{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:48:27Z","timestamp":1767084507650,"version":"3.40.4"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20328-2","type":"journal-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T09:03:04Z","timestamp":1729069384000},"page":"9881-9902","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Lightweight deep learning model-based UAVs visual detection"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3202-0033","authenticated-orcid":false,"given":"Sawsen Abdulhadi","family":"Mahmood","sequence":"first","affiliation":[]},{"given":"Farah Adil","family":"Abdulmunem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7000-8337","authenticated-orcid":false,"given":"Sadeq H.","family":"Lafta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,16]]},"reference":[{"issue":"3","key":"20328_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.ijtst.2016.11.002","volume":"5","author":"JYJ Chow","year":"2016","unstructured":"Chow JYJ (2016) Dynamic UAV-based traffic monitoring under uncertainty as a stochastic arc-inventory routing policy. Int J Transp Sci Technol 5(3):167\u2013185","journal-title":"Int J Transp Sci Technol"},{"issue":"1","key":"20328_CR2","doi-asserted-by":"publisher","first-page":"10149","DOI":"10.12785\/ijcds\/140188","volume":"14","author":"AS Mahdi","year":"2023","unstructured":"Mahdi AS, Mahmood SA (2023) Wildfire detection system using YOLOv5 deep learning model. Int J Comput Digit Syst 14(1):10149\u201310158. https:\/\/doi.org\/10.12785\/ijcds\/140188","journal-title":"Int J Comput Digit Syst"},{"key":"20328_CR3","doi-asserted-by":"publisher","unstructured":"Farhan RI, Maolood AT, Hassan NF Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning, Indonesian J Electr Eng Comput Sci, 20, 3, pp 1413\u20131418. https:\/\/doi.org\/10.11591\/ijeecs.v20.i3.pp1413-1418","DOI":"10.11591\/ijeecs.v20.i3.pp1413-1418"},{"issue":"4","key":"20328_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.2018.1700430","volume":"56","author":"X Shi","year":"2018","unstructured":"Shi X, Yang C, Xie W, Liang C, Shi Z, Chen J (2018) Anti-drone system with multiple surveillance technologies: Architecture, implementation, and challenges. IEEE Commun Mag 56(4):68\u201374","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"20328_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MCOM.2017.1700452","volume":"56","author":"G Ding","year":"2018","unstructured":"Ding G, Wu Q, Zhang L, Lin Y, Tsiftsis TA, Dong Yao Y (2018) An amateur drone surveillance system based on the cognitive internet of things. IEEE Commun Mag 56(1):29\u201335","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"20328_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MCOM.2017.1700442","volume":"56","author":"M Mahdi Azari","year":"2018","unstructured":"Mahdi Azari M, Sallouha H, Chiumento A, Rajendran S, Vinogradov E, Pollin S (2018) Key technologies and system trade-offs for detection and localization of amateur drones. IEEE Commun Mag 56(1):51\u201357","journal-title":"IEEE Commun Mag"},{"key":"20328_CR7","doi-asserted-by":"publisher","first-page":"7123","DOI":"10.1109\/ACCESS.2017.2697979","volume":"5","author":"R Sturdivant","year":"2017","unstructured":"Sturdivant R, Chong E (2017) Systems engineering baseline concept of a multispectral drone detection solution for airports. IEEE Access 5:7123\u20137138","journal-title":"IEEE Access"},{"key":"20328_CR8","doi-asserted-by":"crossref","unstructured":"Thomas M, Alexander G, Ulrich P, Enric M, Askold M, Jan M, Martin V, Mirko L, Volker Z (2018) Low-cost jamming system