{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T05:29:04Z","timestamp":1772170144614,"version":"3.50.1"},"reference-count":125,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2023YFB2703800"],"award-info":[{"award-number":["2023YFB2703800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["U22B2027, 62172297, U2468204"],"award-info":[{"award-number":["U22B2027, 62172297, U2468204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hainan Province Science and Technology Special Fund","award":["ZDYF2024GXJS008"],"award-info":[{"award-number":["ZDYF2024GXJS008"]}]},{"name":"Guangxi Science and Technology Plan Project","award":["AD23026096 (Application Number 2022AC20001)"],"award-info":[{"award-number":["AD23026096 (Application Number 2022AC20001)"]}]},{"name":"Xinjiang Corps \u201cTianchi Talent\u201d Introduction Program, and the Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>A UAV (Unmanned Aerial Vehicle), also commonly known as a drone, has a wide range of application scenarios and cutting-edge capabilities. Thanks to increasingly sophisticated software and hardware, algorithm, and system integration design, the comparatively tiny vehicle can now fully exploit its advantages in almost every field, which will continue to mature. Nonetheless, UAVs have revealed their particular vulnerability under the threat of sundry hostile attacks, which threaten the confidentiality, integrity, and availability of the system. To protect the confidentiality and integrity of UAVs, some researchers have found that Trusted Execution Environment (TEE) is a potential solution, which provides an independent processing environment for secure storage and computing. As the practice of fitting UAVs with TEE grows in popularity, legislation is beginning to acknowledge their capabilities and offer them special licenses. Some well-known companies, such as Dajiang Innovation and Qualcomm, have also adopted TEE on their UAV products to enhance security. In order to figure out what meaningful role TEE can play in this scenario, we conduct several investigations and attempt to draw inspiration from them. We first go over the most recent reviews of UAV security and privacy issues, so as to examine the confidentiality and integrity requirements. Then, we review the existing works for UAV confidentiality and integrity protection integrated with TEE in detail and further propose a taxonomy. We also examine the benefits, security issues, and prospects of TEE. After conducting a gap analysis, we offer some recommendations for potential future courses of action.<\/jats:p>","DOI":"10.1145\/3763788","type":"journal-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T11:37:41Z","timestamp":1756208261000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Escorting the Confidentiality and Integrity of UAVs: What Exactly Can Trusted Execution Environment Offer?"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7475-3169","authenticated-orcid":false,"given":"Wenyu","family":"Dong","sequence":"first","affiliation":[{"name":"Tianjin University","place":["Tianjin, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8701-3944","authenticated-orcid":false,"given":"Guangquan","family":"Xu","sequence":"additional","affiliation":[{"name":"Tianjin University","place":["Tianjin, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7720-7165","authenticated-orcid":false,"given":"Shicheng","family":"Feng","sequence":"additional","affiliation":[{"name":"Tianjin University","place":["Tianjin, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6298-3327","authenticated-orcid":false,"given":"Hongpeng","family":"Bai","sequence":"additional","affiliation":[{"name":"Tianjin University","place":["Tianjin, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3326-4147","authenticated-orcid":false,"given":"Michael","family":"Sheng","sequence":"additional","affiliation":[{"name":"Macquarie University","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2572-2355","authenticated-orcid":false,"given":"Xi","family":"Zheng","sequence":"additional","affiliation":[{"name":"Macquarie University","place":["Sydney, Australia"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"e_1_3_3_2_2","volume-title":"Proceedings of the NDSS","author":"Abera Tigist","year":"2019","unstructured":"Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data integrity attestation for resilient collaboration of autonomous systems. In Proceedings of the NDSS."},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3114266"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"e_1_3_3_5_2","unstructured":"ARM. 2008. ARM TrustZone Security Whitepaper. (2008). Retrieved 06 September 2025 from https:\/\/developer.arm.com\/documentation\/PRD29-GENC-009492\/latest\/"},{"key":"e_1_3_3_6_2","unstructured":"ARM. 2020. TF-M platforms. (2020). Retrieved 06 September 2025 from https:\/\/www.trustedfirmware.org\/projects\/tf-m\/"},{"issue":"4","key":"e_1_3_3_7_2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOMSTD.0001.2100012","article-title":"Leveraging blockchain for secure drone-to-everything communications","volume":"5","author":"Aujla Gagangeet Singh","year":"2021","unstructured":"Gagangeet Singh Aujla, Sahil Vashisht, Sahil Garg, Neeraj Kumar, and Georges Kaddoum. 