[go: up one dir, main page]

CN109885092A - A method for identifying UAV flight control data - Google Patents

A method for identifying UAV flight control data Download PDF

Info

Publication number
CN109885092A
CN109885092A CN201910229398.9A CN201910229398A CN109885092A CN 109885092 A CN109885092 A CN 109885092A CN 201910229398 A CN201910229398 A CN 201910229398A CN 109885092 A CN109885092 A CN 109885092A
Authority
CN
China
Prior art keywords
data
unmanned plane
model
cluster
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910229398.9A
Other languages
Chinese (zh)
Other versions
CN109885092B (en
Inventor
毛璀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201910229398.9A priority Critical patent/CN109885092B/en
Publication of CN109885092A publication Critical patent/CN109885092A/en
Application granted granted Critical
Publication of CN109885092B publication Critical patent/CN109885092B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明公开了一种无人机飞控数据的识别方法,设计无人机通信领域。我们的方法是在无人机悬空状态下抓取无人机和控制端之间的通信数据包,对数据包做预处理后使用自然语言中的n‑gram模型对其提取特征向量,之后使用K‑means++算法对其进行聚类,对聚类完成的每个类簇,使用One‑Class‑SVM模型对其进行模型训练,使得产生一个高维空间的球面,之后用恶意流量检测的方法,把无人机在人为控制下的产生的流量标记为异常流量,使用之前训练的每个模型对人为控制状态下的每条数据流量进行检测,由于人为控制下的产生的飞行控制数据不在悬空状态下的模型中,会被所有的模型标记为异常流量,我们根据所有模型的标记来识别飞控数据。

The invention discloses a method for identifying the flight control data of an unmanned aerial vehicle, and designs the field of unmanned aerial vehicle communication. Our method is to capture the communication data packets between the UAV and the control terminal when the UAV is in the air, and then use the n-gram model in natural language to extract feature vectors after preprocessing the data packets. The K-means++ algorithm is used to cluster it, and the One-Class-SVM model is used for model training for each cluster completed by the clustering, so that a spherical surface of a high-dimensional space is generated, and then the malicious traffic detection method is used. Mark the traffic generated by the drone under human control as abnormal traffic, and use each model trained before to detect each data traffic under human control. Because the flight control data generated under human control is not in the floating state In the model below, it will be marked as abnormal traffic by all models, and we identify the flight control data according to the marking of all models.

