{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:49:24Z","timestamp":1776116964841,"version":"3.50.1"},"reference-count":151,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"name":"National Science Foundation","award":["1909520 and 2246698"],"award-info":[{"award-number":["1909520 and 2246698"]}]},{"name":"U.S. Army Corps of Engineers, Engineering Research and Development Center\u2013Information Technology Laboratory","award":["W912HZ23C0041"],"award-info":[{"award-number":["W912HZ23C0041"]}]},{"name":"National Security Agency Award","award":["H98230-21-1-0260"],"award-info":[{"award-number":["H98230-21-1-0260"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,1,31]]},"abstract":"<jats:p>The rapid development of the Internet of Things (IoT) has fueled the widespread adoption of Unmanned Aerial Vehicles (UAVs) or drones across various fields, including their use in applications such as surveillance and monitoring. UAVs flight capabilities allow it to effortlessly access previously inaccessible locations, providing real-time, high-resolution data\u2014images and videos\u2014of any desired area or target. Furthermore, the growth of Artificial Intelligence (AI), and edge computing technologies has empowered UAVs with high computational capabilities, making them suitable for diverse applications such as agriculture, transportation and border security. These technology advancements also equip UAVs with powerful on-board processing for sophisticated decision-making that enhances UAV activeness and intelligence. This survey explores the promising areas of UAVs for intelligent active surveillance and monitoring across diverse applications. First, the various levels of UAV activeness within applications are discussed; second, prior research is examined to identify the key technologies and architectures that power intelligent UAV systems; and third, several UAV applications in surveillance and monitoring, ranging from basic tasks to highly intelligent operations are explored. Finally, the survey concludes by discussing emerging research challenges and outlines a guiding road map for future research of highly interdisciplinary and emerging areas in UAV-based systems for surveillance and monitoring.<\/jats:p>","DOI":"10.1145\/3760389","type":"journal-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T11:15:47Z","timestamp":1755083747000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Future UAV\/Drone Systems for Intelligent Active Surveillance and Monitoring"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1716-7486","authenticated-orcid":false,"given":"Tazeem","family":"Ahmad","sequence":"first","affiliation":[{"name":"Information Sciences and Technology, George Mason University","place":["Fairfax, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1766-5370","authenticated-orcid":false,"given":"Alicia","family":"Morel","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, University of Missouri","place":["Columbia, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8226-4183","authenticated-orcid":false,"given":"Nuo","family":"Cheng","sequence":"additional","affiliation":[{"name":"Information Sciences and Technology, George Mason University","place":["Fairfax, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2663-1380","authenticated-orcid":false,"given":"Kannappan","family":"Palaniappan","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, University of Missouri","place":["Columbia, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7666-5389","authenticated-orcid":false,"given":"Prasad","family":"Calyam","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, University of Missouri","place":["Columbia, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4152-2107","authenticated-orcid":false,"given":"Kun","family":"Sun","sequence":"additional","affiliation":[{"name":"Information Sciences and Technology, George Mason University","place":["Fairfax, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4881-5711","authenticated-orcid":false,"given":"Jianli","family":"Pan","sequence":"additional","affiliation":[{"name":"Information Sciences and Technology, George Mason University","place":["Fairfax, United States"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102600"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2019.100106"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging6080078"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2023.3241315"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3037286"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3207324"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/icspc47137.2019.9067984"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2011.5995508"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2952420"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2980359"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2019.15.AVM-035"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2019.8756593"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3024652"},{"key":"e_1_3_1_15_2","unstructured":"Mary L. Cummings Sylvain Bruni S. Mercier and P. J. Mitchell. 2007. Automation architecture for single operator multiple UAV command and control. The International Command and Control Journal 1 2 (2007)."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2909530"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2022.3220043"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ojcs.2022.3183003"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3244067"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones5040148"},{"key":"e_1_3_1_21_2","volume-title":"Introduction to UAV Systems","author":"Fahlstrom Paul G.","year":"2022","unstructured":"Paul G. Fahlstrom, Thomas J. Gleason, and Mohammad H. Sadraey. 2022. Introduction to UAV Systems. John Wiley and Sons."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones7070448"},{"key":"e_1_3_1_23_2","article-title":"Space-air-ground integrated wireless networks for 6G: Basics, key technologies and future trends","author":"Xiao Yue","year":"2024","unstructured":"Yue Xiao, Ziqiang Ye, Mingming Wu, Haoyun Li, Ming Xiao, Mohamed-Slim Alouini, Akram Al-Hourani, and Stefano Cioni. 