2021. Leveraging blockchain for secure drone-to-everything communications. IEEE Communications Standards Magazine 5, 4 (2021), 80\u201387.","journal-title":"IEEE Communications Standards Magazine"},{"key":"e_1_3_3_8_2","first-page":"1073","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Bahmani Raad","year":"2021","unstructured":"Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. \\(\\lbrace\\) CURE \\(\\rbrace\\) : A security architecture with \\(\\lbrace\\) CUstomizable \\(\\rbrace\\) and resilient enclaves. In Proceedings of the 30th USENIX Security Symposium. 1073\u20131090."},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417858"},{"key":"e_1_3_3_10_2","first-page":"71","volume-title":"Proceedings of the 19th International Conference on Ad-Hoc Networks and Wireless, Bari, Italy","author":"Boccadoro Pietro","year":"2020","unstructured":"Pietro Boccadoro, Alessandro Santorsola, and Luigi Alfredo Grieco. 2020. A dual-stack communication system for the internet of drones. In Proceedings of the 19th International Conference on Ad-Hoc Networks and Wireless, Bari, Italy. Springer, 71\u201383."},{"key":"e_1_3_3_11_2","volume-title":"Proceedings of the NDSS","author":"Brasser Ferdinand","year":"2019","unstructured":"Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2019. SANCTUARY: ARMing TrustZone with user-space enclaves. In Proceedings of the NDSS."},{"key":"e_1_3_3_12_2","first-page":"2261","volume-title":"Proceedings of the 31st USENIX Security Symposium","author":"Cerdeira David","year":"2022","unstructured":"David Cerdeira, Jos\u00e9 Martins, Nuno Santos, and Sandro Pinto. 2022. \\(\\lbrace\\) ReZone \\(\\rbrace\\) : Disarming \\(\\lbrace\\) TrustZone \\(\\rbrace\\) with \\(\\lbrace\\) TEE \\(\\rbrace\\) privilege reduction. In Proceedings of the 31st USENIX Security Symposium. 2261\u20132279."},{"key":"e_1_3_3_13_2","doi-asserted-by":"crossref","first-page":"1416","DOI":"10.1109\/SP40000.2020.00061","volume-title":"Proceedings of the 2020 IEEE Symposium on Security and Privacy","author":"Cerdeira David","year":"2020","unstructured":"David Cerdeira, Nuno Santos, Pedro Fonseca, and Sandro Pinto. 2020. SoK: Understanding the prevailing security vulnerabilities in TrustZone-assisted TEE systems. In Proceedings of the 2020 IEEE Symposium on Security and Privacy. 1416\u20131432."},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","unstructured":"Ozlem Ceviz Sevil Sen and Pinar Sadioglu. 2024. A survey of security in UAVs and FANETs: Issues threats analysis of attacks and solutions. IEEE Communications Surveys & Tutorials (2024) 1\u20131. DOI:10.1109\/COMST.2024.3515051","DOI":"10.1109\/COMST.2024.3515051"},{"key":"e_1_3_3_15_2","unstructured":"Alibaba Cloud. 2019. About Alibaba Cloud Link TEE. (2019). Retrieved 06 September 2025 from https:\/\/developer.aliyun.com\/article\/691901"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2935201"},{"key":"e_1_3_3_17_2","unstructured":"Decent Cybersecurity. 2024. Trusted Execution Environments (TEE) in Drones: Securing the Skies. (2024). Retrieved 06 September 2025 from https:\/\/decentcybersecurity.eu\/trusted-execution-environments-tee-in-drones-securing-the-skies\/"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560627"},{"key":"e_1_3_3_19_2","first-page":"323","volume-title":"Proceedings of the International Symposium on Intelligent and Distributed Computing","author":"Desnitsky Vasily","year":"2019","unstructured":"Vasily Desnitsky, Nikolay Rudavin, and Igor Kotenko. 2019. Modeling and evaluation of battery depletion attacks on unmanned aerial vehicles in crisis management systems. In Proceedings of the International Symposium on Intelligent and Distributed Computing. Springer, 323\u2013332."},{"key":"e_1_3_3_20_2","unstructured":"DJI. 2022. A DJI Technology White Paper V2.0. (2022). Retrieved 06 September 2025 from https:\/\/www.dji.com\/trust-center\/resource\/white-paper"},{"key":"e_1_3_3_21_2","unstructured":"Viktor Edstr\u00f6m and Eldar Zeynalli. 2020. Penetration testing a civilian drone: Reverse engineering software in search for security vulnerabilities. KTH Royal Institute of Technology. Retrieved 06 September 2025 from https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:kth:diva-280096"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3456631"},{"key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-94-007-5170-5_1","volume-title":"Proceedings of the European Data Protection: Coming of Age","author":"Finn Rachel L.","year":"2013","unstructured":"Rachel L. Finn, David Wright, and Michael Friedewald. 2013. Seven types of privacy. In Proceedings of the European Data Protection: Coming of Age. Springer, 3\u201332."},{"issue":"6","key":"e_1_3_3_24_2","doi-asserted-by":"crossref","first-page":"908","DOI":"10.3390\/rs10060908","article-title":"Issues in unmanned aerial systems (UAS) data collection of complex forest environments","volume":"10","author":"Fraser Benjamin T.","year":"2018","unstructured":"Benjamin T. Fraser and Russell G. Congalton. 