Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (3): 876-882.DOI: 10.11772/j.issn.1001-9081.2023030299
• Network and communications • Previous Articles Next Articles
Jingxian ZHOU1, Xina LI2()
Received:
2023-03-23
Revised:
2023-05-30
Accepted:
2023-06-02
Online:
2023-06-20
Published:
2024-03-10
Contact:
Xina LI
About author:
ZHOU Jingxian, born in 1981, Ph. D., associate research fellow. His research interests include security authentication protocol, data privacy protection, security architecture for internet of things.
Supported by:
通讯作者:
李希娜
作者简介:
周景贤(1981—),男, 河南信阳人,副研究员,博士,主要研究方向:安全认证协议、数据隐私保护、物联网安全架构;
基金资助:
CLC Number:
Jingxian ZHOU, Xina LI. UAV detection and recognition based on improved convolutional neural network and radio frequency fingerprint[J]. Journal of Computer Applications, 2024, 44(3): 876-882.
周景贤, 李希娜. 基于改进卷积神经网络和射频指纹的无人机检测与识别[J]. 《计算机应用》唯一官方网站, 2024, 44(3): 876-882.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023030299
参数 | 值 |
---|---|
卷积层1 | 卷积核 |
ReLU | Max(0,x) |
残差块卷积层1 | 卷积核 |
残差块卷积层2 | 卷积核 |
全局平均池化层 | |
全连接层1(FC1) | 神经元80 |
全连接层2(FC2) | 神经元4 |
dropout率 | 50% |
I2正则化参数 | λ=0.000 1 |
Tab. 1 Parameters of LRCNN
参数 | 值 |
---|---|
卷积层1 | 卷积核 |
ReLU | Max(0,x) |
残差块卷积层1 | 卷积核 |
残差块卷积层2 | 卷积核 |
全局平均池化层 | |
全连接层1(FC1) | 神经元80 |
全连接层2(FC2) | 神经元4 |
dropout率 | 50% |
I2正则化参数 | λ=0.000 1 |
名称 | 含义 | 取值 |
---|---|---|
Learning_rate | 学习速率、学习步长 | 0.000 1 |
Beta1 | 一阶矩估计的指数衰减因子 | 0.990 0 |
Beta2 | 二阶矩估计的指数衰减因子 | 0.990 0 |
Epsilon | 避免除0参数(≥0) | 0.001 0 |
Use_locking | 为true时,更新操作使用锁 | — |
Tab. 2 Parameters of Adam stochastic gradient descent algorithm
名称 | 含义 | 取值 |
---|---|---|
Learning_rate | 学习速率、学习步长 | 0.000 1 |
Beta1 | 一阶矩估计的指数衰减因子 | 0.990 0 |
Beta2 | 二阶矩估计的指数衰减因子 | 0.990 0 |
Epsilon | 避免除0参数(≥0) | 0.001 0 |
Use_locking | 为true时,更新操作使用锁 | — |
batch_size | 训练时间/min | 训练精度/% |
---|---|---|
2 | 35 | 80.6 |
4 | 20 | 84.2 |
8 | 12 | 67.8 |
Tab. 3 Training time and accuracy with different batch_size
batch_size | 训练时间/min | 训练精度/% |
---|---|---|
2 | 35 | 80.6 |
4 | 20 | 84.2 |
8 | 12 | 67.8 |
无人机数 | 不同算法的识别精度/% | ||
---|---|---|---|
LRCNN | OracleCNN | SVM | |
2 | 88.2 | 84.1 | 63.3 |
4 | 86.2 | 81.3 | 60.6 |
8 | 85.2 | 78.7 | 57.3 |
16 | 83.9 | 75.9 | 52.4 |
Tab. 4 Influence of number of UAVs on recognition accuracy
无人机数 | 不同算法的识别精度/% | ||
---|---|---|---|
LRCNN | OracleCNN | SVM | |
2 | 88.2 | 84.1 | 63.3 |
4 | 86.2 | 81.3 | 60.6 |
8 | 85.2 | 78.7 | 57.3 |
16 | 83.9 | 75.9 | 52.4 |
1 | WANG R, LI Z, TANG J, et al. RF fingerprint identification of commercial UAV in outdoor environment [C]// Proceedings of the 2022 International Conference on Computing, Communication, Perception and Quantum Technology. Piscataway: IEEE, 2022: 367-371. 10.1109/ccpqt56151.2022.00070 |
2 | XU X, ZENG Y, GUAN Y L, et al. Overcoming endurance issue: UAV-enabled communications with proactive caching [J]. IEEE Journal on Selected Areas in Communications, 2018, 36(6): 1231-1244. 10.1109/jsac.2018.2844979 |
3 | 李超群,王金明.基于短时傅里叶变换的无人机射频指纹分类识别[J].通信技术,2022,55(9):1202-1207. 10.3969/j.issn.1002-0802.2022.09.014 |
LI C Q, WANG J M. Classification and identification of UAV RF fingerprints based on short time Fourier transform [J]. Communication Technology, 2022, 55(9): 1202-1207. 10.3969/j.issn.1002-0802.2022.09.014 | |
4 | J-P HUTTNER, FRIEDRICH M. Current challenges in mission planning systems for UAVs: a systematic review [C]// Proceedings of the 2023 Integrated Communication, Navigation and Surveillance Conference. Piscataway: IEEE, 2023: 1-7. 10.1109/icns58246.2023.10124299 |
5 | SU Y, ZHOU J, GUO Z. A trust-based security scheme for 5G UAV communication systems [C]// Proceedings of the 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference Conference on Cyber Science and Technology Congress. Piscataway: IEEE, 2020: 371-374. 10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00072 |
