{"id":"https://openalex.org/W3120161453","doi":"https://doi.org/10.1145/3444370.3444571","title":"UAV communication interference analysis and anti-interference methods","display_name":"UAV communication interference analysis and anti-interference methods","publication_year":2020,"publication_date":"2020-12-04","ids":{"openalex":"https://openalex.org/W3120161453","doi":"https://doi.org/10.1145/3444370.3444571","mag":"3120161453"},"language":"en","primary_location":{"id":"doi:10.1145/3444370.3444571","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444571","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100443643","display_name":"Wenxin Wang","orcid":"https://orcid.org/0009-0002-3973-2148"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wenxin Wang","raw_affiliation_strings":["College of Information and Communication, NUDT, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication, NUDT, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115604866","display_name":"Bin Jiang","orcid":"https://orcid.org/0009-0000-1579-4876"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bin Jiang","raw_affiliation_strings":["College of Information and Communication, NUDT, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication, NUDT, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000063703","display_name":"Xudong Tan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xudong Tan","raw_affiliation_strings":["College of Information and Communication, NUDT, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication, NUDT, Wuhan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100323085","display_name":"Chao Li","orcid":"https://orcid.org/0000-0001-5230-3431"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chao Li","raw_affiliation_strings":["College of Information and Communication, NUDT, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication, NUDT, Wuhan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100443643"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6903,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7981818,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"201"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13121","display_name":"Radio Wave Propagation Studies","score":0.9621000289916992,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.7944466471672058},{"id":"https://openalex.org/keywords/battlefield","display_name":"Battlefield","score":0.715204119682312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6708812117576599},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.6047748327255249},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.48746371269226074},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.41986677050590515},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.41333144903182983},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3425096869468689},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3273733854293823}],"concepts":[{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.7944466471672058},{"id":"https://openalex.org/C2779669469","wikidata":"https://www.wikidata.org/wiki/Q4895508","display_name":"Battlefield","level":2,"score":0.715204119682312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6708812117576599},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.6047748327255249},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.48746371269226074},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.41986677050590515},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.41333144903182983},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3425096869468689},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3273733854293823},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3444370.3444571","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444571","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W6600106792","https://openalex.org/W6600567258","https://openalex.org/W6609856777"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W2059768187","https://openalex.org/W4247925126","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4327774218","https://openalex.org/W3206445629","https://openalex.org/W2605096541","https://openalex.org/W3200286695","https://openalex.org/W4379143281"],"abstract_inverted_index":{"After":[0],"a":[1,42],"century":[2],"of":[3,48,68,74,84,93,98],"development,":[4],"UAVs":[5,24],"have":[6,25],"been":[7],"mainly":[8],"used":[9,17],"as":[10,32],"target":[11],"drones":[12],"at":[13],"first,":[14],"and":[15,21,37,40,103],"later":[16],"for":[18],"battlefield":[19,43],"reconnaissance":[20,33],"surveillance.":[22],"Now,":[23],"become":[26,41],"integrated":[27],"with":[28],"multiple":[29],"functions":[30],"such":[31],"surveillance,":[34],"ground":[35],"attack,":[36],"communication":[38,51],"relay":[39],"weapon.":[44],"However,":[45],"the":[46,49,66,72,75,82,85,90,95,99,105],"fragility":[47],"UAV":[50,86,100,110],"link":[52],"has":[53],"caused":[54],"it":[55],"to":[56],"be":[57,79],"greatly":[58],"challenged":[59],"in":[60,81],"its":[61],"application.":[62],"This":[63],"article":[64],"introduces":[65],"concept":[67],"interference":[69,76,96,106],"tolerance":[70,97],"through":[71],"analysis":[73],"that":[77],"may":[78],"encountered":[80],"execution":[83],"mission.":[87],"Starting":[88],"from":[89],"two":[91],"aspects":[92],"improving":[94],"receiving":[101],"end":[102],"reducing":[104],"signal":[107],"ratio,":[108],"several":[109],"communications":[111],"Anti-dry":[112],"methods":[113],"are":[114],"proposed.":[115]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