2018. Issues in unmanned aerial systems (UAS) data collection of complex forest environments. Remote Sensing 10, 6 (2018), 908.","journal-title":"Remote Sensing"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102344"},{"key":"e_1_3_3_26_2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-030-66626-2_8","volume-title":"Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering","author":"Garikipati Ganeshsai","year":"2020","unstructured":"Ganeshsai Garikipati, Anish Mathuria, and Priyanka Singh. 2020. HEDrone: Privacy-preserving proof-of-alibi for drone compliance based on homomorphic encryption. In Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, 147\u2013166."},{"key":"e_1_3_3_27_2","unstructured":"GlobalPlatform. 2022. TEE system architecture. (2011). Retrieved 06 September 2025 from http:\/\/globalplatform.org\/specs-library\/tee-system-architecture\/"},{"key":"e_1_3_3_28_2","unstructured":"GlobalPlatform. 2018. GlobalPlatform TEE spec adoption to reach 10 billion. (2018). Retrieved 06 September 2025 from https:\/\/globalplatform.org\/latest-news\/globalplatform-tee-spec-adoption-to-reach-10-billion\/"},{"key":"e_1_3_3_29_2","volume-title":"Cybersecurity of Unmanned Aircraft Systems","author":"Gomez Cesar A","year":"2015","unstructured":"Cesar A Gomez. 2015. Cybersecurity of Unmanned Aircraft Systems. Ph.D. Dissertation. Utica College."},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2495297"},{"key":"e_1_3_3_31_2","article-title":"Review of unmanned aircraft system (UAS)","volume":"2","author":"Gupta Suraj G.","year":"2013","unstructured":"Suraj G. Gupta, Dr Ghonge, and Pradip M. Jawandhiya. 2013. Review of unmanned aircraft system (UAS). International Journal of Advanced Research in Computer Engineering and Technology 2, 4 (2013), 1646\u20131658.","journal-title":"International Journal of Advanced Research in Computer Engineering and Technology"},{"key":"e_1_3_3_32_2","first-page":"1","volume-title":"Proceedings of the ICC 2019-2019 IEEE International Conference on Communications","author":"Hammami Seif Eddine","year":"2019","unstructured":"Seif Eddine Hammami, Hossam Afifi, Hassine Moungla, and Ahmed Kamel. 2019. Drone-assisted cellular networks: A multi-agent reinforcement learning approach. In Proceedings of the ICC 2019-2019 IEEE International Conference on Communications. IEEE, 1\u20136."},{"key":"e_1_3_3_33_2","unstructured":"Pebo Hamza and Ahmmad Qassim. 2021. How secure are drones?: A security analysis of a drone system. KTH Royal Institute of Technology. Retrieved 06 September 2025 from https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:kth:diva-304342"},{"issue":"1","key":"e_1_3_3_34_2","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MNET.011.2000151","article-title":"Emerging drone trends for blockchain-based 5G networks: Open issues and future perspectives","volume":"35","author":"Han Tao","year":"2021","unstructured":"Tao Han, Igor de L. Ribeiro, Naercio Magaia, Jo\u00e4o Preto, Afonso H. Fontes N. Segundo, Ant\u00f4nio Roberto L. de Mac\u00eado, Khan Muhammad, and Victor Hugo C. de Albuquerque. 2021. Emerging drone trends for blockchain-based 5G networks: Open issues and future perspectives. IEEE Network 35, 1 (2021), 38\u201343.","journal-title":"IEEE Network"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3097916"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600073WC"},{"key":"e_1_3_3_37_2","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1109\/MILCOM.2016.7795496","volume-title":"Proceedings of the MILCOM 2016-2016 IEEE Military Communications Conference","author":"Hooper Michael","year":"2016","unstructured":"Michael Hooper, Yifan Tian, Runxuan Zhou, Bin Cao, Adrian P. Lauf, Lanier Watkins, William H. Robinson, and Wlajimir Alexis. 2016. Securing commercial WiFi-based UAVs from common security attacks. In Proceedings of the MILCOM 2016-2016 IEEE Military Communications Conference. IEEE, 1213\u20131218."},{"key":"e_1_3_3_38_2","first-page":"109","volume-title":"Proceedings of the 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.","author":"Hossain Mahmud","year":"2017","unstructured":"Mahmud Hossain, Shahid Noor, and Ragib Hasan. 2017. HSC-IoT: A hardware and software co-verification based authentication scheme for Internet of Things. In Proceedings of the 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.IEEE, 109\u2013116."},{"key":"e_1_3_3_39_2","unstructured":"Vincent C. Hu David Ferraiolo and D. Richard Kuhn. 2006. Assessment of access control systems. US Department of Commerce National Institute of Standards and Technology 76 (2006)."},{"key":"e_1_3_3_40_2","volume-title":"Unmanned Aerial Systems","year":"2011","unstructured":"ICAO. 2011. Unmanned Aerial Systems. Technical Report. Cir 328 AN\/190."},{"key":"e_1_3_3_41_2","first-page":"96","volume-title":"Proceedings of the 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications","author":"Imam Zineeddine Ould","year":"2021","unstructured":"Zineeddine Ould Imam, Marc Lacoste, and Ghada Arfaoui. 2021. Towards a modular attestation framework for flexible data protection for drone systems. In Proceedings of the 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications. IEEE, 96\u2013102."},{"key":"e_1_3_3_42_2","volume-title":"Intel Software Guard Extensions Sdk","year":"2016","unstructured":"Intel. 