{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:00:50Z","timestamp":1774717250920,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100019904","name":"Vellore Institute of Technology, Chennai","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100019904","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>It is imperative to take a holistic strategy to thwarting drone threats, including the identification of drones and drone-like gadgets like ornithopters that visually imitate birds. In this study, we present the DroneSilient System, a novel anti-drone system that combines different parts. The DroneSilient system includes components that connect to RF identification technology and image-capture technology. A modified bloom filter method is used to further identify the recognized object after a drone-like object has been found, allowing for the differentiation between regular drones, ornithopters, and genuine birds. The CNN (Convolutional Neural Network) method, created using the Google Cloud Platform and AutoML widget, is used in our model for object identification and categorization. DroneSilient has an RF sensor that can identify and imitate the threat presented by recognized drones. Convolutional Network, Modified Blooms Algorithm, RFID, and RF Sensor systems are all integrated into the DroneSilient system as part of this methodology combination, which provides a thorough method for identifying and eliminating drone threats. The bloom filter proposed takes 27.6 to 12.4 microseconds. Overall time for handling the unauthorized drone will be less than 180\u00a0s. By tackling every facet of the problem, our strategy outperforms many current anti-drone solutions in terms of functionality.<\/jats:p>","DOI":"10.1186\/s40537-024-01004-6","type":"journal-article","created":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T15:03:17Z","timestamp":1729522997000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["DroneSilient (drone\u2009+\u2009resilient): an anti-drone system"],"prefix":"10.1186","volume":"11","author":[{"given":"Meghna Manoj","family":"Nair","sequence":"first","affiliation":[]},{"given":"Harini","family":"Sriraman","sequence":"additional","affiliation":[]},{"given":"Gadiparthy Harika","family":"Sai","sequence":"additional","affiliation":[]},{"given":"V.","family":"Pattabiraman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"issue":"4","key":"1004_CR1","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.2018.1700430","volume":"56","author":"X Shi","year":"2018","unstructured":"Shi X, Yang C, Xie W, Liang C, Shi Z, Chen J. Anti-drone system with multiple surveillance technologies: Architecture, implementation, and challenges. IEEE Commun Mag. 2018;56(4):68\u201374.","journal-title":"IEEE Commun Mag"},{"key":"1004_CR2","doi-asserted-by":"publisher","first-page":"42635","DOI":"10.1109\/ACCESS.2021.3065926","volume":"9","author":"S Park","year":"2021","unstructured":"Park S, Kim HT, Lee S, Joo H, Kim H. Survey on anti-drone systems: components, designs, and challenges. IEEE Access. 2021;9:42635\u201359.","journal-title":"IEEE Access"},{"key":"1004_CR3","unstructured":"Website Link. https:\/\/www.drdo.res.in\/dare2dream\/portal\/categories.html"},{"key":"1004_CR4","doi-asserted-by":"crossref","unstructured":"Oh HM, Lee H, Kim MY. 2019, October. Comparing Convolutional Neural Network (CNN) models for machine learning-based drone and bird classification of anti-drone system. In 2019 19th International Conference on Control, Automation and Systems (ICCAS) (pp. 87\u201390). IEEE.","DOI":"10.23919\/ICCAS47443.2019.8971699"},{"key":"1004_CR5","doi-asserted-by":"publisher","first-page":"104313","DOI":"10.1016\/j.dib.2019.104313","volume":"26","author":"MS Allahham","year":"2019","unstructured":"Allahham MS, Al-Sa\u2019d MF, Al-Ali A, Mohamed A, Khattab T, Erbad A. DroneRF dataset: a dataset of drones for RF-based detection, classification and identification. Data Brief. 