6 | PIRKER D, FISCHER T, LESJAK C, et al. Global and secured UAV authentication system based on hardware-security [C]// Proceedings of the 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering. Piscataway: IEEE, 2020: 84-89. 10.1109/mobilecloud48802.2020.00020 |
7 | URETEN O, SERINKEN N. Wireless security through RF fingerprinting [J]. Canadian Journal of Electrical and Computer Engineering, 2007, 32(1): 27-33. 10.1109/cjece.2007.364330 |
8 | SANKHE K, BELGIOVINE M, ZHOU F, et al. ORACLE: optimized radio classification through convolutional neural networks[C]// Proceedings of the 2019 IEEE Conference on Computer Communications. Piscataway: IEEE, 2019: 370-378. 10.1109/infocom.2019.8737463 |
9 | SONG L, GAO Z, HUANG J, et al. A lightweight radio frequency fingerprint extraction scheme for device identification [C]// Proceedings of the 2023 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE, 2023: 1-5. 10.1109/wcnc55385.2023.10118789 |
10 | YANG Y, YAN T. RF fingerprint recognition method based on DBN-SVM [C]// Proceedings of the IEEE 10th International Conference on Information, Communication and Networks. Piscataway: IEEE, 2022: 572-577. 10.1109/icicn56848.2022.10006500 |
11 | LI Y, CHEN L, CHEN J, et al. A low complexity feature extraction for the RF fingerprinting process [C]// Proceedings of the 2018 IEEE Conference on Communications and Network Security. Piscataway: IEEE, 2018: 1-2. 10.1109/cns.2018.8433156 |
12 | KENNEDY I O, SCANLON P, BUDDHIKOT M M. Passive steady state RF fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays [C]// Proceedings of the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks. Piscataway: IEEE, 2008: 1-12. 10.1109/dyspan.2008.46 |
13 | O’SHEA J, CORGAN J, CLANCY T C. Unsupervised representation learning of structured radio communication signals [C]// Proceedings of the 1st International Workshop on Sensing, Processing and Learning for Intelligent Machines. Piscataway: IEEE, 2016: 1-5. 10.1109/splim.2016.7528397 |
14 | FENG J, TANG X, ZHANG B, et al. A lightweight deep learning RF fingerprint recognition method [C]// Proceedings of the 4th International Conference on Communications, Information System and Computer Engineering. Piscataway: IEEE, 2022: 452-457. 10.1109/cisce55963.2022.9851177 |
15 | LI C, WANG J, WANG W, et al. RF-based on feature fusion and convolutional neural network classification of UAVs [C]// Proceedings of the IEEE 8th International Conference on Computer and Communications. Piscataway: IEEE, 2022: 1899-1904. 10.1109/iccc56324.2022.10065895 |
16 | XU J, ZHAO H. Detection to primary user based on radio frequency fingerprint in cognitive radio [C]// Proceedings of the 2nd International Congress on Image and Signal Processing. Piscataway: IEEE, 2009: 1-5. 10.1109/cisp.2009.5302025 |
17 | NGUYEN P, TRUONG H, RAVINDRANATHAN M, et al. Matthan: drone presence detection by identifying physical signatures in the drone’s RF communication [C]// Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. New York: ACM, 2017: 211-224. 10.1145/3081333.3081354 |
18 | EZUMA M, ERDEN F, KUMAR ANJINAPPA C, et al. Detection and classification of UAVs using RF fingerprints in the presence of Wi-Fi and Bluetooth interference [J]. IEEE Open Journal of the Communications Society, 2022, 1: 60-76. |
19 | NIE W, HAN Z-C, ZHOU M, et al. UAV detection and identification based on WiFi signal and RF fingerprint [J]. IEEE Sensors Journal, 2021, 21(12): 13540-13550. 10.1109/jsen.2021.3068444 |
20 | 李雨珊,谢非佚,陈松林,等.适合终端的射频指纹信号特征提取及识别[J].通信技术,2018,51(1):63-66. 10.3969/j.issn.1002-0802.2018.01.012 |
