Classification of Small UAVs Based on Auxiliary Classifier Wasserstein GANs

Beyond their benign uses, the small Unmanned Aerial Vehicles (UAVs) are expected to take the major role in future smart cities that have attracted the attention of the public and authorities. Therefore, detecting, tracking and classifying the type of UAVs is important for surveillance and air traffic management applications. Existing UAVs detection works focus on radars, visual detection, and acoustic sensors. However, the work was done by applying Support Vector Machine (SVM), k-Nearest Neighbor (KNN) based methods to classify the UAVs need a large number of samples for feature extraction to train a model. In this paper, we propose a new small UAVs classification system using Auxiliary Classifier Wasserstein Generative Adversarial Networks (AC-WGANs) based on the wireless signals collected from the UAVs of various types. Before the classification, using the Universal Software Radio Peripheral (USRP), oscilloscope and antenna to collect the wireless signals, preprocessing and dimensionality reduction to represent information at a lower dimension space. The processed data from UAVs is input to the UAVs' discriminant model of the AC-WGANs for classification. The obtained results show the effectiveness of the proposed system, which can achieve a recognition accuracy of around 95% in the indoor environment and can also be suitable in the outdoor environment.

[1]  Jonathon Shlens,et al.  Conditional Image Synthesis with Auxiliary Classifier GANs , 2016, ICML.

[2]  Stephan Sand,et al.  Application-driven design of aerial communication networks , 2014, IEEE Communications Magazine.

[3]  Stefan Nilsson,et al.  Micro-Doppler extraction of a small UAV in a non-line-of-sight urban scenario , 2017, Defense + Security.

[4]  Richard Han,et al.  Investigating Cost-effective RF-based Detection of Drones , 2016, DroNet@MobiSys.

[5]  Felipe Gonzalez,et al.  Autonomous UAV with vision based on-board decision making for remote sensing and precision agriculture , 2017, 2017 IEEE Aerospace Conference.

[6]  Caidan Zhao,et al.  Wireless local area network cards identification based on transient fingerprinting , 2013, Wirel. Commun. Mob. Comput..

[7]  Léon Bottou,et al.  Towards Principled Methods for Training Generative Adversarial Networks , 2017, ICLR.

[8]  Caidan Zhao,et al.  Detection of unmanned aerial vehicle signal based on Gaussian mixture model , 2017, 2017 12th International Conference on Computer Science and Education (ICCSE).

[9]  Ismail Guvenc,et al.  Receding Horizon Multi-UAV Cooperative Tracking of Moving RF Source , 2017, IEEE Communications Letters.

[10]  Xiaojiang Du,et al.  Detection of LSSUAV using hash fingerprint based SVDD , 2017, 2017 IEEE International Conference on Communications (ICC).

[11]  Xiaojiang Chen,et al.  GuideLoc: UAV-Assisted Multitarget Localization System for Disaster Rescue , 2017, Mob. Inf. Syst..

[12]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[13]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[14]  Raymond Y. K. Lau,et al.  Least Squares Generative Adversarial Networks , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).

[15]  Xiaojiang Du,et al.  Designing efficient routing protocol for heterogeneous sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[16]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[17]  Yong Zhang,et al.  Automatic Power Line Inspection Using UAV Images , 2017, Remote. Sens..

[18]  Aaron C. Courville,et al.  Improved Training of Wasserstein GANs , 2017, NIPS.

[19]  S. Coveney,et al.  Lightweight UAV digital elevation models and orthoimagery for environmental applications: data accuracy evaluation and potential for river flood risk modelling , 2017 .

[20]  Falko Dressler,et al.  An IEEE 802.11a/g/p OFDM receiver for GNU radio , 2013, SRIF '13.

[21]  Ben Brown,et al.  Pondering personal privacy: a pragmatic approach to the Fourth Amendment protection of privacy in the information age , 2017 .

[22]  Rohan Bennett,et al.  Review of the Current State of UAV Regulations , 2017, Remote. Sens..

[23]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[24]  Yan Liu,et al.  An On-Line Calibration Technique for General Infrared Camera , 2017, ICVS.

[25]  Matthew Peacock,et al.  Towards detection and control of civilian unmanned aerial vehicles , 2013 .

[26]  Sebastian Banaszek,et al.  APPLICATION OF NEW TECHNOLOGY DATA ACQUISITION USING AERIAL (UAV) DIGITAL IMAGES FOR THE NEEDS OF URBAN REVITALIZATION , 2017 .

[27]  Qinggang Meng,et al.  Vehicle Detection from UAVs by Using SIFT with Implicit Shape Model , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[28]  André Dias,et al.  PLineD: Vision-based power lines detection for Unmanned Aerial Vehicles , 2017, 2017 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC).

[29]  Junghyun Park,et al.  Real-time UAV sound detection and analysis system , 2017, 2017 IEEE Sensors Applications Symposium (SAS).

[30]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[31]  Pieter Abbeel,et al.  InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets , 2016, NIPS.

[32]  Ian F. Akyildiz,et al.  Help from the Sky: Leveraging UAVs for Disaster Management , 2017, IEEE Pervasive Computing.

[33]  J. J. M. de Wit,et al.  Classification of small UAVs and birds by micro-Doppler signatures , 2013, 2013 European Radar Conference.

[34]  Jie Wu,et al.  Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms , 2016, IEEE Transactions on Vehicular Technology.

[35]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[36]  Phani Chavali,et al.  Cognitive radar for target tracking in multipath scenarios , 2010, 2010 International Waveform Diversity and Design Conference.

[37]  Léon Bottou,et al.  Wasserstein GAN , 2017, ArXiv.

[38]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.