2019;26:104313.","journal-title":"Data Brief"},{"key":"1004_CR6","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.2018.1700430","volume":"56","author":"X Shi","year":"2018","unstructured":"Shi X, Yang C, Jiayang X, Liang C, Chen J. Anti-drone System with multiple Surveillance technologies: Architecture, implementation, and challenges. IEEE Commun Mag. 2018;56:68\u201374. https:\/\/doi.org\/10.1109\/MCOM.2018.1700430.","journal-title":"IEEE Commun Mag"},{"issue":"19","key":"1004_CR7","doi-asserted-by":"publisher","first-page":"11429","DOI":"10.1109\/JSEN.2020.2995779","volume":"20","author":"J Lopez-Ballester","year":"2020","unstructured":"Lopez-Ballester J, Pastor-Aparicio A, Felici-Castell S, Segura-Garcia J, Cobos M. Enabling real-time computation of psycho-acoustic parameters in acoustic sensors using convolutional neural networks. IEEE Sens J. 2020;20(19):11429\u201338.","journal-title":"IEEE Sens J"},{"key":"1004_CR8","doi-asserted-by":"crossref","unstructured":"Wellig P, Speirs P, Schuepbach C, Oechslin R, Renker M, Boeniger U, Pratisto H. \u2018\u2018Radar systems and challenges for C-UAV,\u2019\u2019 in Proc. 19th Int. Radar Symp. (IRS), Jun 2018, pp. 1\u20138.","DOI":"10.23919\/IRS.2018.8448071"},{"key":"1004_CR9","doi-asserted-by":"crossref","unstructured":"Wagoner AR, Schrader DK, Matson ET. \u2018\u2018Towards a visionbased targeting system for counter unmanned aerial systems (CUAS),\u2019\u2019 in Proc. IEEE Int. Conf. Comput. Intell. Virtual Environ. Meas. Syst. Appl. (CIVEMSA), Jun. 2017, pp. 237\u2013242.","DOI":"10.1109\/CIVEMSA.2017.7995333"},{"key":"1004_CR10","doi-asserted-by":"crossref","unstructured":"Wang L, Ai J, Zhang L, Xing Z. \u2018\u2018Design of airport obstaclefree zone monitoring UAV system based on computer vision,\u2019\u2019 Sensors, vol. 20, no. 9, p. 2475, 2020.","DOI":"10.3390\/s20092475"},{"key":"1004_CR11","doi-asserted-by":"crossref","unstructured":"Zubkov OV, Sergey O, Sheiko VM, Oleynikov VM, Kartashov, Stanislav I. Babkin. INVESTIGATION OF THE YOLOv5 ALGORITHM EFFICIENCY FOR DRONE RECOGNIZATION. Telecommunications Radio Eng 83, 1 (2024).","DOI":"10.1615\/TelecomRadEng.2023048987"},{"key":"1004_CR12","doi-asserted-by":"crossref","unstructured":"Svanstr\u00f6m F, Englund C, Alonso-Fernandez F. (2021, January). Real-Time Drone Detection and Tracking With Visible, Thermal and Acoustic Sensors. In 2020 25th International Conference on Pattern Recognition (ICPR) (pp. 7265\u20137272). IEEE.","DOI":"10.1109\/ICPR48806.2021.9413241"},{"key":"1004_CR13","doi-asserted-by":"crossref","unstructured":"Xue N, Niu L, Hong X, Li Z, Hoffaeller L, P\u00f6pper C. 2020, December. Deepsim: Gps spoofing detection on uavs using satellite imagery matching. In Annual Computer Security Applications Conference (pp. 304\u2013319).","DOI":"10.1145\/3427228.3427254"},{"key":"1004_CR14","doi-asserted-by":"crossref","unstructured":"Kassas ZM, Khalife J, Abdallah A, Lee C. 2020, September. I am not afraid of the jammer: navigating with signals of opportunity in GPS-denied environments. In Proceedings of the 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS\u2009+\u20092020) (pp. 1566\u20131585).","DOI":"10.33012\/2020.17737"},{"key":"1004_CR15","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.future.2019.05.007","volume":"100","author":"MF Al-Sa\u2019d","year":"2019","unstructured":"Al-Sa\u2019d MF, Al-Ali A, Mohamed A, Khattab T, Erbad A. RF-based drone detection and identification using deep learning approaches: an initiative towards a large open source drone database. Future Generation Comput Syst. 2019;100:86\u201397.","journal-title":"Future Generation Comput Syst"},{"key":"1004_CR16","doi-asserted-by":"crossref","unstructured":"Jian M, Lu Z, Chen VC. (2018, April). Drone detection and tracking based on phase-interferometric Doppler radar. In 2018 IEEE Radar Conference (RadarConf18) (pp. 1146\u20131149). IEEE.","DOI":"10.1109\/RADAR.2018.8378723"},{"key":"1004_CR17","doi-asserted-by":"crossref","unstructured":"Multerer T, Ganis A, Prechtel U, Miralles E, Meusling A, Mietzner J, Ziegler V. (2017, October). Low-cost jamming system against small drones using a 3D MIMO radar based tracking. In 2017 European Radar Conference (EURAD) (pp. 299\u2013302). IEEE.","DOI":"10.23919\/EURAD.2017.8249206"},{"key":"1004_CR18","doi-asserted-by":"publisher","first-page":"51782","DOI":"10.1109\/ACCESS.2019.2911526","volume":"7","author":"SP Arteaga","year":"2019","unstructured":"Arteaga SP, Hern\u00e1ndez LAM, P\u00e9rez GS, Orozco ALS, Villalba LJG. Analysis of the GPS spoofing vulnerability in the drone 3DR solo. IEEE Access. 2019;7:51782\u20139.","journal-title":"IEEE Access"},{"issue":"1","key":"1004_CR19","first-page":"26","volume":"31","author":"III Hauck","year":"2017","unstructured":"Hauck III, L. F., Geis II. Air mines: countering the drone threat to aircraft. Air Space Power J. 2017;31(1):26.","journal-title":"Air Space Power J"},{"key":"1004_CR20","unstructured":"Gopal V. Developing an effective. Anti-Drone System for India\u2019s Armed Forces; 2020."