2024. Space-air-ground integrated wireless networks for 6G: Basics, key technologies and future trends. IEEE Journal on Selected Areas in Communications (2024).","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/icbase51474.2020.00084"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2020.3045747"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR50011.2020.9425341"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3440883"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET55632.2022.9766891"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2018.2828862"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2020.3048347"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/DASC58513.2023.10311126"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105321"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796706"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615574"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.3390\/app132111905"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3243543"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12532-012-0047-y"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3284387"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151667"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3068632"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000237"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3015689"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878154"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.040"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3123959"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2300129"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2962469"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70928-2_29"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3299302"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2021.3081996"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3143175"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2018.2883058"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20185240"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones6110357"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.2100253"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones3010016"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.23919\/date.2018.8342149"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2018.10.031"},{"key":"e_1_3_1_59_2","unstructured":"J. P. Queralta J. Raitoharju T. N. Gia N. Passalis and T. Westerlund. 2020. Autosos: Towards multi-uav systems supporting maritime search and rescue with lightweight ai and edge computing. arXiv preprintarXiv:2005.03409 (2020)."},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10103661"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/metroagrifor.2019.8909245"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2022.3203127"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/rtsi38757.2016.9174608"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.3390\/w10030264"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.3389\/fenvs.2020.00064"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/icra.2017.7989450"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.3390\/en13215563"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19092068"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2020.3031194"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40327-015-0029-z"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones6010016"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2015.2432455"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/urai.2018.8441834"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/cenim51130.2020.9297921"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/jstars.2018.2879368"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2014.2331353"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3001277"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2021.3049471"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/icosec51865.2021.9591837"},{"key":"e_1_3_1_80_2","doi-asserted-by":"crossref","unstructured":"Mohammad Pourhomayoun. 2020. Automatic traffic monitoring and management for pedestrian and cyclist safety using deep learning and artificial intelligence. Mineta Transportation Institute (2020).","DOI":"10.31979\/mti.2020.1808"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.90810"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/ubmk52708.2021.9558888"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/icca54724.2022.9831954"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2018.2797697"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2021.3051273"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.011.2000651"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/wispnet54241.2022.9767139"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/icc42927.2021.9500771"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3190395"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/lra.2015.2511444"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.23919\/eusipco47968.2020.9287442"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66823-5_35"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones2040036"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.23919\/ccc50068.2020.9188811"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1093\/jcde\/qwac125"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/aero47225.2020.9172610"},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2023.3264465"},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19061438"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22031200"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones7020078"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.3997\/2214-4609.2021629012"},{"key":"e_1_3_1_102_2","first-page":"597","volume-title":"Proceedings of the International Conference on Pattern Recognition","author":"Sumanth Sriram Sai","year":"2022","unstructured":"Sriram Sai Sumanth and Emanuela Marasco. 