Securing a UAV using individual characteristics from an EEG signal
暂无分享,去创建一个
[1] B. Staehle,et al. SENEKA - sensor network with mobile robots for disaster management , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[2] Sébastien Marcel,et al. Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[3] Weihua Sheng,et al. Dynamic target tracking and observing in a mobile sensor network , 2012, Robotics Auton. Syst..
[4] Pei Huang,et al. A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[5] Shau-Yin Tseng,et al. Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.
[6] Weihua Sheng,et al. Distributed Sensor Fusion for Scalar Field Mapping Using Mobile Sensor Networks , 2013, IEEE Transactions on Cybernetics.
[7] Christine Evans-Pughe,et al. Bzzzz zzz [ZigBee wireless standard] , 2003 .
[8] Wojciech Sałabun,et al. Processing and spectral analysis of the raw EEG signal from the MindWave , 2014 .
[9] Mohammed A. Hannan,et al. Traffic Sign Classification based on Neural Network for Advance Driver Assistance System , 2014 .
[10] Flemming Nielson,et al. ZigBee-2007 Security Essentials , 2008 .
[11] Jiming Chen,et al. Cooperative and active sensing in mobile sensor networks for scalar field mapping , 2013, 2013 IEEE International Conference on Automation Science and Engineering (CASE).
[12] Thanh-Trung Han,et al. Flocking of mobile robots by bounded feedback , 2016, 2016 IEEE International Conference on Automation Science and Engineering (CASE).
[13] Weihua Sheng,et al. Multirobot Cooperative Learning for Predator Avoidance , 2015, IEEE Transactions on Control Systems Technology.
[14] Walid Saad,et al. Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game , 2017, 2017 IEEE International Conference on Communications (ICC).
[15] Thanh-Trung Han,et al. Distributed flocking control of mobile robots by bounded feedback , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[16] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[17] M.G. Ceruti,et al. Application of Wireless Sensor Network to Military Information Integration , 2007, 2007 5th IEEE International Conference on Industrial Informatics.