TY - GEN
T1 - Can the Operator of a Drone Be Located by Following the Drone’s Path?
AU - Mashhadi, Eliyahu
AU - Oren, Yossi
AU - Weiss, Gera
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - Small commercial Unmanned Aerial Systems (UASs), called drones in common language, pose significant security risks due to their agility, high availability and low price. There is, therefor, a growing need to develop methods for detection, localization and mitigation of malicious and other harmful operation of these drones. This paper presents our work towards autonomously localizing drone operators based only on following their path in the sky. We use a realistic simulation environment and collect the path of the drone when flown from different points of view. A deep neural network was trained to be able to predict the location of drone operators, given the path of the drones. The model is able to achieve prediction of the location of the location of the operator with 73% accuracy.
AB - Small commercial Unmanned Aerial Systems (UASs), called drones in common language, pose significant security risks due to their agility, high availability and low price. There is, therefor, a growing need to develop methods for detection, localization and mitigation of malicious and other harmful operation of these drones. This paper presents our work towards autonomously localizing drone operators based only on following their path in the sky. We use a realistic simulation environment and collect the path of the drone when flown from different points of view. A deep neural network was trained to be able to predict the location of drone operators, given the path of the drones. The model is able to achieve prediction of the location of the location of the operator with 73% accuracy.
KW - Deep learning
KW - Deep neural network
KW - Drone
KW - Security
KW - Surveillance
KW - UAS
UR - http://www.scopus.com/inward/record.url?scp=85087793027&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-49785-9_6
DO - 10.1007/978-3-030-49785-9_6
M3 - Conference contribution
AN - SCOPUS:85087793027
SN - 9783030497842
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 85
EP - 93
BT - Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings
A2 - Dolev, Shlomi
A2 - Weiss, Gera
A2 - Kolesnikov, Vladimir
A2 - Lodha, Sachin
PB - Springer
T2 - 4th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020
Y2 - 2 July 2020 through 3 July 2020
ER -