2016. Intel Software Guard Extensions Sdk. Technical Report. Retrieved 06 September 2025 from https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/overview.html"},{"key":"e_1_3_3_43_2","unstructured":"Intel. 2023. Trust domain extensions (Intel TDX). (2023). Retrieved 06 September 2025 from https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/trust-domain-extensions\/overview.html?wapkw=Intel%20TDX"},{"key":"e_1_3_3_44_2","first-page":"0759","volume-title":"Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference","author":"Iqbal Shahrear","year":"2021","unstructured":"Shahrear Iqbal. 2021. A study on UAV operating system security and future research challenges. In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference. IEEE, 0759\u20130765."},{"key":"e_1_3_3_45_2","first-page":"228","volume-title":"Proceedings of the 2019 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications","author":"Islam Md Shihabul","year":"2019","unstructured":"Md Shihabul Islam, Harsh Verma, Latifur Khan, and Murat Kantarcioglu. 2019. Secure real-time heterogeneous iot data management system. In Proceedings of the 2019 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications. IEEE, 228\u2013235."},{"key":"e_1_3_3_46_2","first-page":"1","volume-title":"Proceedings of the 2019 Integrated Communications, Navigation and Surveillance Conference","author":"Ivancic William D.","year":"2019","unstructured":"William D. Ivancic, Robert J. Kerczewski, Robert W. Murawski, Konstantin Matheou, and Alan N Downey. 2019. Flying drones beyond visual line of sight using 4g LTE: Issues and concerns. In Proceedings of the 2019 Integrated Communications, Navigation and Surveillance Conference. IEEE, 1\u201313."},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"e_1_3_3_48_2","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/THS.2012.6459914","volume-title":"Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security","author":"Javaid Ahmad Y.","year":"2012","unstructured":"Ahmad Y. Javaid, Weiqing Sun, Vijay K. Devabhaktuni, and Mansoor Alam. 2012. Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security. IEEE, 585\u2013590."},{"key":"e_1_3_3_49_2","first-page":"540","volume-title":"Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","author":"Jeong Eunseon","year":"2019","unstructured":"Eunseon Jeong, Junyoung Park, Byeonggeun Son, Myoungsu Kim, and Kangbin Yim. 2019. Study on signature verification process for the firmware of an android platform. In Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, 540\u2013545."},{"key":"e_1_3_3_50_2","unstructured":"Liang Kai. 2019. Guard your data with the qualcomm snapdragon mobile platform. (2023). Retrieved 06 September 2025 from https:\/\/www.qualcomm.com\/media\/documents\/files\/guard-your-data-with-the-qualcomm-snapdragon-mobile-platform.pdf"},{"issue":"2","key":"e_1_3_3_51_2","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.1109\/TII.2022.3170348","article-title":"Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things","volume":"19","author":"Kalapaaking Aditya Pribadi","year":"2022","unstructured":"Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, and Mahathir Almashor. 2022. Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things. IEEE Transactions on Industrial Informatics 19, 2 (2022), 1703\u20131714.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_3_52_2","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/RED-UAS.2017.8101648","volume-title":"Proceedings of the 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems","author":"Kapitonov Aleksandr","year":"2017","unstructured":"Aleksandr Kapitonov, Sergey Lonshakov, Aleksandr Krupenkin, and Ivan Berman. 2017. Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs. In Proceedings of the 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems. IEEE, 84\u201389."},{"issue":"4","key":"e_1_3_3_53_2","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1007\/s10712-019-09529-9","article-title":"New opportunities for forest remote sensing through ultra-high-density drone lidar","volume":"40","author":"Kellner James R.","year":"2019","unstructured":"James R. Kellner, John Armston, Markus Birrer, KC Cushman, Laura Duncanson, Christoph Eck, Christoph Falleger, Benedikt Imbach, Kamil Kr\u00e1l, Martin Kr\u016d\u010dek, et\u00a0al. 2019. New opportunities for forest remote sensing through ultra-high-density drone lidar. Surveys in Geophysics 40, 4 (2019), 959\u2013977.","journal-title":"Surveys in Geophysics"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_3_55_2","doi-asserted-by":"crossref","first-page":"102628","DOI":"10.1016\/j.cose.2022.102628","article-title":"Vulnerability analysis of qualcomm secure execution environment (QSEE)","author":"Khalid Fatima","year":"2022","unstructured":"Fatima Khalid and Ammar Masood. 2022. Vulnerability analysis of qualcomm secure execution environment (QSEE). Computers and Security 116, 5 (2022), 102628.","journal-title":"Computers and Security"},{"key":"e_1_3_3_56_2","first-page":"364","volume-title":"Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies","author":"Kharchenko Vyacheslav","year":"2018","unstructured":"Vyacheslav Kharchenko and Volodymyr Torianyk. 