{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:40:10Z","timestamp":1775043610364,"version":"3.50.1"},"reference-count":121,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:00:00Z","timestamp":1774396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:00:00Z","timestamp":1774396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The rapid growth of the low-altitude economy, including unmanned aerial vehicles (UAVs) and urban air mobility (UAM), is reshaping industries from transportation to emergency response. Powered by advances in fifth-generation (5G) and 5G-advanced (5.5G) connectivity, artificial intelligence (AI), and new energy systems, these platforms are becoming increasingly autonomous and capable. However, their growing software complexity introduces critical cybersecurity risks. Vulnerabilities in communication protocols, onboard firmware, and AI systems can be exploited to hijack UAVs, disrupt operations, or leak sensitive data. While research has addressed isolated aspects, a unified security perspective is still lacking. This work presents a systematic review of software-level security challenges and defenses in low-altitude UAV\/UAM systems. We first categorize major attack surfaces across communication, firmware, and AI layers. Furthermore, we survey defense mechanisms suited to real-time, resource-constrained aerial platforms. Finally, we propose future directions, including quantum-resistant communication protocols, hardware-software cosecurity, and edge-AI-driven architectures. Our work aims to inform researchers, practitioners, and regulators in developing integrated, resilient security strategies for the evolving low-altitude ecosystem.<\/jats:p>","DOI":"10.1007\/s11432-025-4811-2","type":"journal-article","created":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T08:18:54Z","timestamp":1775031534000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing the low-altitude economy: a survey"],"prefix":"10.1007","volume":"69","author":[{"given":"Minrui","family":"Yan","sequence":"first","affiliation":[]},{"given":"Ruiqi","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Qing-Long","family":"Han","sequence":"additional","affiliation":[]},{"given":"Zehang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Wanlun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaogang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,25]]},"reference":[{"key":"4811_CR1","doi-asserted-by":"publisher","first-page":"750","DOI":"10.3390\/electronics12030750","volume":"12","author":"S Siripurapu","year":"2023","unstructured":"Siripurapu S, Darimireddy N K, Chehri A, et al. Technological advancements and elucidation gadgets for healthcare applications: an exhaustive methodological review-Part-I (AI, Big Data, Block Chain, Open-Source Technologies, and Cloud Computing). Electronics, 2023, 12: 750","journal-title":"Electronics"},{"key":"4811_CR2","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.cogr.2022.12.004","volume":"3","author":"A A Laghari","year":"2023","unstructured":"Laghari A A, Jumani A K, Laghari R A, et al. Unmanned aerial vehicles: a review. Cogn Robotics, 2023, 3: 8\u201322","journal-title":"Cogn Robotics"},{"key":"4811_CR3","doi-asserted-by":"publisher","first-page":"2624","DOI":"10.1109\/COMST.2016.2560343","volume":"18","author":"S Hayat","year":"2016","unstructured":"Hayat S, Yanmaz E, Muzaffar R. Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun Surv Tutorials, 2016, 18: 2624\u20132661","journal-title":"IEEE Commun Surv Tutorials"},{"key":"4811_CR4","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1080\/13675567.2021.1981273","volume":"26","author":"A Rejeb","year":"2023","unstructured":"Rejeb A, Rejeb K, Simske S J, et al. Drones for supply chain management and logistics: a review and research agenda. Int J Logistics Res Appl, 2023, 26: 708\u2013731","journal-title":"Int J Logistics Res Appl"},{"key":"4811_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.5220\/0013228700004558","volume-title":"Proceedings of the 1st International Conference on Modern Logistics and Supply Chain Management (MLSCM 2024)","author":"Y Jin","year":"2024","unstructured":"Jin Y. The evolution and challenges of low-altitude economy: insights from experience in China. In: Proceedings of the 1st International Conference on Modern Logistics and Supply Chain Management (MLSCM 2024), 2024. 32\u201336"},{"key":"4811_CR6","first-page":"1","volume-title":"Proceedings of 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS)","author":"S K Routray","year":"2024","unstructured":"Routray S K, Singh M, Samal L, et al. 5G advanced: a step towards 6G. In: Proceedings of 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS), 2024. 1\u20135"},{"key":"4811_CR7","first-page":"1","volume-title":"Proceedings of Global Oceans 2020","author":"I Porres","year":"2020","unstructured":"Porres I, Azimi S, Lafond S, et al. On the verification and validation of AI navigation algorithms. In: Proceedings of Global Oceans 2020, 2020. 