against small drones using a 3D mimo radar based tracking. In: Proc. of the 14th European radar conf., pp 299\u2013302","DOI":"10.23919\/EURAD.2017.8249206"},{"issue":"5","key":"20328_CR9","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TPAMI.2016.2564408","volume":"39","author":"A Rozantsev","year":"2017","unstructured":"Rozantsev A, Lepetit V, Fua P (2017) Detecting flying objects using a single moving camera. IEEE Trans Pattern Anal Mach Intell 39(5):879\u2013892","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"20328_CR10","doi-asserted-by":"publisher","unstructured":"Mahdi AS, Mahmood SA (2022) Analysis of deep learning methods for early wildfire detection systems: review. In: IICETA 2022\u20135th International conference on engineering technology and its applications, IEEE, pp 271\u2013276. https:\/\/doi.org\/10.1109\/IICETA54559.2022.9888515","DOI":"10.1109\/IICETA54559.2022.9888515"},{"key":"20328_CR11","doi-asserted-by":"crossref","unstructured":"Mahmood SA, Abid AM, Naser WAK (2021) Contextual anomaly detection based video surveillance system. In: Proc. of 11th IEEE international conf. on control system, computing and engineering, pp 120\u2013125","DOI":"10.1109\/ICCSCE52189.2021.9530859"},{"issue":"4","key":"20328_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/3191789.3191800","volume":"21","author":"P Nguyen","year":"2018","unstructured":"Nguyen P, Truong H, Ravindranathan M, Nguyen A, Han R, Vu T (2018) Cost-effective and passive RF-based drone presence detection and characterization. GetMobile: Mob Comput Commun 21(4):30\u201334","journal-title":"GetMobile: Mob Comput Commun"},{"key":"20328_CR13","doi-asserted-by":"crossref","unstructured":"G\u00fcven\u00e7 \u0130, Ozdemir O, Yapici Y, Mehrpouyan H, Matolak D (2017) Detection, localization, and tracking of unauthorized UAS and Jammers. In: Proc. of IEEE\/AIAA 36th digital avionics systems conf., pp 1\u201310","DOI":"10.1109\/DASC.2017.8102043"},{"key":"20328_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9858-4_36","volume-title":"Soft Computing: theories and applications","author":"J Parashar","year":"2023","unstructured":"Parashar J, Kushwah VS, Rai M (2023) Determination human behavior prediction supported by Cognitive Computing-based neural network. In: Kumar R, Verma AK, Sharma TK, Verma OP, Sharma S (eds) Soft Computing: theories and applications. Lecture Notes in Networks and Systems, vol 627. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-19-9858-4_36."},{"key":"20328_CR15","doi-asserted-by":"publisher","unstructured":"Karim AA, Saleh SM (2022) Text to speech using Mel-Spectrogram with deep learning algorithms, Periodicals of Engineering and Natural Sciences (PEN), vol 10, no. 3, pp 380\u2013386, Jun. https:\/\/doi.org\/10.21533\/PEN.V10I3.3113","DOI":"10.21533\/PEN.V10I3.3113"},{"key":"20328_CR16","doi-asserted-by":"publisher","unstructured":"Althabhawee AFY, Alwawi BKOC (2022) Fingerprint recognition based on collected images using deep learning technology, IAES International Journal of Artificial Intelligence (IJ-AI), vol 11, no. 1, pp 81\u201388, Mar. https:\/\/doi.org\/10.11591\/IJAI.V11.I1.PP81-88","DOI":"10.11591\/IJAI.V11.I1.PP81-88"},{"key":"20328_CR17","doi-asserted-by":"crossref","unstructured":"Agarwal P, Alam M (Jan. 2020) A lightweight deep learning model for human activity recognition on edge devices. Procedia Comput Sci 167:2364\u20132373.","DOI":"10.1016\/j.procs.2020.03.289"},{"key":"20328_CR18","doi-asserted-by":"crossref","unstructured":"Alipour-Fanid A, Dabaghchian M, Wang N, Wang P, Zhao L, Zeng K (2020) Machine learning-based