2018. Cybersecurity of the internet of drones: Vulnerabilities analysis and imeca based assessment. In Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies. IEEE, 364\u2013369."},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008354106356"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"e_1_3_3_59_2","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1109\/GLOCOMW.2013.6825193","volume-title":"Proceedings of the 2013 IEEE Globecom Workshops","author":"Li Jun","year":"2013","unstructured":"Jun Li, Yifeng Zhou, and Louise Lamont. 2013. Communication architectures and protocols for networking unmanned aerial vehicles. In Proceedings of the 2013 IEEE Globecom Workshops. IEEE, 1415\u20131420."},{"key":"e_1_3_3_60_2","first-page":"75","volume-title":"Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services","author":"Li Wenhao","year":"2015","unstructured":"Wenhao Li, Haibo Li, Haibo Chen, and Yubin Xia. 2015. Adattester: Secure online mobile advertisement attestation using trustzone. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. 75\u201388."},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"issue":"12","key":"e_1_3_3_63_2","first-page":"3268","article-title":"Extending on-chain trust to off-chain\u2013trustworthy blockchain data collection using trusted execution environment (tee)","volume":"71","author":"Liu Chunchi","year":"2022","unstructured":"Chunchi Liu, Hechuan Guo, Minghui Xu, Shengling Wang, Dongxiao Yu, Jiguo Yu, and Xiuzhen Cheng. 2022. Extending on-chain trust to off-chain\u2013trustworthy blockchain data collection using trusted execution environment (tee). IEEE Transactions on Computers 71, 12 (2022), 3268\u20133280.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_3_64_2","first-page":"1","volume-title":"Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications","author":"Liu Renju","year":"2017","unstructured":"Renju Liu and Mani Srivastava. 2017. Protc: Protecting drone\u2019s peripherals through arm trustzone. In Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications. 1\u20136."},{"key":"e_1_3_3_65_2","first-page":"683","volume-title":"Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications","author":"Liu Tianyuan","year":"2020","unstructured":"Tianyuan Liu, Hongpeng Guo, Claudiu Danilov, and Klara Nahrstedt. 2020. A privacy-preserving data collection and processing framework for third-party UAV services. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 683\u2013690."},{"key":"e_1_3_3_66_2","first-page":"841","volume-title":"Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems","author":"Liu Tianyuan","year":"2018","unstructured":"Tianyuan Liu, Avesta Hojjati, Adam Bates, and Klara Nahrstedt. 2018. Alidrone: Enabling trustworthy proof-of-alibi for commercial drone compliance. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems. IEEE, 841\u2013852."},{"key":"e_1_3_3_67_2","article-title":"Multi-agent actor-critic for mixed cooperative-competitive environments","volume":"30","author":"Lowe Ryan","year":"2017","unstructured":"Ryan Lowe, Yi I Wu, Aviv Tamar, Jean Harb, OpenAI Pieter Abbeel, and Igor Mordatch. 2017. Multi-agent actor-critic for mixed cooperative-competitive environments. Advances in Neural Information Processing Systems 30, 1 (2017), 1\u201312.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_68_2","first-page":"216b\u2013216b","volume-title":"Proceedings of the 2007 40th Annual Hawaii International Conference on System Sciences","author":"Lui Siu Man","year":"2007","unstructured":"Siu Man Lui and Ling Qiu. 2007. Individual privacy and organizational privacy in business analytics. In Proceedings of the 2007 40th Annual Hawaii International Conference on System Sciences. IEEE, 216b\u2013216b."},{"key":"e_1_3_3_69_2","article-title":"Drones hijacking","author":"Luo Aaron","year":"2016","unstructured":"Aaron Luo. 2016. Drones hijacking. DEF CON, Paris, France, Technical Report 24, 1 (2016), 46.","journal-title":"DEF CON, Paris, France, Technical Report"},{"key":"e_1_3_3_70_2","unstructured":"Thomas Holdgaard L\u00fctzen. 2017. A security framework for unmanned aerial vehicles and practical exploitation analy-sis. phdthesis. Master Thesis DTU Compute. Retrieved 06 September 2025 from https:\/\/www2.imm.dtu.dk\/pubdb\/edoc\/imm7037.pdf"},{"key":"e_1_3_3_71_2","first-page":"722","volume-title":"Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security","author":"Mansfield Katrina","year":"2013","unstructured":"Katrina Mansfield, Timothy Eveleigh, Thomas H. Holzer, and Shahryar Sarkani. 2013. Unmanned aerial vehicle smart device ground control station cyber security threat model. In Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security. IEEE, 722\u2013728."},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3252565"},{"key":"e_1_3_3_73_2","unstructured":"MarketsAndMarkets. 2018. Unmanned aerial vehicle(UAV) market. (2018). Retrieved 06 September 2025 from https:\/\/www.marketsandmarkets.com\/Market-Reports\/unmanned-aerial-vehicles-uav-market-662.html"},{"key":"e_1_3_3_74_2","first-page":"1","article-title":"Reinforcement learning-based security\/safety uav system for intrusion detection under dynamic and uncertain target movement","author":"Masadeh Ala\u2019eddin","year":"2022","unstructured":"Ala\u2019eddin Masadeh, Mohannad Alhafnawi, Haythem A. Bany Salameh, Ahmed Musa, and Yaser Jararweh. 