Description

A kind of recognition methods of unmanned plane flight control data
Technical field
The present invention relates to unmanned plane field, specially a kind of recognition methods of unmanned plane flight control data.
Background technique
Unmanned plane has very big purposes in dual-use field, but current laws and regulations are incomplete, very much Unmanned plane seriously endangers country and public safety in sensitive military zone, the flight of the place such as airport, such as: April 14 in 2017 In day to short week age on the 30th, Sichuan Province Chengdu Chengdu Shuangliu International Airport just successively occurs 8 unmanned planes and disturbs boat thing Part causes to amount to hundred frame flights and makes preparation for dropping, makes a return voyage or be delayed;The big boundary unmanned plane of a frame in 2015 crashes in White House, causes The fears of US authorities.
Therefore, in order to reinforce supervising unmanned plane, it is also necessary to necessary technological means, it is necessary to it is inverse to carry out agreement to it To its only reverse protocol format could capture unmanned aerial vehicle from technological means, realize the control to unmanned plane. However, the signal of generation not only includes that controller control unmanned plane flies during the communication of remote controler and unmanned plane The signal of row state since unmanned plane may need to be implemented certain tasks, such as is taken photo by plane, plant protection etc., so can be along with generation Other kinds of signal, such as unmanned plane during flying attitude signal, gps signal etc. are among these to our parts of most worthy It is flight control signal, completes to the reverse of flight control signal, control can be kidnapped in real time unmanned plane by just having.
In black conference in 2016, Nils implements abduction to UAV targets by forging remote controller signal, captures The control of unmanned plane;In 3.15 parties in 2016, safe team, Tencent is by believing big boundary spirit 3s no-manned machine distant control Number forgery, captured the control of UAV targets.This technology can also be used in unmanned plane control, once discovery has unmanned plane Into no-fly zone, the control of UAV targets can be captured by forging the control signal of unmanned plane, complete the control to it.
The realization of above-mentioned technical proposal all relies on the dismantling to hardware, studies the chip in hardware, the side of dynamic debugging Method obtains flight control data, but this method has certain limitation, such as big boundary of new generation by the core in remote controler Piece model is handled, and can not be identified and be studied chip, and is strongly depend on the model of unmanned plane, is needed for every A kind of unmanned plane of model, which is done, particularly to be researched and analysed, time-consuming and laborious.Present invention is generally directed to the limitations of the prior art, propose A kind of recognition methods of novel unmanned plane flight control data, this method do not depend on hardware dismantling and high degree of automation.
Summary of the invention
It is an object of the invention to: in order to solve the limitation of traditional approach, can not identify and study chip, and It is strongly depend on the model of unmanned plane, needs the unmanned plane for each model to do and particularly researchs and analyses, it is time-consuming and laborious Problem provides a kind of recognition methods of unmanned plane flight control data.
To achieve the above object, the invention provides the following technical scheme: a kind of recognition methods of unmanned plane flight control data, packet Include the following steps:
Step 1: keeping unmanned plane hanging, grabs the data packet between unmanned plane-controller using packet catcher, at this time data packet It is binary data stream;
Step 2: by binary data stream at displayable hexadecimal character;
Step 3: using n-gram model in natural language processing, the feature of each data packet is extracted;
Step 4: logical to the unmanned plane under vacant state using feature vector extracted in step 3 using k-means++ algorithm Letter data packet cluster;
Step 5: model training is carried out using One-Class-SVM to each class cluster of cluster, is obtained under multiple vacant states UAV Communication data model;
Step 6: using the random control unmanned plane during flying of controller, using between packet catcher crawl unmanned plane-controller The binary data stream of capture is displayable hexadecimal string by data packet;
Step 7: feature vector is extracted to every communication data under random state of flight using n-gram model;
Step 8: the feature vector of every data is passed sequentially through to the One-Class-SVM of training under vacant state in step 5 It is detected in model, can be by model labeled as 1 if belonging to same class cluster with the class cluster of training pattern, on the contrary label is 1;
Step 9: the data generated under artificial state of a control due to unmanned plane, can be by institute not in the class cluster under vacant state Some models are labeled as -1, carry out screening to the data for being marked as -1 entirely and form set to be selected;
Step 10: it is obtained using the similitude that Needleman-Wunsch algorithm calculates in set to be selected between any two sequences Point, form a score matrix;
Step 11: the sequence of wrong identification and the similarity score of the other sequences in similarity score matrix are relatively low, root According to the sequence of score size removal wrong identification, finally obtains and fly control protocol data.
5. preferably, the feature vector in the step 3 extracts in the following manner:
(1) every data in the data packet of n=1,2,3,4,5,6 pair is enabled to do n-gram participle respectively;
(2) frequency of the corresponding participle under each n value is counted;
(3) frequency occurred for all participles under each n value is done to small big sequence and sorts, what each word occurred Frequency is denoted as y, and rank order is denoted as x, is gone to analyze the fitting for doing (logy)=1/ (logx), digital simulation with regression analysis Coefficient chooses n when fitting coefficient maximum;
(4) participle that length is n is done to data every in data packet using the n value calculated in step 3, counts all length The frequency that the subsequence that degree is n occurs calculates the percentage that the subsequence that every kind of length is n type occurs according to frequency, by hundred Divide than one vector of composition, the feature vector as current sequence.
Preferably, model is to train to come in this way in the step 8:
(1) to each cluster for completing cluster, feature vector is extracted using the feature extraction mode of step 3;
(2) select the kernel function of One-Class-SVM for gaussian kernel function;
(3) as unit of cluster, the feature vector of each every data of cluster is mapped that as input using gaussian kernel function In higher dimensional space;
(4) a high n-dimensional sphere n is found in higher dimensional space so that it is more as far as possible the data of input include in ball, and The radius of ball is small as far as possible.
Preferably, the error exception in the step 11 is such that
(1) screening is labeled as -1 sequence by all models;
(2) similarity score between the sequence of any two screenings is calculated using Needleman-Wunsch algorithm, forms one A score matrix;
(3) score matrix is progressively scanned, if the score that current line n-th arranges is far smaller than the score of other column, investigates line n Score, if the whole score of line n is far smaller than other rows, the element of the n-th position is wrong identification element, is deleted.
Compared with prior art, the beneficial effects of the present invention are: the present invention is by being applied to unmanned plane for n-gram model It is clustered in the feature extraction of communication data, to the UAV Communication data of vacant state, and to the data of each type One-Class-SVM model is established, with the flight control data of the thought identification of malicious traffic stream detection under control of the controller, for mistake The exclusion of misrecognition, we used Needleman-Wunsch algorithm calculate any two by all models be labeled as -1 number According to the similarity score of sequence, a score matrix is formed, according to the data that score matrix goes debug to identify, to identify Fly control agreement.The prior art relies primarily on remote controler dismantling, and control terminal software conversed analysis flies control agreement to identify, time-consuming to take Power, without versatility, the present invention is applied widely, and the method for relying on machine learning, recognition speed is fast, and accuracy rate is high.
Detailed description of the invention
Fig. 1 is system flow chart of the invention;
The position Fig. 2 feature extraction flow chart of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, a kind of recognition methods of unmanned plane flight control data, including the following steps:
Step 1: keeping unmanned plane hanging, grabs the data packet between unmanned plane-controller using packet catcher, at this time data packet It is binary data stream;
Step 2: by binary data stream at displayable hexadecimal character;
Step 3: using n-gram model in natural language processing, the feature of each data packet is extracted;
Step 4: logical to the unmanned plane under vacant state using feature vector extracted in step 3 using k-means++ algorithm Letter data packet cluster;
Step 5: model training is carried out using One-Class-SVM to each class cluster of cluster, is obtained under multiple vacant states UAV Communication data model;
Step 6: using the random control unmanned plane during flying of controller, using between packet catcher crawl unmanned plane-controller The binary data stream of capture is displayable hexadecimal string by data packet;
Step 7: feature vector is extracted to every communication data under random state of flight using n-gram model;
Step 8: the feature vector of every data is passed sequentially through to the One-Class-SVM of training under vacant state in step 5 It is detected in model, can be by model labeled as 1 if belonging to same class cluster with the class cluster of training pattern, on the contrary label is 1;
Step 9: the data generated under artificial state of a control due to unmanned plane, can be by institute not in the class cluster under vacant state Some models are labeled as -1, carry out screening to the data for being marked as -1 entirely and form set to be selected;
Step 10: it is obtained using the similitude that Needleman-Wunsch algorithm calculates in set to be selected between any two sequences Point, form a score matrix;
Step 11: the sequence of wrong identification and the similarity score of the other sequences in similarity score matrix are relatively low, root According to the sequence of score size removal wrong identification, finally obtains and fly control protocol data.
Embodiment 1
As the preferred embodiment of the present invention: the feature vector in step 3 extracts in the following manner:
(1) every data in the data packet of n=1,2,3,4,5,6 pair is enabled to do n-gram participle respectively;
(2) frequency of the corresponding participle under each n value is counted;
(3) frequency occurred for all participles under each n value is done to small big sequence and sorts, what each word occurred Frequency is denoted as y, and rank order is denoted as x, is gone to analyze the fitting for doing (logy)=1/ (logx), digital simulation with regression analysis Coefficient chooses n when fitting coefficient maximum;
(4) participle that length is n is done to data every in data packet using the n value calculated in step 3, counts all length The frequency that the subsequence that degree is n occurs calculates the percentage that the subsequence that every kind of length is n type occurs according to frequency, by hundred Divide than one vector of composition, as the feature vector of current sequence, convenient for quickly and reliably extracting feature vector.
Embodiment 2
As the preferred embodiment of the present invention: model is to train to come in this way in the step 8:
(1) to each cluster for completing cluster, feature vector is extracted using the feature extraction mode of step 3;
(2) select the kernel function of One-Class-SVM for gaussian kernel function;
(3) as unit of cluster, the feature vector of each every data of cluster is mapped that as input using gaussian kernel function In higher dimensional space;
(4) a high n-dimensional sphere n is found in higher dimensional space so that it is more as far as possible the data of input include in ball, and The radius of ball is small as far as possible.
Embodiment 3
As the preferred embodiment of the present invention: the error exception in the step 11 is such that
(4) screening is labeled as -1 sequence by all models;
(5) similarity score between the sequence of any two screenings is calculated using Needleman-Wunsch algorithm, forms one A score matrix;
(6) score matrix is progressively scanned, if the score that current line n-th arranges is far smaller than the score of other column, investigates line n Score, if the whole score of line n is far smaller than other rows, the element of the n-th position is wrong identification element, is deleted.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.

