{"id":"https://openalex.org/W4310614631","doi":"https://doi.org/10.23919/cnsm55787.2022.9964907","title":"FED-UP: Federated Deep Reinforcement Learning-based UAV Path Planning against Hostile Defense System","display_name":"FED-UP: Federated Deep Reinforcement Learning-based UAV Path Planning against Hostile Defense System","publication_year":2022,"publication_date":"2022-10-31","ids":{"openalex":"https://openalex.org/W4310614631","doi":"https://doi.org/10.23919/cnsm55787.2022.9964907"},"language":"en","primary_location":{"id":"doi:10.23919/cnsm55787.2022.9964907","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm55787.2022.9964907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 18th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019784196","display_name":"Alvi Ataur Khalil","orcid":"https://orcid.org/0000-0002-4186-111X"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alvi Ataur Khalil","raw_affiliation_strings":["Florida International University,Analytics for Cyber Defense (ACyD) Lab,USA","Analytics for Cyber Defense (ACyD) Lab, Florida International University, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University,Analytics for Cyber Defense (ACyD) Lab,USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Analytics for Cyber Defense (ACyD) Lab, Florida International University, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100648380","display_name":"Mohammad Ashiqur Rahman","orcid":"https://orcid.org/0000-0002-2963-7430"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Ashiqur Rahman","raw_affiliation_strings":["Florida International University,Analytics for Cyber Defense (ACyD) Lab,USA","Analytics for Cyber Defense (ACyD) Lab, Florida International University, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University,Analytics for Cyber Defense (ACyD) Lab,USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Analytics for Cyber Defense (ACyD) Lab, Florida International University, USA","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019784196"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":6.4656,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.96098542,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"268","last_page":"274"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10586","display_name":"Robotic Path Planning Algorithms","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.9127395153045654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7551113367080688},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7175827622413635},{"id":"https://openalex.org/keywords/motion-planning","display_name":"Motion planning","score":0.6857324242591858},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6168564558029175},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5180714130401611},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4128872752189636},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.38020843267440796},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35588616132736206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35201793909072876},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3398721218109131},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20185256004333496},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12160128355026245}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.9127395153045654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7551113367080688},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7175827622413635},{"id":"https://openalex.org/C81074085","wikidata":"https://www.wikidata.org/wiki/Q366872","display_name":"Motion planning","level":3,"score":0.6857324242591858},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6168564558029175},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5180714130401611},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4128872752189636},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.38020843267440796},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35588616132736206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35201793909072876},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3398721218109131},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20185256004333496},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12160128355026245}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cnsm55787.2022.9964907","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm55787.2022.9964907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 18th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2081261485","https://openalex.org/W2770171510","https://openalex.org/W2971481292","https://openalex.org/W2981460880","https://openalex.org/W3006017224","https://openalex.org/W3006799860","https://openalex.org/W3082262929","https://openalex.org/W3085451980","https://openalex.org/W3102310167","https://openalex.org/W3126321819","https://openalex.org/W3127085325","https://openalex.org/W3134843574","https://openalex.org/W3166331718","https://openalex.org/W3207662460","https://openalex.org/W3208586472","https://openalex.org/W4205746880","https://openalex.org/W4206273602","https://openalex.org/W4220738117","https://openalex.org/W6772307254","https://openalex.org/W6779445818"],"related_works":["https://openalex.org/W3158693955","https://openalex.org/W4297609211","https://openalex.org/W2799139340","https://openalex.org/W2108886361","https://openalex.org/W3127201362","https://openalex.org/W2000120653","https://openalex.org/W2176548496","https://openalex.org/W4312587331","https://openalex.org/W4320038068","https://openalex.org/W1962141875"],"abstract_inverted_index":{"In":[0,91],"military":[1,53],"operations,":[2],"unmanned":[3],"aerial":[4],"vehicles":[5],"(UAVs)":[6],"have":[7],"been":[8],"heavily":[9],"utilized":[10],"in":[11,28,52,67,114,171,174],"recent":[12],"years.":[13],"However,":[14],"due":[15],"to":[16,41,59,73,78,83,110,146],"the":[17,38,46,64,130,148,154,158,165,168],"antenna":[18],"installment":[19],"regulation,":[20],"UAVs":[21,36,51,66,70,109,173],"cannot":[22],"be":[23,74],"controlled":[24],"by":[25,152],"human":[26],"operators":[27],"a":[29,97,115,119],"restricted":[30],"area.":[31],"Hence,":[32],"artificial":[33],"intelligence":[34],"(AI)-driven":[35],"are":[37,57,71],"practical":[39],"solution":[40],"this":[42,92],"out-of-coverage":[43],"problem.":[44],"With":[45],"increased":[47],"use":[48],"of":[49,167],"autonomous":[50],"applications,":[54],"defense":[55,89,121],"systems":[56],"deployed":[58],"target":[60],"and":[61,86,134],"shoot":[62],"down":[63],"enemy":[65],"operation.":[68],"Thus,":[69],"needed":[72],"trained,":[75],"not":[76],"only":[77],"achieve":[79],"goals":[80],"but":[81],"also":[82],"avoid":[84],"static":[85],"dynamic":[87,120],"hostile":[88,116,176],"systems.":[90],"work,":[93],"we":[94],"propose":[95],"FED-UP,":[96],"federated":[98,124],"deep":[99],"reinforcement":[100,131],"learning":[101,125,132],"(DRL)-based":[102],"UAV":[103],"path":[104],"planning":[105],"framework,":[106],"that":[107],"enables":[108],"carry":[111],"out":[112],"missions":[113],"environment":[117],"with":[118],"system.":[122],"The":[123,161],"(FL)":[126],"based":[127],"training":[128,149,159],"accelerates":[129],"process":[133,150],"improves":[135],"model":[136,170],"performance.":[137],"We":[138],"additionally":[139],"introduce":[140],"significant":[141],"reply":[142],"memory":[143],"buffer":[144],"(SRMB)":[145],"quicken":[147],"more,":[151],"selecting":[153],"crucial":[155],"experiences":[156],"during":[157],"period.":[160],"experimental":[162],"results":[163],"validate":[164],"efficiency":[166],"proposed":[169],"controlling":[172],"dynamic,":[175],"environments.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