2022. Reinforcement learning-based security\/safety uav system for intrusion detection under dynamic and uncertain target movement. IEEE Transactions on Engineering Management 71, 1 (2022), 1\u201311.","journal-title":"IEEE Transactions on Engineering Management"},{"key":"e_1_3_3_75_2","unstructured":"MAVLINK. 2020. Mavlink. (2020). Retrieved 06 September 2025 from https:\/\/mavlink.io\/en\/"},{"key":"e_1_3_3_76_2","article-title":"Drones and aerial surveillance: Considerations for legislators","author":"McNeal Gregory S.","year":"2014","unstructured":"Gregory S. McNeal. 2014. Drones and aerial surveillance: Considerations for legislators. Brookings Institution: The Robots Are Coming: The Project on Civilian Robotics 2014 (2014), 34. Retrieved 06 September 2025 from https:\/\/www.brookings.edu\/articles\/drones-and-aerial-surveillance-considerations-for-legislatures\/","journal-title":"Brookings Institution: The Robots Are Coming: The Project on Civilian Robotics"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109626"},{"key":"e_1_3_3_78_2","article-title":"Drone incidents: A survey of legal cases","author":"Michel Arthur Holland","year":"2017","unstructured":"Arthur Holland Michel and Dan Gettinger. 2017. Drone incidents: A survey of legal cases. Bard College Center for Study of the Drone: Annandale-on-the-Hudson, NY, USA (2017). Retrieved 06 September 2025 from https:\/\/dronecenter.bard.edu\/drones-at-home-drone-incidents\/","journal-title":"Bard College Center for Study of the Drone: Annandale-on-the-Hudson, NY, USA"},{"key":"e_1_3_3_79_2","unstructured":"Microsoft. 2009. The STRIDE Threat Model. (2009). Retrieved 06 September 2025 from https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN"},{"key":"e_1_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3700418"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103180"},{"key":"e_1_3_3_82_2","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1109\/SP40001.2021.00005","volume-title":"Proceedings of the 2021 IEEE Symposium on Security and Privacy","author":"Nassi Ben","year":"2021","unstructured":"Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, and Yuval Elovici. 2021. SoK: Security and privacy in the age of commercial drones. In Proceedings of the 2021 IEEE Symposium on Security and Privacy. IEEE, 1434\u20131451."},{"key":"e_1_3_3_83_2","unstructured":"Alexander Nilsson Pegah Nikbakht Bideh and Joakim Brorsson. 2020. A survey of published attacks on intel SGX. ArXiv abs\/2006.13598 (2020) 1\u201311. Retrieved from https:\/\/api.semanticscholar.org\/CorpusID:219645936"},{"key":"e_1_3_3_84_2","unstructured":"Government of India. Office of the Director General of Civil Aviation. 2020. DGCA RPAS Guidance Manual. (2020). Retrieved 06 September 2025 from https:\/\/indianacademyofdrones.com\/wp-content\/uploads\/2021\/03\/DGCA-RPAS-Guidance-Manual-revised.pdf"},{"key":"e_1_3_3_85_2","article-title":"Hacking drones... overview of the main threats","volume":"4","author":"Paganini Perluigi","year":"2013","unstructured":"Perluigi Paganini. 2013. Hacking drones... overview of the main threats. General Security June 4 (2013). Retrieved 06 September 2025 from https:\/\/www.infosecinstitute.com\/resources\/hacking\/hacking-drones-overview-of-the-main-threats\/","journal-title":"General Security June"},{"key":"e_1_3_3_86_2","first-page":"01","volume-title":"Proceedings of the 2020 Asian Hardware Oriented Security and Trust Symposium.","author":"Pal Vishal","year":"2020","unstructured":"Vishal Pal, B. Srikrishna Acharya, Somesh Shrivastav, Sourav Saha, Ashish Joglekar, and Bharadwaj Amrutur. 2020. PUF based secure framework for hardware and software security of drones. In Proceedings of the 2020 Asian Hardware Oriented Security and Trust Symposium.IEEE, 01\u201306."},{"issue":"04","key":"e_1_3_3_87_2","first-page":"366","article-title":"Security scheme of UAV flight control based on attribute access control policy","volume":"51","author":"Pang Yuxiang","year":"2024","unstructured":"Yuxiang Pang and Zemao Chen. 2024. Security scheme of UAV flight control based on attribute access control policy. Computer Science 51, 04 (2024), 366\u2013372.","journal-title":"Computer Science"},{"key":"e_1_3_3_88_2","article-title":"Privadome: Delivery drones and citizen privacy","author":"Pillai Gokulnath M.","year":"2024","unstructured":"Gokulnath M. Pillai, Ajith Suresh, Eikansh Gupta, Vinod Ganapathy, and Arpita Patra. 2024. Privadome: Delivery drones and citizen privacy. Proceedings on Privacy Enhancing Technologies 2024, 2 (2024), 29\u201348.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2969326"},{"key":"e_1_3_3_91_2","unstructured":"Qualcomm. 