{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T23:17:59Z","timestamp":1773875879727,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T00:00:00Z","timestamp":1613088000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T00:00:00Z","timestamp":1613088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The development of unmanned aerial vehicles has been identified as a potential source of a weapon for causing operational disruptions against critical infrastructures. To mitigate and neutralise the threat posed by the misuse of drones against malicious and terrorist activity, this paper presents a holistic design of a long-range autonomous drone detection platform. The novelty of the proposed system lies in the confluence between the design of hardware and software components to effective and efficient localisation of the intruder objects. The research presented in the paper proposes the design and validation of a situation awareness component which is interfaced with the hardware component for controlling the focal length of the camera. The continuous stream of media data obtained from the region of vulnerability is processed using the object detection that is built on region based fully connected neural network. The novelty of the proposed system relies on the processing of multi-threaded dual-media input streams that are evaluated to mitigate the latency of the system. Upon the successful detection of malicious drones, the system logs the occurrence of intruders that consists of both event description and the associated media evidence for the deployment of the mitigation strategy. The analytics platform that controls the signalling of the low-cost sensing equipment contains the NVIDIA GeForce GTX 1080 for detecting drones. The experimental testbeds developed for the validation of the proposed system has been constructed to include environments and situations that are commonly faced by critical infrastructure operators such as the area of protection, drone flight path, tradeoff between the angle of coverage against the distance of coverage. The validation of the proposed system has resulted in yielding a range of intruder drone detection by 250m with an accuracy of 95.5%.<\/jats:p>","DOI":"10.1007\/s11042-020-10231-x","type":"journal-article","created":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T15:07:11Z","timestamp":1613142431000},"page":"23723-23743","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Autonomous long-range drone detection system for critical infrastructure safety"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2587-6415","authenticated-orcid":false,"given":"Xindi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Kusrini","family":"Kusrini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,12]]},"reference":[{"key":"10231_CR1","doi-asserted-by":"crossref","unstructured":"Bay H, et al. (2008) Speeded-up robust features (SURF). In: Computer vision and image understanding, vol 110.3, pp 346\u2013359","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"10231_CR2","doi-asserted-by":"crossref","unstructured":"Brust MR, et al. (2018) Defending against intrusion of malicious UAVs with networked UAV defense swarms. In: CoRR arXiv:1808.06900","DOI":"10.1109\/LCN.Workshops.2017.71"},{"key":"10231_CR3","doi-asserted-by":"crossref","unstructured":"Cehovin L, Leonardis A, Kristan M (2015) Visual object tracking performance measures revisited. In: CoRR arXiv:1502.05803","DOI":"10.1109\/TIP.2016.2520370"},{"key":"10231_CR4","doi-asserted-by":"crossref","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. In: Machine learning, vol 20.3, pp 273\u2013297","DOI":"10.1007\/BF00994018"},{"key":"10231_CR5","unstructured":"Dai J, et al. (2016) R-FCN: object detection via region-based fully convolutional networks. In: CoRR arXiv:1605.06409"},{"key":"10231_CR6","doi-asserted-by":"crossref","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR\u201905), vol 1. IEEE, pp 886\u2013893","DOI":"10.1109\/CVPR.2005.177"},{"key":"10231_CR7","doi-asserted-by":"publisher","unstructured":"Everingham M, et al. (2010) The pascal visual object classes (VOC) challenge. In: International journal of computer vision. ISSN: 1573-1405. https:\/\/doi.org\/10.1007\/s11263-009-0275-4, vol 88.2, pp 303\u2013338","DOI":"10.1007\/s11263-009-0275-4"},{"key":"10231_CR8","doi-asserted-by":"crossref","unstructured":"Girshick R, et al. (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 580\u2013587","DOI":"10.1109\/CVPR.2014.81"},{"key":"10231_CR9","doi-asserted-by":"crossref","unstructured":"Girshick R (2015) Fast r-cnn. In: Proceedings of the IEEE international conference on computer vision, pp 1440\u20131448","DOI":"10.1109\/ICCV.2015.169"},{"key":"10231_CR10","doi-asserted-by":"crossref","unstructured":"G\u00f6k\u00e7e F, et al. (2015) Vision-based detection and distance estimation of micro unmanned aerial vehicles. In: Sensors, vol 15.9, pp 23805\u201323846","DOI":"10.3390\/s150923805"},{"key":"10231_CR11","unstructured":"Grinberg M (2014) Flask web development: developing web applications with python. 