delay-aware UAV detection and operation mode identification over encrypted Wi-Fi traffic. IEEE Trans Inf Forensics Secur 15:2346\u20132360","DOI":"10.1109\/TIFS.2019.2959899"},{"key":"20328_CR19","doi-asserted-by":"crossref","unstructured":"Saqib M, Daud Khan S, Sharma N, Blumenstein M (2017) A study on detecting drones using deep convolutional neural networks. In: Proc. of 14th IEEE international conf. on advanced video and signal based surveillance, pp 1\u20135","DOI":"10.1109\/AVSS.2017.8078541"},{"key":"20328_CR20","doi-asserted-by":"crossref","unstructured":"Ren S, He K, Girshick R, Sun J (2017) Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans Pattern Anal Mach Intell 39(6):1137\u20131149","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"20328_CR21","doi-asserted-by":"publisher","unstructured":"Jiuxiang Gu Z, Wang J, Kuen L, Ma A, Shahroudy B, Shuai T, Liu X, Wang G, Wang J, Cai T, Chen (May 2018) Recent advances in convolutional neural networks. Pattern Recogn 77:354\u2013377. https:\/\/doi.org\/10.1016\/J.PATCOG.2017.10.013","DOI":"10.1016\/J.PATCOG.2017.10.013"},{"key":"20328_CR22","unstructured":"Simonyan K, Zisserman A (2014) Very Deep Convolutional Networks for Large-Scale Image Recognition, arXiv, arXiv:1409.1556"},{"key":"20328_CR23","doi-asserted-by":"crossref","unstructured":"Opromolla R, Fasano G, Accardo D (2018) A vision-based approach to UAV detection and tracking in cooperative applications. Sensors. 18(10):3391","DOI":"10.3390\/s18103391"},{"key":"20328_CR24","doi-asserted-by":"crossref","unstructured":"G\u00f6k\u00e7e F, \u00dc\u00e7oluk G, \u015eahin E, Kalkan S (2015) Vision-based detection and distance estimation of micro unmanned aerial vehicles. Sensors 15(9):23805\u201323846","DOI":"10.3390\/s150923805"},{"key":"20328_CR25","doi-asserted-by":"crossref","unstructured":"Bazi Y, Melgani F (2018) Convolutional SVM networks for object detection in UAV imagery. IEEE Trans Geosci Remote Sens 56(6):3107\u20133118","DOI":"10.1109\/TGRS.2018.2790926"},{"key":"20328_CR26","doi-asserted-by":"crossref","unstructured":"Jurn YN, Mahmood SA, Aldhaibani JA (2021) Anti-drone system based different technologies: architecture, threats and challenges. In: Proc. of 11th IEEE international conf. on control system, computing and engineering, pp 114\u2013119","DOI":"10.1109\/ICCSCE52189.2021.9530992"},{"key":"20328_CR27","doi-asserted-by":"publisher","unstructured":"Craye C, Ardjoune S, IEEE International Conference on Advanced Video (2019) Spatio-Temporal Semantic Segmentation for Drone Detection, 16th and Signal Based Surveillance (AVSS), Taipei, Taiwan, 2019, pp 1\u20135.\u00a0https:\/\/doi.org\/10.1109\/AVSS.2019.8909854","DOI":"10.1109\/AVSS.2019.8909854"},{"key":"20328_CR28","doi-asserted-by":"publisher","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-Net: Convolutional Networks for Biomedical Image Segmentation, International Conference on Medical Image Computing and Computer-Assisted Intervention, vol 9351, pp 234\u2013241.\u00a0https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"20328_CR29","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition, Dec. vol 2016-December, pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"20328_CR30","doi-asserted-by":"crossref","unstructured":"Magoulianitis V, Ataloglou D, Dimou A, Zarpalas D, Daras P (2019) Does deep super-resolution enhance UAV detection? In: Proc. Of 16th IEEE international conf. on advanced video and signal based surveillance, pp 1\u20136","DOI":"10.1109\/AVSS.2019.8909865"},{"key":"20328_CR31","doi-asserted-by":"crossref","unstructured":"Seidaliyeva