{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:47:05Z","timestamp":1735584425038},"reference-count":260,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004252","name":"Qatar University","doi-asserted-by":"publisher","award":["QUCP-CENG-2018\\2019-1"],"id":[{"id":"10.13039\/501100004252","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/comst.2019.2924143","type":"journal-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T21:28:14Z","timestamp":1561066094000},"page":"3340-3385","source":"Crossref","is-referenced-by-count":189,"title":["Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3452-3059","authenticated-orcid":false,"given":"Reza","family":"Shakeri","sequence":"first","affiliation":[]},{"given":"Mohammed Ali","family":"Al-Garadi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5515-6542","authenticated-orcid":false,"given":"Ahmed","family":"Badawy","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1583-7503","authenticated-orcid":false,"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2347-9555","authenticated-orcid":false,"given":"Tamer","family":"Khattab","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3527-2554","authenticated-orcid":false,"given":"Abdulla Khalid","family":"Al-Ali","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1327-9077","authenticated-orcid":false,"given":"Khaled A.","family":"Harras","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.3390\/rs9040312"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1061\/9780784480830.043"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v9n5p1"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2013.2294314"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/IRC.2017.77"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/DDCLS.2017.8068132"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21118-3_6"},{"key":"ref178","author":"kim","year":"2015","journal-title":"Deep Neural Network for Real-Time Autonomous Indoor Navigation"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/3009977.3010047"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.01.005"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1089\/tmj.2017.0289"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-018-9768-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996862"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/j.2158-1592.2006.tb00225.x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600587CM"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/217415"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2531652"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600178CM"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470933"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2420036"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01449-0_20"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1061\/9780784413517.184"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2014.01.004"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1061\/9780784413616.195"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2017.2651163"},{"key":"ref189","first-page":"574","article-title":"‘On-the-spot training’ for terrain classification in autonomous air-ground collaborative teams","author":"delmerico","year":"2016","journal-title":"Proc Int Symp Exp Robot"},{"key":"ref188","first-page":"515","article-title":"Augmenting a convolutional neural network with local histograms—A case study in crop classification from high-resolution UAV imagery","author":"rebetez","year":"2016","journal-title":"Proc Eur Symp Artif Neural Netw -Adv Comput Intell Learn"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.3390\/rs9010022"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2018.2790926"},{"key":"ref28","article-title":"Towards cyber-physical systems integration in construction","author":"akanmu","year":"2012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600238CM"},{"key":"ref179","first-page":"91","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","author":"ren","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s40327-015-0029-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1734454.1734548"},{"key":"ref22","first-page":"3637","article-title":"Radar cross section measurements of small unmanned air vehicle systems in non-cooperative field environments","author":"to","year":"2009","journal-title":"Proc 3rd Eur Conf Antennas Propag (EuCAP)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2007.4304064"},{"key":"ref24","year":"2013","journal-title":"Cyber-Physical Systems (CPS)"},{"key":"ref23","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijtst.2017.02.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4725-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2005.1582577"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2010.5509452"},{"key":"ref154","author":"shinohara","year":"2014","journal-title":"Wireless Power Transfer via Radiowaves"},{"key":"ref153","first-page":"73","article-title":"Design of a cellular energy-harvesting radio","author":"mikeka","year":"2009","journal-title":"Proc IEEE Eur Wireless Technology Conf (EuWiT)"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/YAC.2018.8406390"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7702-0"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2010.5686445"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/PESC.2006.1711785"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110921"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060825"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070207"},{"key":"ref148","first-page":"960","article-title":"Cross-layer optimization of sensor networks based on cooperative MIMO techniques with rate adaptation","author":"cui","year":"2005","journal-title":"Proc IEEE 6th Workshop Signal Process Adv Wireless Commun"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1117\/12.613046"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2489253.2489262"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2016.2601287"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2010.937855"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM.2016.53"},{"key":"ref55","first-page":"1491","article-title":"Simulating drone-be-gone: Agile low-cost cyber-physical UAV testbed","author":"khan","year":"2016","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2014.6962228"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2514\/6.2004-6480"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2012.6385458"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2039455"},{"key":"ref167","first-page":"1","article-title":"Efficient estimation of word representations in vector space","volume":"abs 1301 3781","author":"mikolov","year":"2013","journal-title":"CoRR"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.223"},{"key":"ref164","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2487833"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680898"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2017.7962642"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2778242"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/rs4061671"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2015.09.012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s150714887"},{"key":"ref5","first-page":"51","article-title":"Major limitations of satellite images","volume":"4","author":"al-wassai","year":"2013","journal-title":"Journal of Global Research in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2495297"},{"key":"ref159","author":"haddal","year":"2010","journal-title":"Homeland Security Unmanned Aerial Vehicles and Border Surveillance"},{"key":"ref7","year":"2014","journal-title":"Hovering Over the Drone Patent Landscape IFI Claims Patent