1st. O\u2019Reilly Media, Inc. ISBN: 1449372627, 9781449372620"},{"key":"10231_CR12","doi-asserted-by":"crossref","unstructured":"He K, et al. (2015) Deep residual learning for image recognition. In: CoRR arXiv:1512.03385","DOI":"10.1109\/CVPR.2016.90"},{"key":"10231_CR13","doi-asserted-by":"crossref","unstructured":"He K, et al. (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. In: IEEE transactions on pattern analysis and machine intelligence, vol 37.9, pp 1904\u20131916","DOI":"10.1109\/TPAMI.2015.2389824"},{"key":"10231_CR14","unstructured":"Henriques JF, et al. (2014) High-speed tracking with kernelized correlation filters. In: CoRR arXiv:1404.7584"},{"key":"10231_CR15","unstructured":"Howard AG, et al. (2017) MobileNets: efficient convolutional neural networks for mobile vision applications. In: CoRR arXiv:1704.04861"},{"key":"10231_CR16","doi-asserted-by":"crossref","unstructured":"Li Y, et al. (2019) Scale-aware trident networks for object detection. In: CoRR arXiv:1901.01892","DOI":"10.1109\/ICCV.2019.00615"},{"key":"10231_CR17","unstructured":"Liu W, et al. (2015) SSD: single shot multibox detector. In: CoRR arXiv:1512.02325"},{"key":"10231_CR18","doi-asserted-by":"crossref","unstructured":"Liu W, et al. (2016) Ssd: single shot multibox detector. In: European conference on computer vision. Springer, pp 21\u201337","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"10231_CR19","doi-asserted-by":"crossref","unstructured":"Lowe DG (1999) Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision, vol 2. IEEE, pp 1150\u20131157","DOI":"10.1109\/ICCV.1999.790410"},{"key":"10231_CR20","doi-asserted-by":"crossref","unstructured":"Lu Y, Javidi T, Lazebnik S (2015) Adaptive object detection using adjacency and zoom prediction. In: CoRR arXiv:1512.07711","DOI":"10.1109\/CVPR.2016.258"},{"key":"10231_CR21","unstructured":"Narkhede N, Shapira G, Palino T (2017) Kafka: the definitive guide real-time data and stream processing at scale. 1st. O\u2019Reilly Media, Inc. ISBN: 1491936169, 9781491936160"},{"key":"10231_CR22","doi-asserted-by":"crossref","unstructured":"Redmon J, et al. (2016) You only look once: unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 779\u2013788","DOI":"10.1109\/CVPR.2016.91"},{"key":"10231_CR23","unstructured":"Ren S, et al. (2015) Faster R-CNN: towards real-time object detection with region proposal networks. In: CoRR arXiv:1506.01497"},{"key":"10231_CR24","doi-asserted-by":"publisher","unstructured":"Rozantsev A, Lepetit V, Fua P (2017) Detecting flying objects using a single moving camera. In: IEEE transactions on pattern analysis and machine intelligence. ISSN: 1939-3539. https:\/\/doi.org\/10.1109\/TPAMI.2016.2564408, vol 39.5, pp 879\u2013892","DOI":"10.1109\/TPAMI.2016.2564408"},{"key":"10231_CR25","unstructured":"Singh B, Najibi M, Davis LS (2018) SNIPER: efficient multi-scale training. In: CoRR arXiv:1805.09300"},{"key":"10231_CR26","doi-asserted-by":"crossref","unstructured":"Sivic J, Zisserman A (2003) Video google: a text retrieval approach to object matching in videos. In: Null. IEEE, p 1470","DOI":"10.1109\/ICCV.2003.1238663"},{"key":"10231_CR27","doi-asserted-by":"crossref","unstructured":"Szegedy C, et al. (2015) Rethinking the inception architecture for computer vision. In: CoRR arXiv:1512.00567","DOI":"10.1109\/CVPR.2016.308"},{"key":"10231_CR28","doi-asserted-by":"publisher","unstructured":"Taha B, Shoufan A (2019) Machine learning-based drone detection and classification: state-of-the-art in research. In: IEEE access. ISSN: 2169-3536. https:\/\/doi.org\/10.1109\/ACCESS.2019.2942944, vol 7, pp 138669\u2013138682","DOI":"10.1109\/ACCESS.2019.2942944"},{"key":"10231_CR29","doi-asserted-by":"publisher","unstructured":"Wu Y, Lim J, Yang M (2013) Online object tracking: a benchmark. In: 2013 IEEE conference on computer vision and pattern recognition. https:\/\/doi.org\/10.1109\/CVPR.2013.312, pp 2411\u20132418","DOI":"10.1109\/CVPR.2013.312"},{"key":"10231_CR30","unstructured":"Yoshihashi R, et al. (2017) Learning multi-frame visual representation for joint detection and tracking of small objects. In: CoRR arXiv:1709.04666"},{"key":"10231_CR31","doi-asserted-by":"crossref","unstructured":"Zhang X, Chandramouli K (2019) Critical infrastructure security against drone attacks using visual analytics. In: Tzovaras D, et al. (eds) Computer vision systems. ISBN: 978-3-030-34995-0. Springer International Publishing, Cham, pp 713\u2013722","DOI":"10.1007\/978-3-030-34995-0_65"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10231-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10231-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10231-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T09:30:48Z","timestamp":1625304648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10231-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,12]]},"references-count":31,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10231"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10231-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,12]]},"assertion":[{"value":"6 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}