2021. Qualcomm Flight RB5 5G Platform\u2013the world\u2019s first 5G- and AI-enabled drone platform. (2021). Retrieved 06 September 2025 from https:\/\/www.qualcomm.com\/news\/onq\/2021\/08\/qualcomm-flight-rb5-5g-platform-worlds-first-5g-and-ai-enabled-drone-platform"},{"key":"e_1_3_3_92_2","first-page":"5","volume-title":"Proceedings of the ICRA Workshop on Open Source Software","author":"Quigley Morgan","year":"2009","unstructured":"Morgan Quigley, Ken Conley, Brian Gerkey, Josh Faust, Tully Foote, Jeremy Leibs, Rob Wheeler, and Andrew Y. Ng. 2009. ROS: An open-source robot operating system. In Proceedings of the ICRA Workshop on Open Source Software. Kobe, Japan, 5."},{"key":"e_1_3_3_93_2","unstructured":"Jaak Randmets. 2021. An overview of vulnerabilities and mitigations of intel sgx applications. (2021). Retrieved 06 September 2025 from https:\/\/cyber.ee\/uploads\/D_2_116_An_Overview_of_Vulnerabilities_and_Mitigations_of_Intel_SGX_Applications_c1282b1505.pdf"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207"},{"issue":"1","key":"e_1_3_3_95_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3485272","article-title":"A security review in the UAVNet era: Threats, countermeasures, and gap analysis","volume":"55","author":"Rugo Alessio","year":"2022","unstructured":"Alessio Rugo, Claudio A. Ardagna, and Nabil El Ioini. 2022. A security review in the UAVNet era: Threats, countermeasures, and gap analysis. ACM Computing Surveys 55, 1 (2022), 1\u201335.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_3_96_2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/Trustcom.2015.357","volume-title":"Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA","author":"Sabt Mohamed","year":"2015","unstructured":"Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted execution environment: what it is, and what it is not. In Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA. IEEE, 57\u201364."},{"key":"e_1_3_3_97_2","unstructured":"Samsung. 2024. mTower. (2024). Retrieved 06 September 2025 from https:\/\/github.com\/Samsung\/mTower"},{"issue":"2020","key":"e_1_3_3_98_2","first-page":"1450","article-title":"Strengthening VM isolation with integrity protection and more","volume":"53","author":"Sev-Snp AMD","year":"2020","unstructured":"AMD Sev-Snp. 2020. Strengthening VM isolation with integrity protection and more. White Paper, January 53, 2020 (2020), 1450\u20131465.","journal-title":"White Paper, January"},{"key":"e_1_3_3_99_2","unstructured":"Noah Shachtman. 2011. Computer virus hits US drone fleet. (2011). Retrieved 06 September 2025 from https:\/\/www.wired.com\/2011\/10\/virus-hits-drone-fleet\/"},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922039"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098971"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2022121"},{"key":"e_1_3_3_103_2","first-page":"200","volume-title":"Proceedings of the 2024 23rd ACM\/IEEE International Conference on Information Processing in Sensor Networks","author":"Sun Tong","year":"2024","unstructured":"Tong Sun, Borui Li, Yixiao Teng, Yi Gao, and Wei Dong. 2024. dTEE: A declarative approach to secure IoT applications using TrustZone. In Proceedings of the 2024 23rd ACM\/IEEE International Conference on Information Processing in Sensor Networks. IEEE, 200\u2013212."},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.010"},{"issue":"3","key":"e_1_3_3_105_2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1049\/ecej:20010303","article-title":"High-altitude platforms for wireless communications","volume":"13","year":"2001","unstructured":"T_C Tozer and David Grace. 2001. High-altitude platforms for wireless communications. Electronics and Communication Engineering Journal 13, 3 (2001), 127\u2013137.","journal-title":"Electronics and Communication Engineering Journal"},{"key":"e_1_3_3_106_2","unstructured":"Trustonic. 2024. Mircochip first to use Turstonic revolutionary Kinibi-M platform for microcontrollers. (2024). Retrieved 06 September 2025 from https:\/\/www.sourcesecurity.com\/news\/mircochip-turstonic-kinibi-m-microcontrollers-co-1530084457-ga-co-1530085342-ga-npr.1530086842.html"},{"key":"e_1_3_3_107_2","doi-asserted-by":"crossref","first-page":"102894","DOI":"10.1016\/j.adhoc.2022.102894","article-title":"A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks","author":"Tsao Kai-Yun","year":"2022","unstructured":"Kai-Yun Tsao, Thomas Girdler, and Vassilios G Vassilakis. 2022. A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Networks 133, 10 (2022), 102894.","journal-title":"Ad Hoc Networks"},{"key":"e_1_3_3_108_2","unstructured":"TsinglinkCloud. 2016. Qinglian Cloud\u2019s TinyTEE. (2016). Retrieved 06 September 2025 from https:\/\/www.qinglianyun.com\/Front\/Secure\/safe"},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-6526(07)03024-6"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302370"},{"key":"e_1_3_3_111_2","first-page":"143","article-title":"Blockchain-based solutions for various security issues in UAV-enabled IoT","author":"Wakode Madhuri S.","year":"2021","unstructured":"Madhuri S. Wakode and Rajesh B. Ingle. 2021. Blockchain-based solutions for various security issues in UAV-enabled IoT. Unmanned Aerial Vehicles for Internet of Things Concepts, Techniques, and Applications 2021, 1 (2021), 143\u2013158.","journal-title":"Unmanned Aerial Vehicles for Internet of Things Concepts, Techniques, and Applications"},{"key":"e_1_3_3_112_2","first-page":"1573","volume-title":"Proceedings of the 2022 IEEE Symposium on Security and Privacy","author":"Wang Jinwen","year":"2022","unstructured":"Jinwen Wang, Ao Li, Haoran Li, Chenyang Lu, and Ning Zhang. 