Services"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-009-9383-1"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-014-0077-y"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2017.05.027"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2017.7979468"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2612119"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2856587"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1456650.1456657","article-title":"Survey and analysis of multimodal sensor planning and integration for wide area surveillance","volume":"41","author":"abidi","year":"2009","journal-title":"ACM Comput Surveys"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s100908215"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2637408"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166794"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.9.9.687-692"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/rs9080824"},{"key":"ref73","first-page":"58","article-title":"Improved distributed coverage control for robotic visual sensor network under limited energy storage","volume":"10","author":"gusrialdi","year":"2013","journal-title":"International Journal of Imaging and Robotics"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016610507833"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1178782.1178800"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.05.014"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29363-9_25"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICA.2011.6130182"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2008.4739007"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2011.5980370"},{"key":"ref78","author":"jones","year":"2009","journal-title":"Cooperative Area Surveillance Strategies Using Multiple Unmanned Systems"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3390\/s151127783"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-006-5975-x"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206773"},{"key":"ref61","first-page":"1550","article-title":"Target-oriented scheduling in directional sensor networks","author":"cai","year":"2007","journal-title":"Proc 26th IEEE Int Conf Comput Commun (INFOCOM)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2010.5508238"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.45"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.05.003"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044482537-7\/50023-1"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-001-0040-8"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2158377"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-007-1328-5"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18003-3_4"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-8997-2_29"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1068\/b2697"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795448"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0083873"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.resuscitation.2018.04.005"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/37402.37406"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2345390"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.239"},{"key":"ref190","doi-asserted-by":"crossref","first-page":"469","DOI":"10.5194\/isprsarchives-XXXIX-B1-469-2012","article-title":"Study on construction of 3D building based on UAV images","volume":"xxxix b1","author":"feifei","year":"2012","journal-title":"Int Arch Photogramm Remote Sens Spat Inf Sci"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10578-9_13"},{"key":"ref191","author":"kelchtermans","year":"2017","journal-title":"How Hard Is it to Cross The Room? Training (Recurrent) Neural Networks to Steer a UAV"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.312"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.3390\/rs61212037"},{"key":"ref91","first-page":"287","article-title":"The inapproximability of illuminating polygons by $\\alpha$ -floodlights","author":"abdelkader","year":"2015","journal-title":"Proc COM Geo Conf"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055078"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2014.07.007"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-015-0270-7"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2014.6943040"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2603977"},{"key":"ref82","article-title":"Low power 0\/1 coverage and scheduling techniques in sensor networks","author":"meguerdichian","year":"2003"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.936985"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570744"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.12.025"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-016-0338-z"},{"key":"ref89","author":"duda","year":"2012","journal-title":"Pattern Classification"},{"key":"ref85","first-page":"28","article-title":"PEAS: A robust energy conserving protocol for long-lived sensor networks","author":"ye","year":"2003","journal-title":"Proc 23rd Int Conf Distrib Comput Syst"},{"key":"ref86","first-page":"1","article-title":"Target coverage heuristics using mobile cameras","author":"neishaboori","year":"2014","journal-title":"Proc 2nd Int Workshop Robot Sensor Netw"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2014.70"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2642668.2642671"},{"key":"ref200","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MCAS.2005.1507521","article-title":"From rate-distortion analysis to resource-distortion analysis","volume":"5","author":"he","year":"2005","journal-title":"IEEE Circuits Syst Mag"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/724597"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2015.140044"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.12.002"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831117"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069338"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214095"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-015-0025-2"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.04770"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2005.1497859"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2164034"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.881614"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.21236\/ADA546145"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2013.53027"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566851"},{"key":"ref213","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/3001836","article-title":"Security, privacy, and safety aspects of civilian drones: A survey","volume":"1","author":"altawy","year":"2017","journal-title":"ACM Trans Cyber-Physical Systems"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025632"},{"key":"ref215","author":"atherton","year":"2016","journal-title":"Researchers Put a Tiny Computer on a Drone to Make It a Hacking Machine Popular Science"},{"key":"ref216","first-page":"29","article-title":"The state of drones: State authority to regulate drones","volume":"8","author":"heverly","year":"2015","journal-title":"Albany Govt Law Rev"},{"key":"ref217","author":"carlini","year":"2017","journal-title":"Protecting Privacy from Aerial Surveillance Recommendations for Government Use of Drone Aircraft"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.2172\/1222445"},{"key":"ref219","first-page":"1","article-title":"The vulnerability of UAVs to cyber attacks—An approach to the risk assessment","author":"hartmann","year":"2013","journal-title":"Proc 5th Int Conf Cyber Conflict (CyCon)"},{"key":"ref220","article-title":"Improving security of autonomous UAVs fleets by using new specific embedded secure elements–A position paper","author":"akram","year":"2014","journal-title":"Proc 2nd AETOS Int Conf Res Challenges Future RPAS\/UAV Syst"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2017.7991460"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699093"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"ref225","author":"al-garadi","year":"2018","journal-title":"A survey of machine and deep learning methods for Internet of Things (IoT) security"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209973"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043583"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/6979.898217"},{"key":"ref126","first-page":"826","article-title":"UAV collision avoidance using probabilistic method in 3-D","author":"kim","year":"2007","journal-title":"Proc IEEE Int Conf Control Autom Syst (ICCAS)"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2015.7152342"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMI.2009.5274188"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2015.7152296"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/SICE.2008.4655013"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.3390\/app7040329"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TECHPOS.2009.5412074"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.338"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-012-9754-x"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.paerosci.2015.10.002"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2009.06.016"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-010-0105-z"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2578312"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403634"},{"key":"ref239","first-page":"320","article-title":"A simulation model and $H_\\infty$ loop shaping control of a quad rotor unmanned air vehicle","author":"chen","year":"2003","journal-title":"Proc Model Simulat Optim"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ICACI.2012.6463187"},{"key":"ref235","first-page":"188","article-title":"Attitude flight control system design of UAV using LQG $\\backslash$ LTR multivariable control with noise and disturbance","author":"barzanooni","year":"2015","journal-title":"Proc IEEE 3rd RSI Int Conf Robot Mechatronics (ICROM)"},{"key":"ref234","first-page":"1","article-title":"Linear quadratic optimal control synthesis for a UAV","author":"santoso","year":"2007","journal-title":"Proc 12th Australian International Aerospace Congress"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2004.1389776"},{"key":"ref236","author":"zulu","year":"2016","journal-title":"A review of control algorithms for autonomous quadrotors"},{"key":"ref136","author":"pham","year":"2015","journal-title":"A survey on unmanned aerial vehicle collision avoidance systems"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17765-6_18"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2714898"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2016.150157"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2006.328706"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2014.7011909"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/CONTROL.2012.6334646"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2009.113"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/CGNCC.2014.7007381"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MetroAeroSpace.2015.7180673"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2688328"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909530"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2601927"},{"key":"ref241","author":"utkin","year":"2013","journal-title":"Sliding Modes in Control and Optimization"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/749803"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-009-0311-8"},{"key":"ref244","first-page":"223","article-title":"A nonlinear adaptive control approach for quadrotor UAVs","author":"diao","year":"2011","journal-title":"Proc 8th Asian Control Conf (ASCC)"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2018.160246"},{"key":"ref248","author":"sadeghi","year":"2016","journal-title":"Cad2rl Real single-image flight without a single real image"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3296874"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1218.2012.00519"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.3182\/20110828-6-IT-1002.02564"},{"key":"ref249","article-title":"Teaching UAVs to race with observational imitation learning","author":"li","year":"2018","journal-title":"ArXiv"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1_3"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2777866"},{"key":"ref107","author":"altman","year":"2004","journal-title":"Relaying in Mobile Ad Hoc Networks The Brownian Motion Mobility Model"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307659"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208967"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000036458.88990.e5"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/860364"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/COMNETSAT.2013.6870855"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1002\/net.21818"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700422"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.2514\/6.2013-5094"},{"key":"ref250","author":"rasmusen","year":"2006","journal-title":"Games and Information An Introduction to Game Theory"},{"key":"ref251","first-page":"1037","article-title":"The blockchain: A new framework for robotic swarm systems","author":"ferrer","year":"2018","journal-title":"Proc Future Technol Conf"},{"key":"ref254","article-title":"Ultra low power deep-learning-powered autonomous nano drones","author":"palossi","year":"2018","journal-title":"Proc IEEE\/RSJ Int Conf Intell Robots Syst (IROS)"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2795643"},{"key":"ref252","author":"perkins","year":"2017","journal-title":"Creating a Drone Superhighway Using the Blockchain"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1140\/epjds17"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445768"},{"key":"ref256","article-title":"A fully-autonomous aerial robot for search and rescue applications in indoor environments using learning-based techniques","author":"sampedro","year":"2018","journal-title":"J Intell Robot Syst"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2698019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2622280"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989378"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2611512"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2524405"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2680449"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2560343"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.85"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2013.6564672"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2902862"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7565126"},{"key":"ref18","author":"crouch","year":"2005","journal-title":"Integration of Mini-UAVs at the Tactical Operations Level Implications of Operations Implementation and Information Sharing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2013.6617981"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1108\/00022660510617077"},{"key":"ref113","article-title":"Occlusion-aware sensing and coverage in unmanned aerial vehicle (UAV) networks","author":"scott","year":"2016"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2593656"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2015.10.001"},{"key":"ref120","article-title":"Aircraft surveillance and collision avoidance using GPS","author":"gazit","year":"1997"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2014.6842382"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75404-6_23"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2007.4422877"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2915069"}],"container-title":["IEEE Communications Surveys & Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8915915\/08742658.pdf?arnumber=8742658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:45Z","timestamp":1657746465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8742658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":260,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2019.2924143","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}