2022. A novel time-series database of finger hypercubes before and after hand sanitization with demographics. In Proceedings of the International Conference on Pattern Recognition. Springer, 597\u2013609."},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1292-4_5"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9365-8"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/ismsit56059.2022.9932865"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/eScience55777.2022.00029"},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3119855"},{"key":"e_1_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2022.3163804"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/jmass.2021.3083659"},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.1007\/s43154-021-00063-4"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/lra.2022.3194686"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/icra48506.2021.9560830"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2020-spring48590.2020.9129495"},{"key":"e_1_3_1_114_2","first-page":"34","article-title":"Energy-aware grid based coverage path planning for uavs","author":"Ghaddar Alia","year":"2019","unstructured":"Alia Ghaddar and Ahmad Merei. 2019. Energy-aware grid based coverage path planning for uavs. Proceedings of the SENSORCOMM (2019), 34\u201345.","journal-title":"Proceedings of the SENSORCOMM"},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2022.102050"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3077880"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/scopes.2016.7955787"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.014"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1080\/10095020.2017.1420509"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3000064"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.23919\/acc.2019.8815387"},{"key":"e_1_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/icarcv.2016.7838739"},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs13132643"},{"key":"e_1_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmech.2021.3110660"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21051816"},{"key":"e_1_3_1_126_2","doi-asserted-by":"publisher","DOI":"10.3390\/drones6100266"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114660"},{"key":"e_1_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-06998-9"},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/robot.2007.363121"},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3028865"},{"key":"e_1_3_1_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2992217"},{"key":"e_1_3_1_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3182798"},{"key":"e_1_3_1_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/codit.2019.8820714"},{"key":"e_1_3_1_134_2","doi-asserted-by":"publisher","DOI":"10.1002\/ente.202100587"},{"key":"e_1_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77276-9_7"},{"key":"e_1_3_1_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/kst.2019.8687525"},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2841376"},{"key":"e_1_3_1_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/JESTIE.2022.3213138"},{"key":"e_1_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpel.2022.3198529"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.021"},{"key":"e_1_3_1_141_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2021.3088776"},{"key":"e_1_3_1_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10623000"},{"key":"e_1_3_1_143_2","article-title":"Protecting Data Integrity in UAV Systems","author":"Patel J.","year":"2023","unstructured":"J. Patel and A. Sharma. 2023. Protecting Data Integrity in UAV Systems. International Journal of Data Security (2023).","journal-title":"International Journal of Data Security"},{"key":"e_1_3_1_144_2","article-title":"Advanced network threats in UAV communications","author":"Nguyen M.","year":"2023","unstructured":"M. Nguyen et\u00a0al. 2023. Advanced network threats in UAV communications. ACM SIGCOMM (2023).","journal-title":"ACM SIGCOMM"},{"key":"e_1_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-024-01029-0"},{"key":"e_1_3_1_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3296227"},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-0774-8.ch010"},{"key":"e_1_3_1_148_2","article-title":"Preparing UAV systems for the quantum era","author":"Liu D. Q.","year":"2024","unstructured":"D. Q. Liu and E. J. Gentry. 2024. Preparing UAV systems for the quantum era. Journal of Cryptographic Innovations (2024).","journal-title":"Journal of Cryptographic Innovations"},{"key":"e_1_3_1_149_2","article-title":"Quantum-safe cryptography for UAV communication","author":"Gentry E. J.","year":"2024","unstructured":"E. J. Gentry. 2024. Quantum-safe cryptography for UAV communication. Journal of Quantum Computing (2024).","journal-title":"Journal of Quantum Computing"},{"key":"e_1_3_1_150_2","article-title":"Zero-day vulnerabilities in UAV software ecosystems","author":"Wang L.","year":"2022","unstructured":"L. Wang. 2022. Zero-day vulnerabilities in UAV software ecosystems. IEEE Security and Privacy (2022).","journal-title":"IEEE Security and Privacy"},{"key":"e_1_3_1_151_2","article-title":"Securing unmanned aerial vehicles against hijacking attacks","author":"Mitchell R. L.","year":"2023","unstructured":"R. L. Mitchell. 2023. Securing unmanned aerial vehicles against hijacking attacks. Journal of Cybersecurity (2023).","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_1_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/dasc43569.2019.9081613"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3760389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T03:26:38Z","timestamp":1757474798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3760389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":151,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,1,31]]}},"alternative-id":["10.1145\/3760389"],"URL":"https:\/\/doi.org\/10.1145\/3760389","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2024-01-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}