LI Y S, XIE F Y, CHEN S L, et al. Feature extraction and recognition of radio frequency fingerprint signal suitable for terminal [J]. Communication Technology, 2018, 51(1): 63-66. 10.3969/j.issn.1002-0802.2018.01.012 | |
21 | HE K, ZHANG X, REN S, et al. Deep residual learning for image recognition [C]// Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2016: 770-778. 10.1109/cvpr.2016.90 |
22 | SHU Y, XU Y. End-to-end captcha recognition using deep CNN-RNN network [C]// Proceedings of the IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference. Piscataway: IEEE, 2019: 54-58. 10.1109/imcec46724.2019.8983895 |
[1] | Jie WANG, Hua MENG. Image classification algorithm based on overall topological structure of point cloud [J]. Journal of Computer Applications, 2024, 44(4): 1107-1113. |
[2] | Tianhua CHEN, Jiaxuan ZHU, Jie YIN. Bird recognition algorithm based on attention mechanism [J]. Journal of Computer Applications, 2024, 44(4): 1114-1120. |
[3] | Lijun XU, Hui LI, Zuyang LIU, Kansong CHEN, Weixuan MA. 3D-GA-Unet: MRI image segmentation algorithm for glioma based on 3D-Ghost CNN [J]. Journal of Computer Applications, 2024, 44(4): 1294-1302. |
[4] | Yongfeng DONG, Jiaming BAI, Liqin WANG, Xu WANG. Chinese named entity recognition combining prior knowledge and glyph features [J]. Journal of Computer Applications, 2024, 44(3): 702-708. |
[5] | Ruifeng HOU, Pengcheng ZHANG, Liyuan ZHANG, Zhiguo GUI, Yi LIU, Haowen ZHANG, Shubin WANG. Iterative denoising network based on total variation regular term expansion [J]. Journal of Computer Applications, 2024, 44(3): 916-921. |
[6] | Jiawei ZHANG, Guandong GAO, Ke XIAO, Shengzun SONG. Violent crime hierarchy algorithm by joint modeling of improved hierarchical attention network and TextCNN [J]. Journal of Computer Applications, 2024, 44(2): 403-410. |
[7] | Rui ZHANG, Siqi SONG, Jing HU, Yongmei ZHANG, Yanfeng CHAI. Performance evaluation of industry-university-research based on statistics and adaptive ParNet [J]. Journal of Computer Applications, 2024, 44(2): 628-637. |
[8] | Yunyun GAO, Lasheng ZHAO, Qiang ZHANG. Acoustic word embedding model based on Bi-LSTM and convolutional-Transformer [J]. Journal of Computer Applications, 2024, 44(1): 123-128. |
[9] | Hao CHEN, Zhenping XIA, Cheng CHENG, Xing LIN-LI, Bowen ZHANG. Lightweight image super-resolution reconstruction network based on Transformer-CNN [J]. Journal of Computer Applications, 2024, 44(1): 292-299. |
[10] | Kunting LU, Rongrong FEI, Xuande ZHANG. Remote sensing image pansharpening by convolutional neural network [J]. Journal of Computer Applications, 2023, 43(9): 2963-2969. |
[11] | Shaofa SHANG, Lin JIANG, Yuancheng LI, Yun ZHU. Adaptive partitioning and scheduling method of convolutional neural network inference model on heterogeneous platforms [J]. Journal of Computer Applications, 2023, 43(9): 2828-2835. |
[12] | Yuanyuan QIN, Hong ZHANG. Pulmonary nodule detection algorithm based on attention feature pyramid networks [J]. Journal of Computer Applications, 2023, 43(7): 2311-2318. |
[13] | Huibin ZHANG, Liping FENG, Yaojun HAO, Yining WANG. Ancient mural dynasty identification based on attention mechanism and transfer learning [J]. Journal of Computer Applications, 2023, 43(6): 1826-1832. |
[14] | Liyao FU, Mengxiao YIN, Feng YANG. Transformer based U-shaped medical image segmentation network: a survey [J]. Journal of Computer Applications, 2023, 43(5): 1584-1595. |
[15] | Rui XU, Shuang LIANG, Hang WAN, Yimin WEN, Shiming SHEN, Jian LI. Extraction of PM2.5 diffusion characteristics based on candlestick pattern matching [J]. Journal of Computer Applications, 2023, 43(5): 1394-1400. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||