{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:33:47Z","timestamp":1775230427265,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469049","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVs"],"prefix":"10.1145","author":[{"given":"Jered","family":"Pawlak","sequence":"first","affiliation":[{"name":"Purdue University Northwest"}]},{"given":"Yuchen","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University Northwest"}]},{"given":"Joshua","family":"Price","sequence":"additional","affiliation":[{"name":"Purdue University Northwest"}]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"Purdue University Northwest"}]},{"given":"Khair","family":"Al Shamaileh","sequence":"additional","affiliation":[{"name":"Purdue University Northwest"}]},{"given":"Quamar","family":"Niyaz","sequence":"additional","affiliation":[{"name":"Purdue University Northwest"}]},{"given":"Vijay","family":"Devabhaktuni","sequence":"additional","affiliation":[{"name":"Purdue University Northwest"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envpol.2016.08.019"},{"key":"e_1_3_2_1_2_1","volume-title":"Uavs as remote sensing platform in glaciology: Present applications and future prospects. Remote sensing of environment, 175:196--204","author":"Bhardwaj A.","year":"2016","unstructured":"A. Bhardwaj , L. Sam , F. Mart\u00edn-Torres , R. Kumar , Uavs as remote sensing platform in glaciology: Present applications and future prospects. Remote sensing of environment, 175:196--204 , 2016 . A. Bhardwaj, L. Sam, F. Mart\u00edn-Torres, R. Kumar, et al. Uavs as remote sensing platform in glaciology: Present applications and future prospects. Remote sensing of environment, 175:196--204, 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16081310"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21615"},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.marketsandmarkets.com\/Market-Reports\/unmanned-aerial-vehicles-uav-market-662.html Accessed on","author":"Unmanned","year":"2021","unstructured":"Unmanned aerial vehicles UAV market. https:\/\/www.marketsandmarkets.com\/Market-Reports\/unmanned-aerial-vehicles-uav-market-662.html Accessed on April 10, 2021 . Unmanned aerial vehicles UAV market. https:\/\/www.marketsandmarkets.com\/Market-Reports\/unmanned-aerial-vehicles-uav-market-662.html Accessed on April 10, 2021."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANDESCON.2016.7836217"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27702-8_29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2016.7838775"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2015.7346960"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2514\/6.2013-5148"},{"key":"e_1_3_2_1_11_1","first-page":"2504","volume-title":"Infotech@ Aerospace","author":"Mullins M.","year":"2012","unstructured":"M. Mullins , K. Foerster , N. Kaabouch , and W. Semke . Incorporating terrain avoidance into a small uas sense and avoid system . In Infotech@ Aerospace 2012 , page 2504 . 2012. M. Mullins, K. Foerster, N. Kaabouch, and W. Semke. Incorporating terrain avoidance into a small uas sense and avoid system. In Infotech@ Aerospace 2012, page 2504. 2012."},{"key":"e_1_3_2_1_12_1","volume-title":"A multiple objective and behavior solution for unmanned airborne sense-and-avoid systems. AUVSI's Unmanned Systems North America","author":"Mullins M.","year":"2012","unstructured":"M. Mullins , K. Foerster , N. Kaabouch , and W. Semke . A multiple objective and behavior solution for unmanned airborne sense-and-avoid systems. AUVSI's Unmanned Systems North America , 2012 . M. Mullins, K. Foerster, N. Kaabouch, and W. Semke. A multiple objective and behavior solution for unmanned airborne sense-and-avoid systems. AUVSI's Unmanned Systems North America, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of AUVSI conference","author":"Martel F.","year":"2011","unstructured":"F. Martel , M. Mullins , W. Semke , N. Kaabouch , Cooperative miniature collision avoidance system flight testing for small unmanned aircraft systems . In Proceedings of AUVSI conference , 2011 . F. Martel, M. Mullins, W. Semke, N. Kaabouch, et al. Cooperative miniature collision avoidance system flight testing for small unmanned aircraft systems. In Proceedings of AUVSI conference, 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"ND EPSCoR\/IDeA State Conference.","author":"Mullins M.","year":"2017","unstructured":"M. Mullins , K. Foester , and N. Kaabouch . Traffic alerting system for manned-unmanned aircraft airspace conflicts . In ND EPSCoR\/IDeA State Conference. 2017 . M. Mullins, K. Foester, and N. Kaabouch. Traffic alerting system for manned-unmanned aircraft airspace conflicts. In ND EPSCoR\/IDeA State Conference. 2017."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2514\/6.2013-4654"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2015.7119159"},{"key":"e_1_3_2_1_17_1","first-page":"2574","volume-title":"Infotech@ Aerospace","author":"Reyes H.","year":"2012","unstructured":"H. Reyes , N. Kaabouch , W. Semke , and S. Salle . Fuzzy logic method for link loss detection during unmanned aerial vehicle flights . In Infotech@ Aerospace 2012 , page 2574 . 2012. H. Reyes, N. Kaabouch, W. Semke, and S. Salle. Fuzzy logic method for link loss detection during unmanned aerial vehicle flights. In Infotech@ Aerospace 2012, page 2574. 