U, Akhmetov D, Ilipbayeva L (2020) Matson Real-time and accurate drone detection in a video with a static background. Sensors 20(14):3856","DOI":"10.3390\/s20143856"},{"key":"20328_CR32","doi-asserted-by":"publisher","unstructured":"Sezer Orak A, Mertcan \u00d6zkan H, Selimo\u011flu B (2019) Drone dataset: amateur Unmanned Air Vehicle Detection. Mendeley Data V4. https:\/\/doi.org\/10.17632\/zcsj2g2m4c.4","DOI":"10.17632\/zcsj2g2m4c.4"},{"key":"20328_CR33","unstructured":"Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Proc. of 13th international conf. on artificial intelligence and statistics, PMLR, vol 9, pp 249\u2013256"},{"key":"20328_CR34","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on image net classification. In: Proc. of IEEE international conf. on computer vision, pp.1026\u20131034, 2015","DOI":"10.1109\/ICCV.2015.123"},{"key":"20328_CR35","unstructured":"Ian Goodfellow YBAC (2016) Deep learning (adaptive computation and machine learning series). The MIT Press"},{"key":"20328_CR36","unstructured":"Loshchilov I, Hutter F (2017) Decoupled Weight Decay Regularization, arXiv preprint arXiv:1711.05101"},{"key":"20328_CR37","doi-asserted-by":"publisher","unstructured":"Bottou L (2021) Cross-Entropy Loss for Recommending Efficient Fold-Over Technique, Journal of Systems Science and Complexity, pp 402\u2013439, vol 34, No. 1, https:\/\/doi.org\/10.1007\/s11424-020-9267-9","DOI":"10.1007\/s11424-020-9267-9"},{"key":"20328_CR38","unstructured":"Playground AI (2023) Drone vs Bird dataset. Open Source Dataset, Roboflow Universe journal"},{"key":"20328_CR39","doi-asserted-by":"crossref","unstructured":"Zeng X, Martinez TR (2000) Distribution-balanced stratified cross-validation for accuracy estimation. J Exp Theor Artif Intell 12(1):1\u201312","DOI":"10.1080\/095281300146272"},{"key":"20328_CR40","doi-asserted-by":"publisher","unstructured":"Xiao J, Wang J, Cao S, Li B Application of a Novel and Improved VGG-19 Network in the Detection of Workers Wearing Masks, in Journal of Physics: Conference Series, May 2020, vol 1518, no. 1. https:\/\/doi.org\/10.1088\/1742-6596\/1518\/1\/012041","DOI":"10.1088\/1742-6596\/1518\/1\/012041"},{"key":"20328_CR41","doi-asserted-by":"publisher","first-page":"48165","DOI":"10.1007\/s11042-023-17192-x","volume":"83","author":"Z Lyu","year":"2024","unstructured":"Lyu Z, Yu T, Pan F et al (2024) A survey of model compression strategies for object detection. Multimed Tools Appl 83:48165\u201348236. https:\/\/doi.org\/10.1007\/s11042-023-17192-x","journal-title":"Multimed Tools Appl"},{"key":"20328_CR42","doi-asserted-by":"publisher","first-page":"3245","DOI":"10.1007\/s10994-021-06053-z","volume":"110","author":"Y Nahshan","year":"2021","unstructured":"Nahshan Y, Chmiel B, Baskin C et al (2021) Loss-aware post-training quantization. Mach Learn 110:3245\u20133262. https:\/\/doi.org\/10.1007\/s10994-021-06053-z","journal-title":"Mach Learn"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20328-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20328-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20328-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T05:01:44Z","timestamp":1746075704000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20328-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,16]]},"references-count":42,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["20328"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20328-2","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,10,16]]},"assertion":[{"value":"13 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}