[1] 万健, 李楠, 李琦. 空中交通管理系统安全评价研究[J].北京航空航天大学学报, 2009, 24(1):89-92. WAN J, LI N, LI Q. Research on safety evaluation of ATM system[J].Journal of Beijing University of Aeronautics and Astronautics, 2009, 24(1):89-92(in Chinese). [2] MCCALLIE D, BUTTS J, MILLS R. Security analysis of the ADS-B implementation in the next generation air transportation system[J].International Journal of Critical Infrastructure Protection, 2011, 4(2):78-87. [3] ZHANG J, LIU W, ZHU Y B. Study of ADS-B data evaluation[J].Chinese Journal of Aeronautics, 2011, 24(4):461-466. [4] STROHMEIER M. Large-scale analysis of aircraft transponder data[J].IEEE Aerospace & Electronic Systems Magazine, 2017, 32(1):42-44. [5] STROHMEIER M, LENDERS V, MARTINOVIC I. On the security of the automatic dependent surveillance-broadcast protocol[J].IEEE Communications Surveys & Tutorials, 2015, 17(2):1066-1087. [6] MATTHIAS S, LENDERS V, MARTINOVIC I. Experimental analysis of attacks on next generation air traffic communication[C]//International Conference on Applied Cryptography and Network Security, 2013:253-271. [7] STROHMEIER M, SCHAFER M, LENDERS V, et al. Realities and challenges of nextgen air traffic management:The case of ADS-B[J].IEEE Communications Magazine, 2014, 52(5):111-118. [8] PINKE C, BUTTS J, MILIS R, et al. Enhancing the security of aircraft surveillance in the next generation air traffic control system[J]. International Journal of Critical Infrastructure Protection, 2013,6(1):3-11. [9] BAKE J, BYON J, HABLEELE E, et al. Making air traffic surveillance more reliable:A new authentification framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature[J].Security and Communication Networks, 2015, 8(5):740-750. [10] PAN W J, FENG Z L, WANG Y. ADS-B data authentication based on ECC, and X.509 certificate[J].Journal of Electronic Science and Technology, 2012, 10(1):51-55. [11] MÁRCIO M. Detecting malicious ADS-B broadcasts using wide area multilateration[C]//The IEEE/AIAA 34th Digital Avionics Systems Conference. Piscataway:IEEE Press, 2015. [12] KOVELL B, MELLISH B, NEWMAN T, et al. Comparative analysis of ADS-B verfication techniques[D].Boulder:The University of Colorado,2012. [13] NIJSURE Y, KADDOUM G, GAGNON G, et al. Adaptive air-to-ground secure communication system based on ADS-B and wide-area multilateration[J].IEEE Transactions on Vehicular Technology, 2016, 65(5):3150-3165. [14] 颜可壹, 吕泽均, 时宏伟, 等. 基于TDOA/TSOA的ADS-B系统防欺骗技术[J].计算机应用研究, 2015, 32(8):2272-2275. YAN K Y, LV Z J, SHI H W, et al. ADS-B system anti cheat technology based on TDOA/TSOA[J].Application Research of Computers, 2015, 32(8):2272-2275(in Chinese). [15] HABLER E, SHABTAI A. Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B Messages[J].Computers & Security, 2018, 78:155-173. [16] 丁建立, 邹云开, 王静, 等. 基于深度学习的ADS-B异常数据检测模型[J].航空学报, 2019, 40(11):323220. DING J L, ZOU Y K, WANG J, et al. ADS-B anomaly data detection model based on deep learning[J].Acta Aeronautica et Astronautica Sinica, 2019, 40(11):323220(in Chinese). [17] 王振昊, 王布宏. 基于SVDD的ADS-B异常数据检测[J].河北大学学报, 2019, 39(3):323-329. WANG Z H, WANG B H. ADS-B abnormal data detection based on SVDD[J].Journal of HeBei University, 2019, 39(3):323-329(in Chinese). [18] HORI T, CHEN Z, ERDGAN, et al. Multi-microphone speech recognition integrating beamforming, robust feature extraction, and advanced DNN/RNN backend[J].Computer Speech & Language, 2017, 46:401-418. [19] MANSOUR S, ZAHRA J, ALI F. Intrusion detection using reduced-size RNN based on feature grouping[J].Neural Computing & Applications, 2012, 21(6):1185-1190. [20] 桑海峰, 陈紫珍. 基于双向门控循环单元的3D人体运动预测[J].电子与信息学报, 2019, 41(9):2256-2263. SANG H F, CHEN Z Z. 3D human motion prediction based on two-way gated circulation unit[J].Journal of Electronics and Information Technology, 2019, 41(9):2256-2263(in Chinese). [21] 王伟, 孙玉霞, 齐庆杰, 等. 基于BiGRU-Attention神经网络的文本情感分类模型[J].计算机应用研究, 2019, 36(12):3558-3564. WAND W, SUN Y X, QI Q J, et al. A text emotion classification model based on BiGRU-Attention neural network[J].Application Research of Computers, 2019, 36(12):3558-3564(in Chinese). [22] TAX D M J, DUIN R P W. Support vector data description[J].Kluwer Academic Publishers, 2004, 54(1):45-66. [23] 周志华. 机器学习[M]. 北京:清华大学出版社, 2016:121-123. ZHOU Z H. Machine learning[M]. Beijing:Tsinghua University Press, 2016:121-123(in Chinese). [24] FUREY T S, CRISTIANINI N, DUFFY N, et al. Support vector machine classification and validation of cancer tissue samples using microarray expression data[J].Bioinformatics, 2000, 16(10):906-914. [25] OpenSky. The OpenSky network[DB/OL].(2020-07-13)[2020-02-17].https//opensky-network.org [26] ROBINSON J,RAHMAT Y.Particle swarm optimization in electromagnetics[J].IEEE Transactions on Antennas Propagation, 2004, 52(2):397-407. |