{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:52Z","timestamp":1740102292974,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Project","doi-asserted-by":"publisher","award":["2020YFA0711303"],"award-info":[{"award-number":["2020YFA0711303"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10279153","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:10Z","timestamp":1698083650000},"page":"2883-2889","source":"Crossref","is-referenced-by-count":1,"title":["Seeing is Believing: Detecting Sybil Attack in FANET by Matching Visual and Auditory Domains"],"prefix":"10.1109","author":[{"given":"Yanpeng","family":"Cui","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,P.R.China,100876"}]},{"given":"Qixun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,P.R.China,100876"}]},{"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,P.R.China,100876"}]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,P.R.China,100876"}]},{"given":"Zhiqing","family":"Wei","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,P.R.China,100876"}]},{"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,P.R.China,100876"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MICC.2015.7725414"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.263"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.003.2200207"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001505"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2035044"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14445\/23488549\/IJECE-V5I9P102"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2833849"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952718"},{"key":"ref2","first-page":"799","article-title":"Protecting Privacy From Aerial photog-raphy: State of the Art, Opportunities, and Challenges","author":"jiang","year":"2020","journal-title":"Proc IEEE Conf Comput Comm Workshops (INFOCOM WKSHPS) Toronto ON Canada"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105273"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2021.3094157"},{"key":"ref16","article-title":"Towards Trusted and Swift UAV Communication: ISAC-enabled Dual Identity Mapping","author":"cui","year":"2022","journal-title":"IEEE Wireless Commun"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3162849"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3124512"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2911672"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2016.7760017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254027"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.07.006"},{"journal-title":"CRUX","article-title":"200 Drones Fall Out Of The Sky In China's Zhengzhou; Panicked Spectators Run For Cover","year":"2021","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087084"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10279153.pdf?arnumber=10279153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:00:07Z","timestamp":1699902007000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10279153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10279153","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}