Claims (4)

1. a kind of recognition methods of unmanned plane flight control data, it is characterised in that: include the following steps:
Step 1: keeping unmanned plane hanging, grabs the data packet between unmanned plane-controller using packet catcher, at this time data packet It is binary data stream;
Step 2: by binary data stream at displayable hexadecimal character;
Step 3: using n-gram model in natural language processing, the feature of each data packet is extracted;
Step 4: logical to the unmanned plane under static position using feature vector extracted in step 3 using k-means++ algorithm Letter data packet cluster;
Step 5: model training is carried out using One-Class_SVM to each class cluster of cluster, is obtained under multiple vacant states UAV Communication data model;
Step 6: using the random control unmanned plane during flying of controller, using between packet catcher crawl unmanned plane-controller The binary data stream of capture is displayable hexadecimal string by data packet;
Step 7: feature vector is extracted to every communication data under random state of flight using n-gram model;
Step 8: the feature vector of every data is passed sequentially through to the One-Class-SVM of training under vacant state in step 5 It is detected in model, can be by model labeled as 1 if belonging to same class cluster with the class cluster of training pattern, on the contrary label is 1;
Step 9: the data generated under artificial state of a control due to unmanned plane, can be by institute not in the class cluster under vacant state Some models are labeled as -1, carry out screening to the data for being marked as -1 entirely and form set to be selected;
Step 10: it is obtained using the similitude that Needleman-Wunsch algorithm calculates in set to be selected between any two sequences Point, form a score matrix;
Step 11: the sequence of wrong identification and the similarity score of the other sequences in similarity score matrix are relatively low, root According to the sequence of score size removal wrong identification, finally obtains and fly control protocol data.
2. a kind of recognition methods of unmanned plane flight control data according to claim 1, it is characterised in that: in the step 3 Feature vector extract in the following manner:
(1) every data in the data packet of n=1,2,3,4,5,6 pair is enabled to do n-gram participle respectively;
(2) frequency of the corresponding participle under each n value is counted;
(3) frequency occurred for all participles under each n value is done to small big sequence and sorts, what each word occurred Frequency is denoted as y, and rank order is denoted as x, is gone to analyze the fitting for doing (logy)=1/ (logx), digital simulation with regression analysis Coefficient chooses n when fitting coefficient maximum;
(4) participle that length is n is done to data every in data packet using the n value calculated in step 3, counts all length The frequency that the subsequence that degree is n occurs calculates the percentage that the subsequence that every kind of length is n type occurs according to frequency, by hundred Divide than one vector of composition, the feature vector as current sequence.
3. a kind of recognition methods of unmanned plane flight control data according to claim 1, it is characterised in that: in the step 8 Model training be train in the following manner come:
(1) Unmanned Aerial Vehicle Data under vacant state is clustered, is divided into n class cluster;
(2) for each class cluster, the same characteristic features extracting method for using and using when clustering extracts feature vector;
(3) feature vector of each class cluster is input in One-Class-SVM model, is trained, obtaining each model just The higher dimensional space spherical surface of regular data is 1 to the data markers being located inside spherical surface, and external data is labeled as -1.
4. a kind of recognition methods of unmanned plane flight control data according to claim 1, it is characterised in that: the step 11 In the abnormal point of wrong identification exclude in the following manner:
All any two are calculated using Needleman-Wunsch algorithm all to be marked by all models between -1 sequence Score forms a matrix;
Similarity score between the sequence of wrong identification and the sequence correctly identified is significantly less than similar between normal sequence Property score, according to this difference exclude abnormal point.
CN201910229398.9A 2019-03-25 2019-03-25 Unmanned aerial vehicle flight control data identification method Active CN109885092B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910229398.9A CN109885092B (en) 2019-03-25 2019-03-25 Unmanned aerial vehicle flight control data identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910229398.9A CN109885092B (en) 2019-03-25 2019-03-25 Unmanned aerial vehicle flight control data identification method

