Results 91 to 100 of about 264,857 (253)

Research on risks faced by ADS-B system and solutions

open access: yesTongxin xuebao
Due to its open technical system, ADS-B system was vulnerable to active jamming and deception, resulting in reduced performance. Aiming at this problem, the technical characteristics of ADS-B were analyzed, the possible jamming and detection risks faced ...
SUN Baoming, CHEN Juan, GU Zhiming
doaj  

Radar Jamming Recognition: Models, Methods, and Prospects

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
In modern warfare with complex and changeable electromagnetic environments, radar jamming is getting more complex and realistic, which poses a serious threat to radar; jamming recognition has become a hot topic in the field of electronic countermeasures.
Zan Wang   +3 more
doaj   +1 more source

How to prevent malicious use of intelligent unmanned swarms? [PDF]

open access: yesInnovation (Camb), 2023
Wang Q   +6 more
europepmc   +1 more source

Compound Jamming Recognition Based on a Dual-Channel Neural Network and Feature Fusion

open access: yesRemote Sensing
Jamming recognition is a significant prior step to achieving effective jamming suppression, and the precise results of the jamming recognition will be beneficial to anti-jamming decisions. However, as the electromagnetic environment becomes more complex,
Hao Chen   +6 more
doaj   +1 more source

Detecting Strategic Deception Using Linear Probes [PDF]

open access: yesarXiv
AI models might use deceptive strategies as part of scheming or misaligned behaviour. Monitoring outputs alone is insufficient, since the AI might produce seemingly benign outputs while their internal reasoning is misaligned. We thus evaluate if linear probes can robustly detect deception by monitoring model activations.
arxiv  

Home - About - Disclaimer - Privacy