共 24 条
[1]
Bewley A, 2016, IEEE IMAGE PROC, P3464, DOI 10.1109/ICIP.2016.7533003
[2]
Enhancing Network-edge Connectivity and Computation Security in Drone Video Analytics
[J].
2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA,
2020,
[3]
.faa.gov, Drones by the Numbers
[4]
Goodfellow I.J., 2014, arXiv, DOI [DOI 10.1145/3422622, 10.48550/arXiv.1406.2661]
[5]
Howard A, 2019, Arxiv, DOI [arXiv:1905.02244, 10.48550/arXiv.1905.02244, DOI 10.48550/ARXIV.1905.02244]
[7]
Goodfellow IJ, 2015, Arxiv, DOI [arXiv:1412.6572, DOI 10.48550/ARXIV.1412.6572]
[8]
Juvekar C, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1651