Publications (2)

Publication Number Publication Date
CN109885092A true CN109885092A (en) 2019-06-14
CN109885092B CN109885092B (en) 2020-10-13

Family

ID=66934022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910229398.9A Active CN109885092B (en) 2019-03-25 2019-03-25 Unmanned aerial vehicle flight control data identification method

Country Status (1)

Country Link
CN (1) CN109885092B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113014578A (en) * 2021-02-24 2021-06-22 西安超越申泰信息科技有限公司 Fragment message detection method based on convolutional neural network and storage medium
CN113382413A (en) * 2021-06-07 2021-09-10 西安电子科技大学 Intelligent unmanned equipment networking anomaly detection method and system based on machine learning

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100318348A1 (en) * 2002-05-20 2010-12-16 Microsoft Corporation Applying a structured language model to information extraction
US20160217124A1 (en) * 2015-01-23 2016-07-28 Microsoft Technology Licensing, Llc Methods for understanding incomplete natural language query
CN105975994A (en) * 2016-05-19 2016-09-28 西安电子科技大学 SAR target discrimination method based on non-similarity transformation A-type SVM model
CN106407905A (en) * 2016-08-31 2017-02-15 电子科技大学 Machine learning-based wireless sensing motion identification method
US20170160752A1 (en) * 2015-12-08 2017-06-08 International Business Machines Corporation System and method to operate a drone
CN107506783A (en) * 2017-07-07 2017-12-22 广东科学技术职业学院 A kind of COMPLEX MIXED intrusion detection algorithm
WO2018039644A1 (en) * 2016-08-25 2018-03-01 Purdue Research Foundation System and method for controlling a self-guided vehicle
CN108600195A (en) * 2018-04-04 2018-09-28 国家计算机网络与信息安全管理中心 A kind of quick reverse estimating method of industry control protocol format based on incremental learning
US10095774B1 (en) * 2017-05-12 2018-10-09 International Business Machines Corporation Cluster evaluation in unsupervised learning of continuous data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100318348A1 (en) * 2002-05-20 2010-12-16 Microsoft Corporation Applying a structured language model to information extraction
US20160217124A1 (en) * 2015-01-23 2016-07-28 Microsoft Technology Licensing, Llc Methods for understanding incomplete natural language query
US20170160752A1 (en) * 2015-12-08 2017-06-08 International Business Machines Corporation System and method to operate a drone
CN105975994A (en) * 2016-05-19 2016-09-28 西安电子科技大学 SAR target discrimination method based on non-similarity transformation A-type SVM model
WO2018039644A1 (en) * 2016-08-25 2018-03-01 Purdue Research Foundation System and method for controlling a self-guided vehicle
CN106407905A (en) * 2016-08-31 2017-02-15 电子科技大学 Machine learning-based wireless sensing motion identification method
US10095774B1 (en) * 2017-05-12 2018-10-09 International Business Machines Corporation Cluster evaluation in unsupervised learning of continuous data
CN107506783A (en) * 2017-07-07 2017-12-22 广东科学技术职业学院 A kind of COMPLEX MIXED intrusion detection algorithm
CN108600195A (en) * 2018-04-04 2018-09-28 国家计算机网络与信息安全管理中心 A kind of quick reverse estimating method of industry control protocol format based on incremental learning