1\u20138"},{"key":"4811_CR8","doi-asserted-by":"publisher","first-page":"108974","DOI":"10.1016\/j.ast.2024.108974","volume":"147","author":"Y Liu","year":"2024","unstructured":"Liu Y, Chen C, Wang Y, et al. A fast formation obstacle avoidance algorithm for clustered UAVs based on artificial potential field. Aerospace Sci Tech, 2024, 147: 108974","journal-title":"Aerospace Sci Tech"},{"key":"4811_CR9","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TAES.1986.310772","volume":"AES-22","author":"B Bhanu","year":"1986","unstructured":"Bhanu B. Automatic target recognition: state of the art survey. IEEE Trans Aerosp Electron Syst, 1986, AES-22: 364\u2013379","journal-title":"IEEE Trans Aerosp Electron Syst"},{"key":"4811_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3716628","volume":"57","author":"Z Deng","year":"2025","unstructured":"Deng Z, Guo Y, Han C, et al. AI agents under threat: a survey of key security challenges and future pathways. ACM Comput Surv, 2025, 57: 1\u201336","journal-title":"ACM Comput Surv"},{"key":"4811_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JAS.2024.124983","volume":"12","author":"W Zhou","year":"2025","unstructured":"Zhou W, Zhu X, Han Q L, et al. The security of using large language models: a survey with emphasis on ChatGPT. IEEE CAA J Autom Sin, 2025, 12: 1\u201326","journal-title":"IEEE CAA J Autom Sin"},{"key":"4811_CR12","first-page":"1246","volume-title":"Proceedings of AIAA SCITECH 2025 Forum","author":"A Joksimovic","year":"2025","unstructured":"Joksimovic A, Lourenco-Feio A M, Gavrilovic N. Integrated preliminary sizing environment for hydrogen-powered drones. In: Proceedings of AIAA SCITECH 2025 Forum, 2025. 1246"},{"key":"4811_CR13","first-page":"621","volume-title":"Proceedings of 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","author":"A Allouch","year":"2019","unstructured":"Allouch A, Cheikhrouhou O, Koub\u00e2a A, et al. Mavsec: securing the MAVLink protocol for ArduPilot\/px4 unmanned aerial systems. In: Proceedings of 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019. 621\u2013628"},{"key":"4811_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3512345","volume":"54","author":"X Zhu","year":"2022","unstructured":"Zhu X, Wen S, Camtepe S, et al. Fuzzing: a survey for roadmap. ACM Comput Surv, 2022, 54: 1\u201336","journal-title":"ACM Comput Surv"},{"key":"4811_CR15","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/JAS.2024.124971","volume":"12","author":"X Zhu","year":"2025","unstructured":"Zhu X, Zhou W, Han Q L, et al. When software security meets large language models: a survey. IEEE CAA J Autom Sin, 2025, 12: 317\u2013334","journal-title":"IEEE CAA J Autom Sin"},{"key":"4811_CR16","doi-asserted-by":"publisher","first-page":"102894","DOI":"10.1016\/j.adhoc.2022.102894","volume":"133","author":"K Y Tsao","year":"2022","unstructured":"Tsao K Y, Girdler T, Vassilakis V G. A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Netws, 2022, 133: 102894","journal-title":"Ad Hoc Netws"},{"key":"4811_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JAS.2022.105860","volume":"10","author":"X Feng","year":"2022","unstructured":"Feng X, Zhu X, Han Q L, et al. Detecting vulnerability on IoT device firmware: a survey. IEEE CAA J Autom Sin, 2022, 10: 25\u201341","journal-title":"IEEE CAA J Autom Sin"},{"key":"4811_CR18","doi-asserted-by":"publisher","first-page":"150307","DOI":"10.1007\/s11432-024-4376-9","volume":"68","author":"X Y Duan","year":"2025","unstructured":"Duan X Y, Zhang X Q, Xia S Q, et al. Machine learning empowered UAV-based beamforming design in ISAC systems. Sci China Inf Sci, 2025, 68: 150307","journal-title":"Sci China Inf Sci"},{"key":"4811_CR19","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1109\/JAS.2025.125498","volume":"12","author":"Z Deng","year":"2025","unstructured":"Deng Z, Ma W, Han Q L, et al. Exploring DeepSeek: a survey on advances, applications, challenges and future directions. IEEE CAA J Autom Sin, 2025, 12: 872\u2013893","journal-title":"IEEE CAA J Autom Sin"},{"key":"4811_CR20","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.3390\/rs15123007","volume":"15","author":"Z Lu","year":"2023","unstructured":"Lu Z, Sun H, Xu Y. Adversarial robustness enhancement of UAV-oriented automatic image recognition based on deep ensemble models. Remote Sens, 2023, 15: 3007","journal-title":"Remote Sens"},{"key":"4811_CR21","volume-title":"Computer virus hits U.S. drone fleet","author":"N Shachtman","year":"2011","unstructured":"Shachtman N. Computer virus hits U.S. drone fleet. CNN, 2011. https:\/\/edition.cnn.com\/2011\/10\/10\/tech\/innovation\/virus-hits-drone-fleet-wired"},{"key":"4811_CR22","first-page":"168","volume-title":"Proceedings of Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014","author":"J S Pleban","year":"2014","unstructured":"Pleban J S, Band R, Creutzburg R. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Proceedings of Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, 2014. 168\u2013179"},{"key":"4811_CR23","doi-asserted-by":"publisher","first-page":"22399","DOI":"10.1109\/JIOT.2021.3111024","volume":"9","author":"J Tian","year":"2021","unstructured":"Tian J, Wang B, Guo R, et al. Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles. IEEE Internet Things J, 2021, 9: 22399\u201322409","journal-title":"IEEE Internet Things J"},{"key":"4811_CR24","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1080\/09537287.2024.2437041","volume":"36","author":"D A J Pacheco","year":"2025","unstructured":"Pacheco D A J, Sarker S, Bilal M, et al. Opportunities and challenges of drones and the Internet of Drones in healthcare supply chains under disruption. Production PlAnning Control, 2025, 36: 2009\u20132031","journal-title":"Production PlAnning Control"},{"key":"4811_CR25","doi-asserted-by":"publisher","first-page":"112858","DOI":"10.1109\/ACCESS.2022.3215975","volume":"10","author":"G K Pandey","year":"2022","unstructured":"Pandey G K, Gurjar D S, Nguyen H H, et al. Security threats and mitigation techniques in UAV communications: a comprehensive survey. IEEE Access, 2022, 10: 112858","journal-title":"IEEE Access"},{"key":"4811_CR26","doi-asserted-by":"publisher","first-page":"100883","DOI":"10.1016\/j.iot.2023.100883","volume":"23","author":"J Sharma","year":"2023","unstructured":"Sharma J, Mehra P S. Secure communication in IOT-based UAV networks: a systematic survey. Internet Things, 2023, 23: 100883","journal-title":"Internet Things"},{"key":"4811_CR27","doi-asserted-by":"publisher","first-page":"3417","DOI":"10.1109\/COMST.2019.2906228","volume":"21","author":"A Fotouhi","year":"2019","unstructured":"Fotouhi A, Qiang H, Ding M, et al. Survey on UAV cellular communications: practical aspects, standardization advancements, regulation, and security challenges. IEEE Commun Surv Tutorials, 2019, 21: 3417\u20133442","journal-title":"IEEE Commun Surv Tutorials"},{"key":"4811_CR28","doi-asserted-by":"publisher","first-page":"110695","DOI":"10.1016\/j.comnet.2024.110695","volume":"252","author":"N Kumar","year":"2024","unstructured":"Kumar N, Chaudhary A. Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security. Comput Netws, 2024, 252: 110695","journal-title":"Comput Netws"},{"key":"4811_CR29","doi-asserted-by":"publisher","first-page":"101281","DOI":"10.1016\/j.iot.2024.101281","volume":"27","author":"F Tlili","year":"2024","unstructured":"Tlili F, Ayed S, Fourati L C. Advancing UAV security with artificial intelligence: a comprehensive survey of techniques and future directions. Internet Things, 2024, 27: 101281","journal-title":"Internet Things"},{"key":"4811_CR30","first-page":"158","volume-title":"Proceedings of SPIE","author":"F Samland","year":"2012","unstructured":"Samland F, Fruth J, Hildebrandt M, et al. Ar.Drone: security threat analysis and exemplary attack to track persons. In: Proceedings of SPIE, 2012. 8301: 158\u2013172"},{"key":"4811_CR31","first-page":"222","volume-title":"Proceedings of 2016 46th annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","author":"K Highnam","year":"2016","unstructured":"Highnam K, Angstadt K, Leach K, et al. An uncrewed aerial vehicle attack scenario and trustworthy repair architecture. In: Proceedings of 2016 46th annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), 2016. 222\u2013225"},{"key":"4811_CR32","volume-title":"Proceedings of NDSS","author":"N Schiller","year":"2023","unstructured":"Schiller N, Chlosta M, Schloegel M, et al. Drone security and the mysterious case of DJI\u2019s droneid. In: Proceedings of NDSS, 2023"},{"key":"4811_CR33","doi-asserted-by":"publisher","first-page":"982","DOI":"10.3390\/s25030982","volume":"25","author":"J Choi","year":"2025","unstructured":"Choi J, Son S, Kwon D, et al. A PUF-based secure authentication and key agreement scheme for the internet of drones. Sensors, 2025, 25: 982","journal-title":"Sensors"},{"key":"4811_CR34","doi-asserted-by":"publisher","first-page":"101064","DOI":"10.1016\/j.trip.2024.101064","volume":"24","author":"P Aposporis","year":"2024","unstructured":"Aposporis P. A review of global and regional frameworks for the integration of an unmanned aircraft system in air traffic management. Transp Res Interdisciplinary Perspect, 2024, 24: 101064","journal-title":"Transp Res Interdisciplinary Perspect"},{"key":"4811_CR35","doi-asserted-by":"publisher","first-page":"105426","DOI":"10.1016\/j.autcon.2024.105426","volume":"163","author":"A Zhu","year":"2024","unstructured":"Zhu A, Pauwels P, Torta E, et al. Data linking and interaction between BIM and robotic operating system (ROS) for flexible construction planning. Automation Construction, 2024, 163: 105426","journal-title":"Automation Construction"},{"key":"4811_CR36","doi-asserted-by":"publisher","first-page":"23220","DOI":"10.1109\/ACCESS.2024.3364676","volume":"12","author":"J Doornbos","year":"2024","unstructured":"Doornbos J, Bennin K E, Babur \u00d6, et al. Drone technologies: a tertiary systematic literature review on a decade of improvements. IEEE Access, 2024, 12: 23220\u201323239","journal-title":"IEEE Access"},{"key":"4811_CR37","series-title":"Technical Report","volume-title":"IEEE STD 1588\u20132008: IEEE standard for a precision clock synchronization protocol for networked measurement and control systems","author":"IEEE","year":"2008","unstructured":"IEEE. IEEE STD 1588\u20132008: IEEE standard for a precision clock synchronization protocol for networked measurement and control systems. Technical Report, Institute of Electrical and Electronics Engineers, 2008"},{"key":"4811_CR38","volume-title":"Jetson Benchmarks","author":"NVIDIA","year":"2025","unstructured":"NVIDIA. Jetson Benchmarks. NVIDIA Developer. https:\/\/developer.nvidia.com\/embedded\/jetson-benchmarks. 2025"},{"key":"4811_CR39","doi-asserted-by":"publisher","first-page":"2766","DOI":"10.1109\/TIFS.2023.3266699","volume":"18","author":"X Wang","year":"2023","unstructured":"Wang X, Gursoy M C. Resilient path planning for UAVs in data collection under adversarial attacks. IEEE TransInformForensic Secur, 2023, 18: 2766\u20132779","journal-title":"IEEE TransInformForensic Secur"},{"key":"4811_CR40","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MWC.2016.1600073WC","volume":"24","author":"D He","year":"2016","unstructured":"He D, Chan S, Guizani M. Communication security of unmanned aerial vehicles. IEEE Wireless Commun, 2016, 24: 134\u2013139","journal-title":"IEEE Wireless Commun"},{"key":"4811_CR41","doi-asserted-by":"publisher","first-page":"284","DOI":"10.3390\/drones6100284","volume":"6","author":"G Abro","year":"2022","unstructured":"Abro G, Zulkifli S, Masood R, et al. Comprehensive review of UAV detection, security, and communication advancements to prevent threats. Drones, 2022, 6: 284","journal-title":"Drones"},{"key":"4811_CR42","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MCOMSTD.0001.2000078","volume":"5","author":"L Wang","year":"2021","unstructured":"Wang L, Chen Y, Wang P, et al. Security threats and countermeasures of unmanned aerial vehicle communications. IEEE Comm Stand Mag, 2021, 5: 41\u201347","journal-title":"IEEE Comm Stand Mag"},{"key":"4811_CR43","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s11036-018-1193-x","volume":"25","author":"Y Zhi","year":"2020","unstructured":"Zhi Y, Fu Z, Sun X, et al. Security and privacy issues of UAV: a survey. Mobile Netw Appl, 2020, 25: 95\u2013101","journal-title":"Mobile Netw Appl"},{"key":"4811_CR44","first-page":"398","volume-title":"Proceedings of 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)","author":"V Dey","year":"2018","unstructured":"Dey V, Pudi V, Chattopadhyay A, et al. Security vulnerabilities of unmanned aerial vehicles and countermeasures: an experimental study. In: Proceedings of 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), 2018. 398\u2013403"},{"key":"4811_CR45","first-page":"1213","volume-title":"Proceedings of IEEE Military Communications Conference","author":"M Hooper","year":"2016","unstructured":"Hooper M, Tian Y, Zhou R, et al. Securing commercial Wi-Fi-based UAVs from common security attacks. In: Proceedings of IEEE Military Communications Conference, 2016. 1213\u20131218"},{"key":"4811_CR46","first-page":"16","volume-title":"Proceedings of the Virus Bulletin Conference","author":"O Petrovsky","year":"2015","unstructured":"Petrovsky O, Prague V. Attack on the drones. In: Proceedings of the Virus Bulletin Conference, Prague, 2015. 16"},{"key":"4811_CR47","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/3498361.3538938","volume-title":"Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services","author":"T Kim","year":"2022","unstructured":"Kim T, Ding A, Etigowni S, et al. Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch. In: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services, 2022. 69\u201383"},{"key":"4811_CR48","first-page":"701","volume-title":"Proceedings of Smart Systems and IoT: Innovations in Computing","author":"F Lakew Yihunie","year":"2020","unstructured":"Lakew Yihunie F, Singh A K, Bhatia S. Assessing and exploiting security vulnerabilities of unmanned aerial vehicles. In: Proceedings of Smart Systems and IoT: Innovations in Computing, 2020. 701\u2013710"},{"key":"4811_CR49","doi-asserted-by":"publisher","first-page":"5893","DOI":"10.1109\/ICRA46639.2022.9812056","volume-title":"Proceedings of 2022 International Conference on Robotics and Automation (ICRA)","author":"C Fu","year":"2022","unstructured":"Fu C, Li S, Yuan X, et al. Ad2attack: adaptive adversarial attack on real-time uav tracking. In: Proceedings of 2022 International Conference on Robotics and Automation (ICRA), 2022. 5893\u20135899"},{"key":"4811_CR50","volume-title":"Proceedings of Black Hat Asia 2025 Briefings","author":"P Lee","year":"2025","unstructured":"Lee P, Su V, Chen P. The drone supply chain\u2019s grand siege: from initial breaches to long-term espionage on high-value targets. In: Proceedings of Black Hat Asia 2025 Briefings, 2025"},{"key":"4811_CR51","doi-asserted-by":"publisher","first-page":"23379","DOI":"10.1109\/JIOT.2022.3206276","volume":"9","author":"A Raja","year":"2022","unstructured":"Raja A, Njilla L, Yuan J. Adversarial attacks and defenses toward AI-assisted UAV infrastructure inspection. IEEE Internet Things J, 2022, 9: 23379\u201323389","journal-title":"IEEE Internet Things J"},{"key":"4811_CR52","first-page":"3256","volume-title":"Proceedings of 2023 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)","author":"S Shrestha","year":"2023","unstructured":"Shrestha S, Pathak S, Viegas E K. Towards a robust adversarial patch attack against unmanned aerial vehicles object detection. In: Proceedings of 2023 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), 2023. 3256\u20133263"},{"key":"4811_CR53","first-page":"1","volume-title":"Proceedings of 2023 7th International Multi-Topic ICT Conference (IMTIC)","author":"W Salam","year":"2023","unstructured":"Salam W, Raazi S K U R, Ansari N H. Seltha: secure, efficient and lightweight authentication mechanism for unmanned aerial vehicle network. In: Proceedings of 2023 7th International Multi-Topic ICT Conference (IMTIC), 2023. 1\u20137"},{"key":"4811_CR54","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comcom.2024.02.001","volume":"218","author":"L Chen","year":"2024","unstructured":"Chen L, Zhu Y, Liu S, et al. PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication. Comput Commun, 2024, 218: 31\u201343","journal-title":"Comput Commun"},{"key":"4811_CR55","first-page":"1","volume-title":"Proceedings of 2023 IEEE\/AIAA 42nd Digital Avionics Systems Conference (DASC)","author":"M A Sen","year":"2023","unstructured":"Sen M A, Al-Rubaye S, Tsourdos A. Developing secure hardware for UAV authorisation using lightweight authentication. In: Proceedings of 2023 IEEE\/AIAA 42nd Digital Avionics Systems Conference (DASC), 2023. 1\u20139"},{"key":"4811_CR56","doi-asserted-by":"publisher","first-page":"110286","DOI":"10.1016\/j.compeleceng.2025.110286","volume":"123","author":"A Elhence","year":"2025","unstructured":"Elhence A, Chamola V. HardSecUAV: a hardware-based mutual authentication protocol for network of drones. Comput Electrical Eng, 2025, 123: 110286","journal-title":"Comput Electrical Eng"},{"key":"4811_CR57","doi-asserted-by":"crossref","unstructured":"Bell V, Rengasamy D, Rothwell B, et al. Anomaly detection for unmanned aerial vehicle sensor data using a stacked recurrent autoencoder method with dynamic thresholding. 2022. ArXiv:2203.04734","DOI":"10.4271\/01-15-02-0017"},{"key":"4811_CR58","doi-asserted-by":"publisher","first-page":"31681","DOI":"10.1109\/JSEN.2024.3451648","volume":"24","author":"L Yang","year":"2024","unstructured":"Yang L, Li S, Zhang Y, et al. Deep learning-assisted unmanned aerial vehicle flight data anomaly detection: a review. IEEE Sens J, 2024, 24: 31681\u201331695","journal-title":"IEEE Sens J"},{"key":"4811_CR59","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/TIM.2018.2863499","volume":"68","author":"Y He","year":"2018","unstructured":"He Y, Peng Y, Wang S, et al. ADMOST: UAV flight data anomaly detection and mitigation via online subspace tracking. IEEE Trans Instrum Meas, 2018, 68: 1035\u20131044","journal-title":"IEEE Trans Instrum Meas"},{"key":"4811_CR60","first-page":"253","volume-title":"Proceedings of 2020 International Conference on Sensing, Measurement & Data Analytics in the era of Artificial Intelligence (ICSMD)","author":"D Pan","year":"2020","unstructured":"Pan D, Nie L, Kang W, et al. Uav anomaly detection using active learning and improved S3VM model. In: Proceedings of 2020 International Conference on Sensing, Measurement & Data Analytics in the era of Artificial Intelligence (ICSMD), 2020. 253\u2013258"},{"key":"4811_CR61","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1177\/0278364920966642","volume":"40","author":"A Keipour","year":"2021","unstructured":"Keipour A, Mousaei M, Scherer S. ALFA: a dataset for UAV fault and anomaly detection. Int J Robotics Res, 2021, 40: 515\u2013520","journal-title":"Int J Robotics Res"},{"key":"4811_CR62","doi-asserted-by":"publisher","first-page":"105650","DOI":"10.1016\/j.asoc.2019.105650","volume":"83","author":"S Khan","year":"2019","unstructured":"Khan S, Liew C F, Yairi T, et al. Unsupervised anomaly detection in unmanned aerial vehicles. Appl Soft Computing, 2019, 83: 105650","journal-title":"Appl Soft Computing"},{"key":"4811_CR63","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TR.2021.3134369","volume":"71","author":"J Zhong","year":"2021","unstructured":"Zhong J, Zhang Y, Wang J, et al. Unmanned aerial vehicle flight data anomaly detection and recovery prediction based on spatio-temporal correlation. IEEE Trans Rel, 2021, 71: 457\u2013468","journal-title":"IEEE Trans Rel"},{"key":"4811_CR64","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.1109\/ISCC47284.2019.8969732","volume-title":"Proceedings of 2019 IEEE Symposium on Computers and Communications (ISCC)","author":"M Rodrigues","year":"2019","unstructured":"Rodrigues M, Amaro J, Os\u00f3rio F S, et al. Authentication methods for UAV communication. In: Proceedings of 2019 IEEE Symposium on Computers and Communications (ISCC), 2019. 1210\u20131215"},{"key":"4811_CR65","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/NaNA.2019.00072","volume-title":"Proceedings of 2019 International Conference on Networking and Network Applications (NaNA)","author":"L Teng","year":"2019","unstructured":"Teng L, Jianfeng M, Pengbin F, et al. Lightweight security authentication mechanism towards UAV networks. In: Proceedings of 2019 International Conference on Networking and Network Applications (NaNA), 2019. 379\u2013384"},{"key":"4811_CR66","doi-asserted-by":"publisher","first-page":"7537764","DOI":"10.1155\/2022\/7537764","volume":"2022","author":"T Xia","year":"2022","unstructured":"Xia T, He J, Lakshmanna K. An identity authentication scheme based on SM2 algorithm in UAV communication network. Wireless Commun Mobile Computing, 2022, 2022: 7537764","journal-title":"Wireless Commun Mobile Computing"},{"key":"4811_CR67","doi-asserted-by":"publisher","first-page":"82930","DOI":"10.1109\/ACCESS.2021.3087084","volume":"9","author":"C F E de Melo","year":"2021","unstructured":"de Melo C F E, e Silva T D, Boeira F, et al. UAVouch: a secure identity and location validation scheme for UAV-networks. IEEE Access, 2021, 9: 82930\u201382946","journal-title":"IEEE Access"},{"key":"4811_CR68","doi-asserted-by":"publisher","first-page":"15068","DOI":"10.1109\/TVT.2020.3033060","volume":"69","author":"T Alladi","year":"2020","unstructured":"Alladi T, Naren T, Bansal G, et al. SecAuthUAV: a novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Trans Veh Technol, 2020, 69: 15068\u201315077","journal-title":"IEEE Trans Veh Technol"},{"key":"4811_CR69","doi-asserted-by":"publisher","first-page":"6652","DOI":"10.1109\/TII.2020.2966758","volume":"16","author":"C Jiang","year":"2020","unstructured":"Jiang C, Fang Y, Zhao P, et al. Intelligent UAV identity authentication and safety supervision based on behavior modeling and prediction. IEEE Trans Ind Inf, 2020, 16: 6652\u20136662","journal-title":"IEEE Trans Ind Inf"},{"key":"4811_CR70","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","volume":"73","author":"B Lee","year":"2017","unstructured":"Lee B, Lee J H. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. J Supercomput, 2017, 73: 1152\u20131167","journal-title":"J Supercomput"},{"key":"4811_CR71","first-page":"544","volume-title":"Proceedings of 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","author":"X Wang","year":"2015","unstructured":"Wang X, Konstantinou C, Maniatakos M, et al. Confirm: detecting firmware modifications in embedded systems using hardware performance counters. In: Proceedings of 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), 2015. 544\u2013551"},{"key":"4811_CR72","first-page":"1050","volume-title":"Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","author":"J M Lim","year":"2018","unstructured":"Lim J M, Kim Y, Yoo C. Chain veri: blockchain-based firmware verification system for IoT environment. In: Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018. 1050\u20131056"},{"key":"4811_CR73","first-page":"1","volume-title":"Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems","author":"T Chambers","year":"2024","unstructured":"Chambers T, Vierhauser M, Agrawal A, et al. Hifuzz: human interaction fuzzing for small unmanned aerial vehicles. In: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems, 2024. 1\u201314"},{"key":"4811_CR74","doi-asserted-by":"publisher","first-page":"104157","DOI":"10.1016\/j.cose.2024.104157","volume":"148","author":"V K Malviya","year":"2025","unstructured":"Malviya V K, Minn W, Shar L K, et al. Fuzzing drones for anomaly detection: a systematic literature review. Comput Security, 2025, 148: 104157","journal-title":"Comput Security"},{"key":"4811_CR75","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comcom.2024.04.005","volume":"220","author":"Z Chang","year":"2024","unstructured":"Chang Z, Zhang H, Jia Y, et al. Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals. Comput Commun, 2024, 220: 138\u2013148","journal-title":"Comput Commun"},{"key":"4811_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3486860","volume":"55","author":"S Alrabaee","year":"2022","unstructured":"Alrabaee S, Debbabi M, Wang L. A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features. ACM Comput Surv, 2022, 55: 1\u201341","journal-title":"ACM Comput Surv"},{"key":"4811_CR77","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11219-018-9435-5","volume":"27","author":"D Zhao","year":"2019","unstructured":"Zhao D, Lin H, Ran L, et al. CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph. Software Qual J, 2019, 27: 1045\u20131068","journal-title":"Software Qual J"},{"key":"4811_CR78","doi-asserted-by":"crossref","unstructured":"Kim Y, Cho K, Kim S. Challenges in drone firmware analyses of drone firmware and its solutions. 2024. ArXiv:2312.16818","DOI":"10.1109\/ACCESS.2024.3425604"},{"key":"4811_CR79","volume-title":"Proceedings of NDSS","author":"Z Luo","year":"2023","unstructured":"Luo Z, Wang P, Wang B, et al. Vulhawk: cross-architecture vulnerability detection with entropy-based binary code search. In: Proceedings of NDSS, 2023"},{"key":"4811_CR80","doi-asserted-by":"publisher","first-page":"162301","DOI":"10.1007\/s11432-025-4419-9","volume":"68","author":"C-X Wang","year":"2025","unstructured":"Wang C-X, Lv Z, Huang C, et al. An enhanced 6G pervasive channel model towards standardization. Sci China Inf Sci, 2025, 68: 162301","journal-title":"Sci China Inf Sci"},{"key":"4811_CR81","doi-asserted-by":"publisher","first-page":"171301","DOI":"10.1007\/s11432-024-4337-1","volume":"68","author":"Q M Cui","year":"2025","unstructured":"Cui Q M, You X H, Wei N, et al. Overview of AI and communication for 6G network: fundamentals, challenges, and future research opportunities. Sci China Inf Sci, 2025, 68: 171301","journal-title":"Sci China Inf Sci"},{"key":"4811_CR82","doi-asserted-by":"publisher","first-page":"3541","DOI":"10.1109\/TII.2025.3534441","volume":"21","author":"C Sheng","year":"2025","unstructured":"Sheng C, Zhou W, Han Q L, et al. Network traffic fingerprinting for IIoT device identification: a survey. IEEE Trans Ind Inf, 2025, 21: 3541\u20133554","journal-title":"IEEE Trans Ind Inf"},{"key":"4811_CR83","doi-asserted-by":"publisher","first-page":"181101","DOI":"10.1007\/s11432-025-4388-5","volume":"68","author":"X L He","year":"2025","unstructured":"He X L, Xu G W, Han X S, et al. Artificial intelligence security and privacy: a survey. Sci China Inf Sci, 2025, 68: 181101","journal-title":"Sci China Inf Sci"},{"key":"4811_CR84","doi-asserted-by":"publisher","first-page":"170301","DOI":"10.1007\/s11432-024-4465-3","volume":"68","author":"Z H Yang","year":"2025","unstructured":"Yang Z H, Xu W, Liang L, et al. On privacy, security, and trustworthiness in distributed wireless large AI models. Sci China Inf Sci, 2025, 68: 170301","journal-title":"Sci China Inf Sci"},{"key":"4811_CR85","doi-asserted-by":"publisher","first-page":"14958","DOI":"10.1038\/ncomms14958","volume":"8","author":"F Chen","year":"2017","unstructured":"Chen F, Ding X, Feng Y, et al. Targeted activation of diverse CRISPR-Cas systems for mammalian genome editing via proximal CRISPR targeting. Nat Commun, 2017, 8: 14958","journal-title":"Nat Commun"},{"key":"4811_CR86","unstructured":"Gu T, Dolan-Gavitt B, Garg S. Badnets: identifying vulnerabilities in the machine learning model supply chain. 2017. ArXiv:1708.06733"},{"key":"4811_CR87","unstructured":"Biggio B, Nelson B, Laskov P. Poisoning attacks against support vector machines. 2012. ArXiv:1206.6389"},{"key":"4811_CR88","first-page":"30","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"P Blanchard","year":"2017","unstructured":"Blanchard P, El Mhamdi E M, Guerraoui R, et al. Machine learning with adversaries: Byzantine tolerant gradient descent. In: Proceedings of Advances in Neural Information Processing Systems, 2017. 30"},{"key":"4811_CR89","first-page":"601","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security 16)","author":"F Tram\u00e8r","year":"2016","unstructured":"Tram\u00e8r F, Zhang F, Juels A, et al. Stealing machine learning models via prediction APIs. In: Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), 2016. 601\u2013618"},{"key":"4811_CR90","first-page":"1345","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"M Jagielski","year":"2020","unstructured":"Jagielski M, Carlini N, Berthelot D, et al. High accuracy and high fidelity extraction of neural networks. In: Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), 2020. 1345\u20131362"},{"key":"4811_CR91","first-page":"515","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security 19)","author":"L Batina","year":"2019","unstructured":"Batina L, Bhasin S, Jap D, et al. CSI NN: reverse engineering of neural network architectures through electromagnetic side channel. In: Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), 2019. 515\u2013532"},{"key":"4811_CR92","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/3274694.3274696","volume-title":"Proceedings of the 34th Annual Computer Security Applications Conference","author":"L Wei","year":"2018","unstructured":"Wei L, Luo B, Li Y, et al. I know what you see: power side-channel attack on convolutional neural network accelerators. In: Proceedings of the 34th Annual Computer Security Applications Conference, 2018. 393\u2013406"},{"key":"4811_CR93","unstructured":"Orekondy T, Schiele B, Fritz M. Prediction poisoning: towards defenses against DNN model stealing attacks. 2019. ArXiv:1906.10908"},{"key":"4811_CR94","doi-asserted-by":"publisher","first-page":"100834","DOI":"10.1016\/j.vehcom.2024.100834","volume":"49","author":"J Sharma","year":"2024","unstructured":"Sharma J, Mehra P S. HCFAIUN: a novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks. Vehicular Commun, 2024, 49: 100834","journal-title":"Vehicular Commun"},{"key":"4811_CR95","first-page":"3","volume-title":"Proceedings of Workshop Record of SASC","author":"D J Bernstein","year":"2008","unstructured":"Bernstein D J. Chacha, a variant of salsa20. In: Proceedings of Workshop Record of SASC, Lausanne, 2008. 3\u20135"},{"key":"4811_CR96","doi-asserted-by":"publisher","first-page":"100055","DOI":"10.1016\/j.iot.2019.100055","volume":"6","author":"L Coppolino","year":"2019","unstructured":"Coppolino L, D\u2019Antonio S, Mazzeo G, et al. A comprehensive survey of hardware-assisted security: from the edge to the cloud. Internet Things, 2019, 6: 100055","journal-title":"Internet Things"},{"key":"4811_CR97","first-page":"392","volume-title":"Proceedings of International Conference on Algorithms and Architectures for Parallel Processing","author":"Z Liu","year":"2022","unstructured":"Liu Z, Chen C, Ejaz A, et al. Automated binary analysis: a survey. In: Proceedings of International Conference on Algorithms and Architectures for Parallel Processing, 2022. 392\u2013411"},{"key":"4811_CR98","volume-title":"Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"A Fioraldi","year":"2020","unstructured":"Fioraldi A, Maier D, Ei\u00dffeldt H, et al. AFL++: combining incremental steps of fuzzing research. In: Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020"},{"key":"4811_CR99","first-page":"1980","volume":"47","author":"V T Pham","year":"2020","unstructured":"Pham V T, Boehme M, Santosa A E, et al. Smart Greybox fuzzing. IEEE Trans Software Eng, 2020, 47: 1980\u20131997","journal-title":"IEEE Trans Software Eng"},{"key":"4811_CR100","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TVT.2021.3132934","volume":"71","author":"C Fan","year":"2021","unstructured":"Fan C, Liu H, Li B, et al. Adversarial game against hybrid attacks in UAV communications with partial information. IEEE Trans Veh Technol, 2021, 71: 2204\u20132208","journal-title":"IEEE Trans Veh Technol"},{"key":"4811_CR101","doi-asserted-by":"crossref","unstructured":"Bai T, Luo J, Zhao J, et al. Recent advances in adversarial training for adversarial robustness. 2021. ArXiv:2102.01356","DOI":"10.24963\/ijcai.2021\/591"},{"key":"4811_CR102","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/SP.2016.41","volume-title":"Proceedings of 2016 IEEE symposium on security and privacy (SP)","author":"N Papernot","year":"2016","unstructured":"Papernot N, McDaniel P, Wu X, et al. Distillation as a defense to adversarial perturbations against deep neural networks. In: Proceedings of 2016 IEEE symposium on security and privacy (SP), 2016. 582\u2013597"},{"key":"4811_CR103","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/SP.2017.49","volume-title":"Proceedings of 2017 IEEE Symposium on Security and Privacy (SP)","author":"N Carlini","year":"2017","unstructured":"Carlini N, Wagner D. Towards evaluating the robustness of neural networks. In: Proceedings of 2017 IEEE Symposium on Security and Privacy (SP), 2017. 39\u201357"},{"key":"4811_CR104","first-page":"102670","volume":"55","author":"R Ch","year":"2020","unstructured":"Ch R, Srivastava G, Reddy Gadekallu T, et al. Security and privacy of UAV data using blockchain technology. J Inf Security Appl, 2020, 55: 102670","journal-title":"J Inf Security Appl"},{"key":"4811_CR105","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1109\/JSAC.2021.3118400","volume":"39","author":"H Xing","year":"2021","unstructured":"Xing H, Simeone O, Bi S. Federated learning over wireless device-to-device networks: algorithms and convergence analysis. IEEE J Sel Areas Commun, 2021, 39: 3723\u20133741","journal-title":"IEEE J Sel Areas Commun"},{"key":"4811_CR106","doi-asserted-by":"publisher","first-page":"2733","DOI":"10.3390\/math10152733","volume":"10","author":"A Figueira","year":"2022","unstructured":"Figueira A, Vaz B. Survey on synthetic data generation, evaluation methods and GANs. Mathematics, 2022, 10: 2733","journal-title":"Mathematics"},{"key":"4811_CR107","doi-asserted-by":"publisher","first-page":"6476274","DOI":"10.1155\/2022\/6476274","volume":"2022","author":"Y He","year":"2022","unstructured":"He Y, Huang D, Chen L, et al. A survey on zero trust architecture: challenges and future trends. Wireless Commun Mobile Computing, 2022, 2022: 6476274","journal-title":"Wireless Commun Mobile Computing"},{"key":"4811_CR108","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/SLT48900.2021.9383529","volume-title":"Proceedings of 2021 IEEE Spoken Language Technology Workshop (SLT)","author":"C Y Huang","year":"2021","unstructured":"Huang C Y, Lin Y Y, Lee H Y, et al. Defending your voice: adversarial attack on voice conversion. In: Proceedings of 2021 IEEE Spoken Language Technology Workshop (SLT), 2021. 552\u2013559"},{"key":"4811_CR109","first-page":"49","volume-title":"Proceedings of 27th USENIX Security Symposium","author":"X Yuan","year":"2018","unstructured":"Yuan X, Chen Y, Zhao Y, et al. CommanderSong: a systematic approach for practical adversarial voice recognition. In: Proceedings of 27th USENIX Security Symposium, 2018. 49\u201364"},{"key":"4811_CR110","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/cryptography7030040","volume":"7","author":"D T Dam","year":"2023","unstructured":"Dam D T, Tran T H, Hoang V P, et al. A survey of post-quantum cryptography: start of a new race. Cryptography, 2023, 7: 40","journal-title":"Cryptography"},{"key":"4811_CR111","first-page":"1","volume-title":"Proceedings of 2020 IEEE High Performance Extreme Computing Conference (HPEC)","author":"M Kumar","year":"2020","unstructured":"Kumar M, Pattnaik P. Post quantum cryptography (pqc)-an overview. In: Proceedings of 2020 IEEE High Performance Extreme Computing Conference (HPEC), 2020. 1\u20139"},{"key":"4811_CR112","first-page":"2724","volume-title":"Proceedings of AIAA SCITECH 2025 Forum","author":"K Mohammad","year":"2025","unstructured":"Mohammad K. Cyber shield: advances in detection, isolation, and containment mechanisms. In: Proceedings of AIAA SCITECH 2025 Forum, 2025. 2724"},{"key":"4811_CR113","first-page":"1","volume-title":"Proceedings of Workshop on Embedded Security in Cars","author":"M Wolf","year":"2004","unstructured":"Wolf M, Weimerskirch A, Paar C. Security in automotive bus systems. In: Proceedings of Workshop on Embedded Security in Cars, 2004. 1\u201313"},{"key":"4811_CR114","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3291047","volume":"51","author":"S Pinto","year":"2019","unstructured":"Pinto S, Santos N. Demystifying arm TrustZone: a comprehensive survey. ACM Comput Surv, 2019, 51: 1\u201336","journal-title":"ACM Comput Surv"},{"key":"4811_CR115","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9019","volume-title":"A firmware update architecture for Internet of Things","author":"B Moran","year":"2021","unstructured":"Moran B, Tschofenig H, Brown D, et al. A firmware update architecture for Internet of Things. RFC 9019, 2021"},{"key":"4811_CR116","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-63387-9_1","volume-title":"Proceedings of International Conference on Computer Aided Verification","author":"X Huang","year":"2017","unstructured":"Huang X, Kwiatkowska M, Wang S, et al. Safety verification of deep neural networks. In: Proceedings of International Conference on Computer Aided Verification, 2017. 3\u201329"},{"key":"4811_CR117","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Proceedings of International Conference on Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz G, Barrett C, Dill D L, et al. Reluplex: an efficient smt solver for verifying deep neural networks. In: Proceedings of International Conference on Computer Aided Verification, 2017. 97\u2013117"},{"key":"4811_CR118","doi-asserted-by":"publisher","first-page":"100058","DOI":"10.1016\/j.jatrs.2025.100058","volume":"4","author":"X Sun","year":"2025","unstructured":"Sun X, Wang S, Zhang X, et al. LAERACE: taking the policy fast-track towards low-altitude economy. J Air Transp Res Soc, 2025, 4: 100058","journal-title":"J Air Transp Res Soc"},{"key":"4811_CR119","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/B978-0-323-91940-1.00012-8","volume-title":"Unmanned Aerial Systems in Agriculture: Eyes Above Fields","author":"A Rauhala","year":"2023","unstructured":"Rauhala A, Tuomela A, Levi\u00e4kangas P. An overview of unmanned aircraft systems (UAS) governance and regulatory frameworks in the European Union (EU). In: Unmanned Aerial Systems in Agriculture: Eyes Above Fields. Amsterdam: Elsevier, 2023. 269\u2013285"},{"key":"4811_CR120","first-page":"1","volume-title":"Proceedings of 2020 AIAA\/IEEE 39th Digital Avionics Systems Conference (DASC)","author":"J Lieb","year":"2020","unstructured":"Lieb J, Volkert A. Unmanned aircraft systems traffic management: a comparsion on the FAA UTM and the European CORS conops based on u-space. In: Proceedings of 2020 AIAA\/IEEE 39th Digital Avionics Systems Conference (DASC), 2020. 1\u20136"},{"key":"4811_CR121","volume-title":"Manual on Space Weather Information in Support of International Air Navigation","author":"International Civil Aviation Organization","year":"2018","unstructured":"International Civil Aviation Organization. Manual on Space Weather Information in Support of International Air Navigation. Montreal, 2018. Approved by the Secretary General and published under ICAO authority. https:\/\/store.icao.int\/en\/manual-on-space-weather-information-in-support-of-international-air-navigation-doc-10100"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-025-4811-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-025-4811-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-025-4811-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:05:05Z","timestamp":1775037905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-025-4811-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,25]]},"references-count":121,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["4811"],"URL":"https:\/\/doi.org\/10.1007\/s11432-025-4811-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,25]]},"assertion":[{"value":"29 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"141202"}}