{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:47:27Z","timestamp":1725587247481},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,6]]},"DOI":"10.1109\/ipccc50635.2020.9391526","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T22:59:55Z","timestamp":1621292395000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Software Define Radio in Realizing the Intruding UAS Group Behavior Prediction"],"prefix":"10.1109","author":[{"given":"Joshua","family":"Eason","sequence":"first","affiliation":[]},{"given":"Chengtao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081354"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2935620.2935632"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831911"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700442"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s20154172"},{"key":"ref7","first-page":"1","article-title":"RF Fingerprint Measurement for Detecting Multiple Amateur Drones Based on STFT and Feature Reduction","author":"chengtao","year":"2020","journal-title":"2008 Integrated Communications, Navigation and Surveillance Conference"},{"key":"ref2","article-title":"IP jamming systems utilizing virtual dispersive networking","author":"twitchell","year":"2015","journal-title":"U S Patent"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2018.8689237"},{"key":"ref1","first-page":"493","article-title":"UAV detection system with multiple acoustic nodes using machine learning models","author":"matson","year":"2019","journal-title":"2019 Third IEEE International Conference on Robotic Computing (IRC)"}],"event":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2020,11,6]]},"location":"Austin, TX, USA","end":{"date-parts":[[2020,11,8]]}},"container-title":["2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9390576\/9391500\/09391526.pdf?arnumber=9391526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:50:55Z","timestamp":1656453055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9391526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ipccc50635.2020.9391526","relation":{},"subject":[],"published":{"date-parts":[[2020,11,6]]}}}