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
JI, RAN,ECT.: "Automatic protocol reverse engineering from network", 《WEB OF SCIENCE》 *
伍忠清: "小型无人机系统通信协议逆向分析", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 *
刘义等: "基于One_class_SVM的网络时间隐蔽信道检测方法", 《计算机与现代化》 *
吴礼发等: "网络协议逆向分析及应用", 《国防工业出版社》 *
徐浩文: "无人机测控的未知协议逆向分析方法研究", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 *
李战春: "入侵检测中的机器学习方法及其应用研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113014578A (en) * 2021-02-24 2021-06-22 西安超越申泰信息科技有限公司 Fragment message detection method based on convolutional neural network and storage medium
CN113382413A (en) * 2021-06-07 2021-09-10 西安电子科技大学 Intelligent unmanned equipment networking anomaly detection method and system based on machine learning
CN113382413B (en) * 2021-06-07 2022-09-27 西安电子科技大学 Intelligent unmanned equipment networking anomaly detection method and system based on machine learning

Also Published As

Publication number Publication date
CN109885092B (en) 2020-10-13

Similar Documents

Publication Publication Date Title
Wang et al. Intrusion detection methods based on integrated deep learning model
CN109886167B (en) A method and device for occluding face recognition
Wang et al. Transferring rich feature hierarchies for robust visual tracking
EP3686779B1 (en) Method and device for attention-based lane detection without post-processing by using lane mask and testing method and testing device using the same
JP6484333B2 (en) Intelligent scoring method and system for descriptive problems
CN109740676B (en) Object detection and migration method based on similar targets
CN110879881B (en) Mouse Track Recognition Method Based on Feature Group Hierarchy and Semi-Supervised Random Forest
CN110046085B (en) Method and device for identifying application program control displayed on terminal equipment
Zhou et al. Icdar 2015 text reading in the wild competition
CN110705693A (en) Unmanned aerial vehicle abnormal behavior recognition module and recognition method thereof
CN109885092A (en) A method for identifying UAV flight control data
Khan et al. TransLearn-YOLOx: Improved-YOLO with transfer learning for fast and accurate multiclass UAV detection
CN110288079A (en) Characteristic acquisition methods, device and equipment
Zhang et al. A machine vision-based character recognition system for suspension insulator iron caps
CN101655911A (en) Mode identification method based on immune antibody network
CN108960013A (en) A kind of pedestrian recognition methods and device again
CN109902730B (en) Detection method for broken strands in transmission lines based on deep learning
CN116051960A (en) Recognition method of UAV swarm flight behavior based on deep learning
Ambesh et al. Drone detection using yolov4 and amazon rekognition
Yang et al. Scenario-guided transformer-enabled multi-modal unknown event classification for air transport
Hajimohammadi et al. Comparing different versions of YOLO for license plate detection and recognition
CN115909435A (en) Face detection method, face detection device, electronic equipment and storage medium
Rondón et al. Real-Time Detection and Clasification System of Biosecurity Elements Using Haar Cascade Classifier with Open Source
Tian et al. Learning the state space based on flying pattern for bird detection
Pinto et al. Analysis and Deployment of an OCR—SSD Deep Learning Technique for Real-Time Active Car Tracking and Positioning on a Quadrotor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant