{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:55:41Z","timestamp":1770292541772,"version":"3.49.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Science and Technology Project of Xi\u2019an Science & Technology Bureau: Research and Development of UAV Intelligent Detection and Counterbalance System Based on Deep Learning","award":["22GXFW0149"],"award-info":[{"award-number":["22GXFW0149"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3376738","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T19:21:25Z","timestamp":1710789685000},"page":"41688-41703","source":"Crossref","is-referenced-by-count":7,"title":["Intelligent Identification and Classification of Small UAV Remote Control Signals Based on Improved Yolov5-7.0"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0301-2237","authenticated-orcid":false,"given":"Minjing","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science, Xijing University, Xi&#x2019;an, China"}]},{"given":"Donglai","family":"Hao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xijing University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0506-2198","authenticated-orcid":false,"given":"Jiaming","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xijing University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7271-4158","authenticated-orcid":false,"given":"Shuozhe","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xijing University, Xi&#x2019;an, China"}]},{"given":"Zijian","family":"Zhong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xijing University, Xi&#x2019;an, China"}]},{"given":"Zhiwen","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xijing University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2004.1337910"},{"issue":"1","key":"ref2","first-page":"81","article-title":"A review of security threats of unmanned aerial vehicles and mitigation steps","volume":"6","author":"Sathyamoorthy","year":"2015","journal-title":"J. Def. Secur."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023473"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2781711"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR.2017.7944443"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR.2018.8378565"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546180"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2018.0020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.30880\/ijie.2023.15.03.011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1117\/12.2262575"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s20143856"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2020.3048199"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/drones7060393"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2021.3085495"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081531"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1756829316681868"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/0957456517715344"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2017.7894058"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8632162"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/drones7010026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844556"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089489"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089657"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICON-SONICS53103.2021.9617168"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2021.06.008"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3172787"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3232036"},{"issue":"1","key":"ref29","first-page":"119","article-title":"A comparison of CQT spectrogram with STFT-based acoustic features in deep learning-based synthetic speech detection","volume":"11","author":"Ziabari","year":"2023","journal-title":"J. AI Data Mining"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-07992-w"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/10298436.2021.1945056"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LMWT.2023.3240475"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00707-021-02962-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.00.367"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/fenrg.2021.804405"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.21595\/mme.2023.23746"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1515\/cmam-2022-0150"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1006\/mssp.2000.1359"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECT57938.2023.10141001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2023.110533"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1088\/1748-0221\/18\/01\/P01015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/signals4030029"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.postharvbio.2021.111808"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10471392.pdf?arnumber=10471392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T20:37:40Z","timestamp":1711658260000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10471392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3376738","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}