},{"key":"1004_CR21","doi-asserted-by":"crossref","unstructured":"Nalamati M, Kapoor A, Saqib M, Sharma N, Blumenstein M. 2019, September. Drone detection in long-range surveillance videos. In 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (pp. 1\u20136). IEEE.","DOI":"10.1109\/AVSS.2019.8909830"},{"issue":"3","key":"1004_CR22","doi-asserted-by":"publisher","first-page":"2526","DOI":"10.1109\/TVT.2019.2893615","volume":"68","author":"MZ Anwar","year":"2019","unstructured":"Anwar MZ, Kaleem Z, Jamalipour A. Machine learning inspired sound-based amateur drone detection for public safety applications. IEEE Trans Veh Technol. 2019;68(3):2526\u201334.","journal-title":"IEEE Trans Veh Technol"},{"key":"1004_CR23","doi-asserted-by":"crossref","unstructured":"M\u00fcller T. Robust drone detection for day\/night counter-UAV with static VIS and SWIR cameras. Ground\/Air Multisensor Interoperability, Integration, and networking for persistent ISR VIII. Volume 10190. International Society for Optics and Photonics; 2017, May. p. 1019018.","DOI":"10.1117\/12.2262575"},{"key":"1004_CR24","unstructured":"Website Link. https:\/\/www.geeksforgeeks.org\/bloom-filters-introduction-and-python-implementation\/"},{"key":"1004_CR25","doi-asserted-by":"publisher","unstructured":"Xu R, Li C, Paterson A, Jiang Y, Sun, Shangpeng, Robertson, Jon. Aerial images and Convolutional Neural Network for Cotton Bloom Detection. Front Plant Sci. 2018;8. https:\/\/doi.org\/10.3389\/fpls.2017.02235.","DOI":"10.3389\/fpls.2017.02235"},{"key":"1004_CR26","unstructured":"Silvio M, Neto. https:\/\/towardsdatascience.com\/flower-species-classifier-c8893030cd90"},{"key":"1004_CR27","doi-asserted-by":"crossref","unstructured":"Rothe J, Strohmeier M, Montenegro S. 2019, September. A concept for catching drones with a net carried by cooperative UAVs. In 2019 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR) (pp. 126\u2013132). IEEE.","DOI":"10.1109\/SSRR.2019.8848973"},{"key":"1004_CR28","doi-asserted-by":"crossref","unstructured":"Seidaliyeva U, Akhmetov D, Ilipbayeva L, Matson ET. 2020. Real-time and accurate drone detection in a video with a static background. Sensors, 20(14), p.3856.","DOI":"10.3390\/s20143856"},{"key":"1004_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00125-y","volume":"1","author":"GL Hung","year":"2020","unstructured":"Hung GL, Sahimi MSB, Samma H, Almohamad TA, Lahasan B. Faster R-CNN deep learning model for pedestrian detection from drone images. SN Comput Sci. 2020;1:1\u20139.","journal-title":"SN Comput Sci"},{"key":"1004_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-69197-3_2","volume-title":"Innovations and advances in Cognitive systems. ICIACS 2024. Information Systems Engineering and Management","author":"AJ Lakshmi","year":"2024","unstructured":"Lakshmi AJ, Kishore G, Kumar T, Koushik V. Drone detection and classification using YOLOv8 and deep CNN. In: Ragavendiran SDP, Pavaloaia VD, Mekala MS, Cabezuelo AS, editors. Innovations and advances in Cognitive systems. ICIACS 2024. Information Systems Engineering and Management. Volume 15. Cham: Springer; 2024. https:\/\/doi.org\/10.1007\/978-3-031-69197-3_2."},{"key":"1004_CR31","unstructured":"AU-AIR. A Multi-modal Unmanned Aerial Vehicle Dataset for Low Altitude Traffic Surveillance. IEEE International Conference on Robotics and Automation (ICRA), 2020."},{"key":"1004_CR32","unstructured":"Krasin I, Duerig T, Alldrin N, Ferrari V, Abu-El-Haija S, Kuznetsova A, et al. Openimages: a public dataset for large-scale multi-label and multi-class image classification. Dataset. 2017."},{"key":"1004_CR33","doi-asserted-by":"crossref","unstructured":"Coluccia A, Fascista A, Schumann A, Sommer L, Dimou A, Zarpalas D. Drone-vs-bird detection challenge at IEEE AVSS2021. 2021 17th IEEE international conference on Advanced Video and Signal Based Surveillance (AVSS), Washington, DC: USA, 2021;1\u20138.","DOI":"10.1109\/AVSS52988.2021.9663844"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-01004-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-024-01004-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-01004-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T15:05:13Z","timestamp":1729523113000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-024-01004-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["1004"],"URL":"https:\/\/doi.org\/10.1186\/s40537-024-01004-6","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"13 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable. There were no human trials\/ data involved in the research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors give consent for publication. The results\/data\/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"144"}}