{"id":"https://openalex.org/W7135200807","doi":"https://doi.org/10.1109/tifs.2026.3674039","title":"Mitigating Delivery Fraud and Path Manipulation in UAV-Based E-Commerce: A Fair Exchange Protocol","display_name":"Mitigating Delivery Fraud and Path Manipulation in UAV-Based E-Commerce: A Fair Exchange Protocol","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7135200807","doi":"https://doi.org/10.1109/tifs.2026.3674039"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3674039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3674039","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017362771","display_name":"Xiaohan Hao","orcid":"https://orcid.org/0000-0002-4770-7084"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaohan Hao","raw_affiliation_strings":["School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4770-7084","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129006822","display_name":"Tianrui Song","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tianrui Song","raw_affiliation_strings":["Computing Department, Imperial College London, London, U.K"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computing Department, Imperial College London, London, U.K","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037642352","display_name":"Chao Lin","orcid":"https://orcid.org/0000-0002-0101-8531"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Lin","raw_affiliation_strings":["College of Computer Science and Technology and the College of Software, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-0101-8531","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology and the College of Software, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["College of Computer Science and Technology and the College of Software, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-0070-1707","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology and the College of Software, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017362771"],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.53951156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"3410","last_page":"3423"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9078999757766724,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9078999757766724,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.05130000039935112,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.005499999970197678,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5992000102996826},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5659999847412109},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.2921999990940094},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.2904999852180481},{"id":"https://openalex.org/keywords/electronic-mail","display_name":"Electronic mail","score":0.2831000089645386},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.26829999685287476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7785000205039978},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5992000102996826},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5659999847412109},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5490999817848206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4519999921321869},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.2921999990940094},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2639999985694885},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.2513999938964844},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3674039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3674039","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6644537448883057,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4672776602","display_name":null,"funder_award_id":"62572216","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5371332048","display_name":null,"funder_award_id":"62425205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7406850032","display_name":null,"funder_award_id":"62102089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"UAV-based":[0,31,52,154,185],"e-commerce,":[1],"which":[2,207,289],"employs":[3],"unmanned":[4],"aerial":[5],"vehicles":[6],"(UAV)":[7],"to":[8,13,60,92,115,171,234],"deliver":[9,79],"commodities":[10,81],"from":[11],"sellers":[12],"buyers,":[14],"plays":[15],"a":[16,36,193,244,248,274],"central":[17],"role":[18],"in":[19,133,153,161,184],"the":[20,24,76,94,125,137,173,220,237,265,279],"low-altitude":[21],"economy.":[22],"In":[23],"interests":[25],"of":[26,167,267],"both":[27],"buyers":[28,233],"and":[29,68,156,276],"sellers,":[30],"e-commerce":[32,53,155],"usually":[33,78],"relies":[34],"on":[35,47,259],"<italic":[37,64,69,174,194,227],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[38,65,70,175,195,228],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">fair":[39],"exchange</i>":[40],"protocol":[41,50,179,281],"between":[42],"them.":[43],"Despite":[44],"extensive":[45],"research":[46],"fair":[48,177],"exchange":[49,178],"design,":[51],"has":[54,282],"two":[55,257],"features":[56],"posing":[57],"extra":[58],"challenges":[59,149],"achieving":[61,181],"mutual":[62,182],"fairness:":[63],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">delivery":[66],"fraud</i>":[67],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">path":[71],"manipulation</i>.":[72],"On":[73,124],"one":[74],"hand,":[75,127],"UAVs":[77],"real-world":[80,116],"rather":[82],"than":[83],"virtual":[84,106],"assets":[85,107],"(e.g.,":[86,247],"digital":[87],"books),":[88],"making":[89],"it":[90],"hard":[91],"verify":[93,188,235],"physical":[95],"delivery":[96,141,205,239],"status.":[97],"Particularly,":[98],"this":[99,168],"verification":[100],"can":[101,208],"be":[102,121,209],"easily":[103],"done":[104],"for":[105,215,219],"by":[108,143,243],"checking":[109],"their":[110],"hash":[111],"values,":[112],"but":[113],"inapplicable":[114],"commodities,":[117],"as":[118],"they":[119],"cannot":[120],"naturally":[122],"hashed.":[123],"other":[126],"since":[128],"UAV":[129],"costs":[130],"may":[131,139],"vary":[132],"different":[134,287],"air":[135],"areas,":[136],"seller":[138],"manipulate":[140],"bills":[142],"claiming":[144],"unnecessarily":[145],"expensive":[146],"paths.":[147],"These":[148],"are":[150],"newly":[151],"emerged":[152],"have":[157],"not":[158],"been":[159],"considered":[160],"traditional":[162],"protocols.":[163],"The":[164],"primary":[165],"goal":[166],"work":[169],"is":[170],"propose":[172],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">first</i>":[176],"that":[180,198,231,236,278],"fairness":[183,266],"e-commerce.":[186],"To":[187],"commodity":[189],"delivery,":[190],"we":[191,224,262],"develop":[192],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">tracing</i>":[196],"mechanism":[197,230],"transforms":[199],"raw":[200],"UAV-collected":[201],"footage":[202],"into":[203,211],"immutable":[204],"evidence,":[206],"integrated":[210],"existing":[212],"virtuality-oriented":[213],"protocols":[214],"further":[216],"verification.":[217],"As":[218],"path":[221,240],"manipulation":[222],"problem,":[223],"introduce":[225],"an":[226],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">auditing</i>":[229],"enables":[232],"chosen":[238],"was":[241],"generated":[242],"trustworthy":[245],"algorithm":[246],"well-trained":[249],"artificial":[250],"general":[251],"intelligence":[252],"model).":[253],"By":[254],"establishing":[255],"these":[256],"mechanisms":[258],"cryptographic":[260],"tools,":[261],"theoretically":[263],"prove":[264],"our":[268],"proposed":[269],"protocol.":[270],"We":[271],"also":[272],"implement":[273],"prototype":[275],"observe":[277],"whole":[280],"only":[283],"minute-magnitude":[284],"cost":[285],"across":[286],"settings,":[288],"validates":[290],"its":[291],"practicality.":[292]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-03-14T00:00:00"}