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/threatpost.com\/drones-breach-cyberdefenses\/143075 Accessed on","author":"Drones","year":"2021","unstructured":"Drones are quickly becoming a cybersecurity nightmare. https:\/\/threatpost.com\/drones-breach-cyberdefenses\/143075 Accessed on April 10, 2021 . Drones are quickly becoming a cybersecurity nightmare. https:\/\/threatpost.com\/drones-breach-cyberdefenses\/143075 Accessed on April 10, 2021."},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/dl.comp.nus.edu.sg\/handle\/1900.100\/6167 Accessed on","author":"Security","year":"2021","unstructured":"Security analysis of unmanned aircraft systems. http:\/\/dl.comp.nus.edu.sg\/handle\/1900.100\/6167 Accessed on April 21, 2021 . Security analysis of unmanned aircraft systems. http:\/\/dl.comp.nus.edu.sg\/handle\/1900.100\/6167 Accessed on April 21, 2021."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600073WC"},{"key":"e_1_3_2_1_21_1","volume-title":"Last Accessed on","author":"Jeff","year":"2021","unstructured":"Jeff C. The threat of GPS jamming: The risk to an information utility, 2014. https:\/\/rntfnd.org\/wp-content\/uploads\/Exelis-GPS-Vulnerability-Assessment-February2014.pdf , Last Accessed on April 21, 2021 . Jeff C. The threat of GPS jamming: The risk to an information utility, 2014. https:\/\/rntfnd.org\/wp-content\/uploads\/Exelis-GPS-Vulnerability-Assessment-February2014.pdf, Last Accessed on April 21, 2021."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.10.002"},{"key":"e_1_3_2_1_25_1","volume-title":"Challenges of implementing automatic dependent surveillance broadcast in the nextgen air traffic management system","author":"Jr C. Giannatto","year":"2015","unstructured":"C. Giannatto Jr . Challenges of implementing automatic dependent surveillance broadcast in the nextgen air traffic management system . 2015 . C. Giannatto Jr. Challenges of implementing automatic dependent surveillance broadcast in the nextgen air traffic management system. 2015."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"e_1_3_2_1_27_1","first-page":"344","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques","author":"Brands S.","year":"1993","unstructured":"S. Brands and D. Chaum . Distance-bounding protocols . In Workshop on the Theory and Application of of Cryptographic Techniques , pages 344 -- 359 . Springer , 1993 . S. Brands and D. Chaum. Distance-bounding protocols. In Workshop on the Theory and Application of of Cryptographic Techniques, pages 344--359. Springer, 1993."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160974"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19235170"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9235173"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900207"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2018.8473921"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2015.01.003"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507924.2507927"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"e_1_3_2_1_37_1","volume-title":"http:\/\/holystone.com\/en\/supports\/Drivers.html Accessed on","author":"Drivers Manual","year":"2021","unstructured":"Manual & Drivers . http:\/\/holystone.com\/en\/supports\/Drivers.html Accessed on April 21, 2021 . Manual & Drivers. http:\/\/holystone.com\/en\/supports\/Drivers.html Accessed on April 21, 2021."},{"key":"e_1_3_2_1_38_1","volume-title":"Protocol-aware radio frequency jamming in wi-fi and commercial wireless networks. Journal of communications and networks, 16(4):397--406","author":"Hussain A.","year":"2014","unstructured":"A. Hussain , N. Saqib , U. Qamar , M. Zia , and H. Mahmood . Protocol-aware radio frequency jamming in wi-fi and commercial wireless networks. Journal of communications and networks, 16(4):397--406 , 2014 . A. Hussain, N. Saqib, U. Qamar, M. Zia, and H. Mahmood. Protocol-aware radio frequency jamming in wi-fi and commercial wireless networks. Journal of communications and networks, 16(4):397--406, 2014."},{"key":"e_1_3_2_1_39_1","volume-title":"https:\/\/drive.google.com\/file\/d\/1z9vyEP2Z2pybsGp2IncGYBwpoVUPSG_3\/view?usp=sharing Accessed on","author":"Jamming Dataset UAV","year":"2021","unstructured":"UAV Jamming Dataset . https:\/\/drive.google.com\/file\/d\/1z9vyEP2Z2pybsGp2IncGYBwpoVUPSG_3\/view?usp=sharing Accessed on May 28, 2021 . UAV Jamming Dataset. https:\/\/drive.google.com\/file\/d\/1z9vyEP2Z2pybsGp2IncGYBwpoVUPSG_3\/view?usp=sharing Accessed on May 28, 2021."},{"key":"e_1_3_2_1_40_1","first-page":"111","volume-title":"Introduction to OFDM","author":"Cho Y.","year":"2010","unstructured":"Y. Cho , J. Kim , W. Yang , and C. Kang . Introduction to OFDM , pages 111 -- 151 . 2010 . Y. Cho, J. Kim, W. Yang, and C. Kang. Introduction to OFDM, pages 111--151. 2010."},{"key":"e_1_3_2_1_41_1","volume-title":"GitHub - gnuradio\/gr-inspector: Signal Analysis Toolbox for GNU Radio. https:\/\/github.com\/gnuradio\/gr-inspector Accessed on","author":"M\u00fcller S.","year":"2021","unstructured":"S. M\u00fcller and C. Richardson . GitHub - gnuradio\/gr-inspector: Signal Analysis Toolbox for GNU Radio. https:\/\/github.com\/gnuradio\/gr-inspector Accessed on April 21, 2021 . S. M\u00fcller and C. Richardson. GitHub - gnuradio\/gr-inspector: Signal Analysis Toolbox for GNU Radio. https:\/\/github.com\/gnuradio\/gr-inspector Accessed on April 21, 2021."}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469049","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:50Z","timestamp":1750195490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":40,"alternative-id":["10.1145\/3468218.3469049","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469049","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}