2022. RT-TEE: Real-time system availability for cyber-physical systems using ARM TrustZone. In Proceedings of the 2022 IEEE Symposium on Security and Privacy. IEEE Computer Society, 1573\u20131573."},{"key":"e_1_3_3_113_2","doi-asserted-by":"crossref","first-page":"2310","DOI":"10.1109\/SP54263.2024.00070","volume-title":"Proceedings of the 2024 IEEE Symposium on Security and Privacy","author":"Wang Qinying","year":"2024","unstructured":"Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, et\u00a0al. 2024. Syztrust: State-aware fuzzing on trusted os designed for iot devices. In Proceedings of the 2024 IEEE Symposium on Security and Privacy. IEEE, 2310\u20132387."},{"issue":"4","key":"e_1_3_3_114_2","doi-asserted-by":"crossref","first-page":"277","DOI":"10.23919\/ICN.2021.0018","article-title":"Blockchain-envisioned unmanned aerial vehicle communications in space-air-ground integrated network: A review","volume":"2","author":"Wang Zhonghao","year":"2021","unstructured":"Zhonghao Wang, Fulai Zhang, Qiqi Yu, and Tuanfa Qin. 2021. Blockchain-envisioned unmanned aerial vehicle communications in space-air-ground integrated network: A review. Intelligent and Converged Networks 2, 4 (2021), 277\u2013294.","journal-title":"Intelligent and Converged Networks"},{"key":"e_1_3_3_115_2","first-page":"1","article-title":"Authentication protocols for the internet of drones: Taxonomy, analysis and future directions","author":"Wazid Mohammad","year":"2018","unstructured":"Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee. 2018. Authentication protocols for the internet of drones: Taxonomy, analysis and future directions. Journal of Ambient Intelligence and Humanized Computing (2018), 1\u201310.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_3_3_116_2","first-page":"18","volume-title":"Proceedings of the 2021 8th IEEE International Conference on Cyber Security and Cloud Computing 7th IEEE International Conference on Edge Computing and Scalable Cloud","author":"Wen Xiaoqing","year":"2021","unstructured":"Xiaoqing Wen, Zhenyu Guan, Dawei Li, Hanzheng Lyu, and Huimin Li. 2021. A blockchain-based framework for information management in internet of vehicles. In Proceedings of the 2021 8th IEEE International Conference on Cyber Security and Cloud Computing 7th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE, 18\u201323."},{"issue":"3","key":"e_1_3_3_117_2","first-page":"729","article-title":"Reinforcement learning","volume":"12","author":"Wiering Marco A.","year":"2012","unstructured":"Marco A. Wiering and Martijn Van Otterlo. 2012. Reinforcement learning. Adaptation, Learning, and Optimization 12, 3 (2012), 729.","journal-title":"Adaptation, Learning, and Optimization"},{"key":"e_1_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.5555\/2960587.2960655"},{"key":"e_1_3_3_119_2","first-page":"168","volume-title":"Proceedings of the Korea Information Processing Society Conference","author":"Yoon Hyundo","year":"2019","unstructured":"Hyundo Yoon and Junbeom Hur. 2019. A survey of trusted execution environment security. In Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, 168\u2013169."},{"key":"e_1_3_3_120_2","first-page":"1","volume-title":"Proceedings of the 2019 IEEE Wireless Communications and Networking Conference","author":"Zanol Riccardo","year":"2019","unstructured":"Riccardo Zanol, Federico Chiariotti, and Andrea Zanella. 2019. Drone mapping through multi-agent reinforcement learning. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference. IEEE, 1\u20137."},{"key":"e_1_3_3_121_2","unstructured":"Leonardo Arcadio Zarza and Mariana (Traductora) R\u00edos Hudson. 2013. Unmanned aircraft systems. (2013). Retrieved 06 September 2025 from http:\/\/cefadigital.edu.ar\/handle\/1847939\/186"},{"key":"e_1_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3014788"},{"issue":"5","key":"e_1_3_3_123_2","doi-asserted-by":"crossref","first-page":"8882","DOI":"10.1109\/JIOT.2023.3321308","article-title":"PACTA: An IoT data privacy regulation compliance scheme using TEE and blockchain","volume":"11","author":"Zhang Yongxin","year":"2023","unstructured":"Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, and Bangdao Chen. 2023. PACTA: An IoT data privacy regulation compliance scheme using TEE and blockchain. IEEE Internet of Things Journal 11, 5 (2023), 8882\u20138893.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_3_124_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363205"},{"key":"e_1_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-9096-y"},{"key":"e_1_3_3_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3763788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T15:21:55Z","timestamp":1759159315000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3763788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":125,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3763788"],"URL":"https:\/\/doi.org\/10.1145\/3763788","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,29]]},"assertion":[{"value":"2023-10-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}