Efficient Malicious UAV Detection Using Autoencoder-TSMamba Integration
        - URL: http://arxiv.org/abs/2505.10585v1
 - Date: Wed, 14 May 2025 15:04:04 GMT
 - Title: Efficient Malicious UAV Detection Using Autoencoder-TSMamba Integration
 - Authors: Azim Akhtarshenas, Ramin Toosi, David López-Pérez, Tohid Alizadeh, Alireza Hosseini, 
 - Abstract summary: Malicious Unmanned Aerial Vehicles (UAVs) present a significant threat to next-generation networks (NGNs)<n>This paper proposes an integrated (AE)-classifier system to detect malicious UAVs.
 - Score: 4.119508697466852
 - License: http://creativecommons.org/licenses/by-nc-nd/4.0/
 - Abstract:   Malicious Unmanned Aerial Vehicles (UAVs) present a significant threat to next-generation networks (NGNs), posing risks such as unauthorized surveillance, data theft, and the delivery of hazardous materials. This paper proposes an integrated (AE)-classifier system to detect malicious UAVs. The proposed AE, based on a 4-layer Tri-orientated Spatial Mamba (TSMamba) architecture, effectively captures complex spatial relationships crucial for identifying malicious UAV activities. The first phase involves generating residual values through the AE, which are subsequently processed by a ResNet-based classifier. This classifier leverages the residual values to achieve lower complexity and higher accuracy. Our experiments demonstrate significant improvements in both binary and multi-class classification scenarios, achieving up to 99.8 % recall compared to 96.7 % in the benchmark. Additionally, our method reduces computational complexity, making it more suitable for large-scale deployment. These results highlight the robustness and scalability of our approach, offering an effective solution for malicious UAV detection in NGN environments. 
 
       
      
