654785},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.34745949506759644},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1298421323299408}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9155974388122559},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7831918001174927},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4481184780597687},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3663811683654785},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.34745949506759644},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1298421323299408}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mis.2025.3549693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mis.2025.3549693","pdf_url":null,"source":{"id":"https://openalex.org/S114241109","display_name":"IEEE Intelligent Systems","issn_l":"1541-1672","issn":["1541-1672","1941-1294"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Intelligent Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2979205635","https://openalex.org/W2981262799","https://openalex.org/W2981876784","https://openalex.org/W4285210647","https://openalex.org/W4380839160","https://openalex.org/W4386031815","https://openalex.org/W4390659127","https://openalex.org/W4390872255","https://openalex.org/W4392581148","https://openalex.org/W4392602649","https://openalex.org/W4392902052","https://openalex.org/W4393033138","https://openalex.org/W4393180251","https://openalex.org/W4393226134"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2368710903","https://openalex.org/W4386360526","https://openalex.org/W2772112465","https://openalex.org/W4387918499","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729"],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1],"systems":[2],"(UASs)":[3],"play":[4],"a":[5,39,71],"vital":[6],"role":[7],"in":[8,48,59],"various":[9],"mission-critical":[10],"applications,":[11],"such":[12],"as":[13],"military":[14],"missions,":[15],"surveillance,":[16],"and":[17,32,45,78,93],"emergency":[18],"responses.":[19],"Ensuring":[20],"secure":[21],"communication":[22],"channels":[23],"for":[24,82],"UASs":[25],"is":[26],"crucial":[27],"to":[28,42],"protecting":[29],"sensitive":[30],"information":[31],"maintaining":[33],"operational":[34],"integrity.":[35],"Eavesdropping":[36],"attacks":[37,64],"pose":[38],"significant":[40],"threat":[41],"data":[43],"confidentiality":[44],"system":[46],"security":[47],"these":[49,53,84],"applications.":[50],"To":[51],"address":[52],"challenges,":[54],"we":[55,68],"propose":[56],"an":[57],"environment":[58],"Python":[60],"that":[61,74],"emulates":[62],"eavesdropping":[63],"on":[65],"UASs.":[66],"Subsequently,":[67],"introduce":[69],"UASDefMeta,":[70],"meta-learning-based":[72],"approach":[73],"combines":[75],"model-agnostic":[76],"meta-learning":[77],"proximal":[79],"policy":[80],"optimization":[81],"detecting":[83],"attacks.":[85],"Experiments":[86],"validate":[87],"UASDefMeta\u2019s":[88],"effectiveness,":[89],"demonstrating":[90],"its":[91],"adaptability":[92],"improved":[94],"performance":[95],"over":[96],"other":[97],"selected":[98],"models.":[99]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-03-13T00:00:00"}
