{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:19:59Z","timestamp":1775081999177,"version":"3.50.1"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2019,10,1]]},"DOI":"10.1587\/transcom.2018drp0033","type":"journal-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T22:12:06Z","timestamp":1556230326000},"page":"1975-1982","source":"Crossref","is-referenced-by-count":2,"title":["Compressed Sensing-Based Multi-Abnormality Self-Detecting and Faults Location Method for UAV Swarms"],"prefix":"10.23919","volume":"E102.B","author":[{"given":"Fei","family":"XIONG","sequence":"first","affiliation":[{"name":"Graduate School, Army Engineering University of PLA"}]},{"given":"Hai","family":"WANG","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, Army Engineering University of PLA"}]},{"given":"Aijing","family":"LI","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, Army Engineering University of PLA"}]},{"given":"Dongping","family":"YU","sequence":"additional","affiliation":[{"name":"Graduate School, Army Engineering University of PLA"}]},{"given":"Guodong","family":"WU","sequence":"additional","affiliation":[{"name":"Graduate School, Army Engineering University of PLA"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] R.N. Akram, K. Markantonakis, K. Mayes, O. Habachi, D. Sauveron, A. Steyven, and S. Chaumette, \u201cSecurity, privacy and safety evaluation of dynamic and static fleets of drones,\u201d Digital Avionics Systems Conference IEEE, pp.1-12, 2017. 10.1109\/dasc.2017.8101984","DOI":"10.1109\/DASC.2017.8101984"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] \u0130. Bekmezci, O.K. Sahingoz, and \u015e. Temel, \u201cFlying ad-hoc networks (FANETs): A survey,\u201d Ad Hoc Networks, vol.11, no.3, pp.1254-1270, 2013. 10.1016\/j.adhoc.2012.12.004","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] R. Altawy and A.M. Youssef, \u201cSecurity, privacy, and safety aspects of civilian drones: A survey,\u201d ACM Trans. Cyber-Phys. Syst., vol.1, no.2, 2016. 10.1145\/3001836","DOI":"10.1145\/3001836"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] H. Shraim, A. Awada, and R. Youness, \u201cA survey on quadrotors: Configurations, modeling and identification, control, collision avoidance, fault diagnosis and tolerant control,\u201d IEEE Aerosp. Electron. Syst. Mag., vol.33, no.7, pp.14-33, 2018. 10.1109\/maes.2018.160246","DOI":"10.1109\/MAES.2018.160246"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] J. Wu, Y. Cao, X. Shi, and Y. Cao, \u201cResearch of cooperative control based on multiple UAVs secure communications,\u201d International Conference on Instrumentation &amp; Measurement IEEE, pp.135-140, 2016. 10.1109\/imccc.2015.36","DOI":"10.1109\/IMCCC.2015.36"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] H. Sedjelmaci, S.M. Senouci, and N. Ansari, \u201cIntrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology,\u201d IEEE Trans. Intell. Transp. Syst., vol.18, no.5, pp.1143-53, May 2017. 10.1109\/tits.2016.2600370","DOI":"10.1109\/TITS.2016.2600370"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] H. Sedjelmaci, S.M. Senouci, and N. Ansari, \u201cA hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks,\u201d IEEE Trans. Syst. Man Cybern. Syst., vol.48, no.9, pp.1594-1606, 2018. 10.1109\/tsmc.2017.2681698","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[9] E.J. Cand\u00e8s and M.B. Wakin, \u201cAn introduction to compressive sampling,\u201d IEEE Signal Process. Mag., vol.25, no.2, pp.21-30, 2008. 10.1109\/msp.2007.914731","DOI":"10.1109\/MSP.2007.914731"},{"key":"9","unstructured":"[10] G.M. Shi, D.H. Liu, D.H.F. Gao, et al., \u201cAdvances in theory and application of compressed sensing,\u201d Acta Electronica Sinica, vol.37, no.5, pp.1070-1081, 2009."},{"key":"10","unstructured":"[11] L.C. Jiao, S.Y. Yang, F. Liu, et al., \u201cDevelopment and prospect of compressive sensing,\u201d Acta Electronica Sinica, vol.39, no.7, pp.1651-1662, 2011."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[12] Q.H. Dai, C.J. Fu, and X.Y. Ji, \u201cResearch on compressed sensing,\u201d Chinese Journal of Computers, vol.34, no.3, pp.425-434, 2011. 10.3724\/sp.j.1016.2011.00425","DOI":"10.3724\/SP.J.1016.2011.00425"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[14] D. Yu, Y. Guo, N. Li, and D. Fang, \u201cDictionary refinement for compressive sensing based device-free localization via the variational EM algorithm,\u201d IEEE Access, vol.4, pp.9743-9757, 2016. 10.1109\/access.2017.2649540","DOI":"10.1109\/ACCESS.2017.2649540"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[15] T. Clouqueur, K.K. Saluja, and P. Ramanathan, \u201cFault tolerance in collaborative sensor networks for target detection,\u201d IEEE Trans. Comput., vol.53, no.3, pp.320-333, 2004. 10.1109\/tc.2004.1261838","DOI":"10.1109\/TC.2004.1261838"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[16] T.K. Moon, \u201cThe expectation-maximization algorithm,\u201d IEEE Signal Process. Mag., vol.13, no.6, pp.47-60, 1996. 10.1109\/79.543975","DOI":"10.1109\/79.543975"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[17] R.A. Redner and H.F. Walker, \u201cMixture densities, maximum likelihood and the EM algorithm,\u201d SIAM Rev., vol.26, no.2, pp.195-239, 1984. 10.1137\/1026034","DOI":"10.1137\/1026034"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[18] Z. Ghahramani and M.I. Jordan, \u201cLearning from incomplete data,\u201d Massachusetts Institute of Technology, 1994. 10.21236\/ada295618","DOI":"10.21236\/ADA295618"},{"key":"17","unstructured":"[19] M.I. Jordan and R.A. Jacobs, \u201cHierarchical mixtures of experts and the EM algorithm,\u201d Proc. IEEE\/INNS Joint Conference on Neural Networks, pp.181-214, Nagoya, Japan 1993. 10.1109\/ijcnn.1993.716791"},{"key":"18","unstructured":"[20] C.M. Bishop, \u201cNeural networks for pattern recognition,\u201d Agric. Eng. Int. CIGR J. Sci. Res. Dev. Manuscript Pm, vol.12, no.5, pp.1235-1242, 1995."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E102.B\/10\/E102.B_2018DRP0033\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:02:26Z","timestamp":1704898946000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E102.B\/10\/E102.B_2018DRP0033\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,1]]},"references-count":18,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2018drp0033","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,1]]}}}