        Related papers
        - Contrastive-KAN: A Semi-Supervised Intrusion Detection Framework for   Cybersecurity with scarce Labeled Data [0.0]
We propose a real-time intrusion detection system based on a semi-supervised contrastive learning framework using the Kolmogorov-Arnold Network (KAN)<n>Our method leverages abundant unlabeled data to effectively distinguish between normal and attack behaviors.<n>We validate our approach on three benchmark datasets, UNSW-NB15, BoT-IoT, and Gas Pipeline, using only 2.20%, 1.28%, and 8% of labeled samples, respectively.
arXiv  Detail & Related papers  (2025-07-14T21:02:34Z) - Generative Adversarial Evasion and Out-of-Distribution Detection for UAV   Cyber-Attacks [6.956559003734227]
This paper introduces a conditional generative adversarial network (cGAN)-based framework for crafting stealthy adversarial attacks that evade IDS mechanisms.<n>Our findings emphasize the importance of advanced probabilistic modeling to strengthen IDS capabilities against adaptive, generative-model-based cyber intrusions.
arXiv  Detail & Related papers  (2025-06-26T10:56:34Z) - Aerial Secure Collaborative Communications under Eavesdropper Collusion   in Low-altitude Economy: A Generative Swarm Intelligent Approach [84.20358039333756]
We introduce distributed collaborative beamforming (DCB) into AAV swarms and handle the eavesdropper collusion by controlling the corresponding signal distributions.<n>We minimize the two-way known secrecy capacity and maximum sidelobe level to avoid information leakage from the known and unknown eavesdroppers.<n>We propose a novel generative swarm intelligence (GenSI) framework to solve the problem with less overhead.
arXiv  Detail & Related papers  (2025-03-02T04:02:58Z) - Structural damage detection via hierarchical damage information with   volumetric assessment [1.4470320778878742]
Structural health monitoring (SHM) is essential for ensuring the safety and longevity of infrastructure.<n>This study introduces the Guided Detection Network (Guided-DetNet), a framework designed to address these challenges.<n>Guided-DetNet is characterized by a Generative Attention Module (GAM), Hierarchical Elimination Algorithm (HEA), and Volumetric Contour Visual Assessment (VCVA)
arXiv  Detail & Related papers  (2024-07-29T04:33:04Z) - Enhanced Intrusion Detection System for Multiclass Classification in UAV   Networks [1.749935196721634]
This paper presents a new intrusion detection system (IDS) for UAV networks.
A binary-tuple representation was used for encoding class labels, along with a deep learning-based approach employed for classification.
The proposed system enhances the intrusion detection by capturing complex class relationships and temporal network patterns.
arXiv  Detail & Related papers  (2024-06-14T21:29:15Z) - Investigating Deep Watermark Security: An Adversarial Transferability
  Perspective [18.363276470822427]
This study introduces two effective transferable attackers to assess the vulnerability of deep watermarks against erasure and tampering risks.
We propose the Easy Sample Selection (ESS) mechanism and the Easy Sample Matching Attack (ESMA) method.
 Experiments show a significant enhancement in the success rate of targeted transfer attacks for both ESMA and BEM-ESMA methods.
arXiv  Detail & Related papers  (2024-02-26T08:41:14Z) - Model Stealing Attack against Graph Classification with Authenticity,   Uncertainty and Diversity [80.16488817177182]
GNNs are vulnerable to the model stealing attack, a nefarious endeavor geared towards duplicating the target model via query permissions.
We introduce three model stealing attacks to adapt to different actual scenarios.
arXiv  Detail & Related papers  (2023-12-18T05:42:31Z) - Small Object Detection via Coarse-to-fine Proposal Generation and
  Imitation Learning [52.06176253457522]
We propose a two-stage framework tailored for small object detection based on the Coarse-to-fine pipeline and Feature Imitation learning.
CFINet achieves state-of-the-art performance on the large-scale small object detection benchmarks, SODA-D and SODA-A.
arXiv  Detail & Related papers  (2023-08-18T13:13:09Z) - Integrated Sensing, Computation, and Communication for UAV-assisted
  Federated Edge Learning [52.7230652428711]
Federated edge learning (FEEL) enables privacy-preserving model training through periodic communication between edge devices and the server.
Unmanned Aerial Vehicle (UAV)mounted edge devices are particularly advantageous for FEEL due to their flexibility and mobility in efficient data collection.
arXiv  Detail & Related papers  (2023-06-05T16:01:33Z) - Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian
  Mixture Models [0.0]
In this paper, we propose an unsupervised insider threat detection system based on audit data.
The proposed approach leverages a user-based model to optimize specific behaviors modelization and an automatic feature extraction system based on Word2Vec.
Results indicate that the proposed method competes with state-of-the-art approaches, presenting a good recall of 88%, accuracy and true negative rate of 93%, and a false positive rate of 6.9%.
arXiv  Detail & Related papers  (2022-11-23T13:45:19Z) - Generative Adversarial Network-Driven Detection of Adversarial Tasks in
  Mobile Crowdsensing [5.675436513661266]
Crowdsensing systems are vulnerable to various attacks as they build on non-dedicated and ubiquitous properties.
Previous works suggest that GAN-based attacks exhibit more crucial devastation than empirically designed attack samples.
This paper aims to detect intelligently designed illegitimate sensing service requests by integrating a GAN-based model.
arXiv  Detail & Related papers  (2022-02-16T00:23:25Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
  Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
 Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv  Detail & Related papers  (2020-08-05T19:29:35Z) - Investigating Robustness of Adversarial Samples Detection for Automatic
  Speaker Verification [78.51092318750102]
This work proposes to defend ASV systems against adversarial attacks with a separate detection network.
A VGG-like binary classification detector is introduced and demonstrated to be effective on detecting adversarial samples.
arXiv  Detail & Related papers  (2020-06-11T04:31:56Z) 
        This list is automatically generated from the titles and abstracts of the papers in this site.
       
     
           This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.