<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>These authors contributed equally.
$ Hamed_Farkhari@iscte-iul.pt (H. Farkhari); joseanne_cristina_viana@iscte-iul.pt (J. Viana)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Accurate and Reliable Methods for 5G UAV Jamming Identification With Calibrated Uncertainty</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hamed Farkhari</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joseanne Viana</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pedro Sebastiao</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luis Bernardo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sarang Kahvazadeh</string-name>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rui Dinis</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>FCT - Universidade Nova de Lisboa</institution>
          ,
          <addr-line>Monte da Caparica, 2829-516 Caparica</addr-line>
          ,
          <country country="PT">Portugal</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>ISCTE - Instituto Universitario de Lisboa</institution>
          ,
          <addr-line>Av. das Forcas Armadas, 1649-026 Lisbon</addr-line>
          ,
          <country country="PT">Portugal</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>IT - Instituto de Telecomunicacoes</institution>
          ,
          <addr-line>Av. Rovisco Pais, 1, Torre Norte, Piso 10, 1049-001 Lisboa</addr-line>
          ,
          <country country="PT">Portugal</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>PDMFC</institution>
          ,
          <addr-line>Rua Fradesso da Silveira, n. 4, Piso 1B, 1300-609, Lisboa</addr-line>
          ,
          <country country="PT">Portugal</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Research Projects Track @ RCIS 2023: The 17th International Conference on Research Challenges in Information Science</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This research highlights the negative impact of ignoring uncertainty on DNN decision-making and Reliability. Proposed combined preprocessing and post-processing methods enhance DNN accuracy and Reliability in time-series binary classification for 5G UAV security dataset, employing ML algorithms and confidence values. Several metrics are used to evaluate the proposed hybrid algorithms. The study emphasizes the XGB classifier's unreliability and suggests the proposed methods' potential superiority over the DNN softmax layer. Furthermore, improved uncertainty calibration based on the Reliability Score metric minimizes the diference between Mean Confidence and Accuracy, enhancing accuracy and Reliability.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Unmanned Aerial Vehicle</kwd>
        <kwd>Deep Neural Networks</kwd>
        <kwd>Calibration</kwd>
        <kwd>Uncertainty</kwd>
        <kwd>Reliability</kwd>
        <kwd>Jamming Identification</kwd>
        <kwd>5G</kwd>
        <kwd>6G</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Deep Neural Networks (DNNs) have seen extensive deployment due to their recent achievements
in several fields. Prediction distributions generated by such models increasingly make decisions
in the telecommunications and security sectors [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ].
      </p>
      <p>
        For example, 6G telecommunication systems will incorporate Machine Learning (ML)
mechanisms such as DNNs into their standards [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and there are several studies on how to apply
deep learning decision-making in the physical layer [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Another promising field for DNN
applications is 5G Unmanned Aerial Vehicle (UAV) security [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. DNNs are interesting to use
due to their universal function capabilities, superior logic that allows them to solve complex
time series modeling issues, and depending on their design, the possibility to process data in
parallel. However, due to the DNN’s iterative data processing, classification applications can
provide probabilities with uncertainties in the outputs which raise concerns about the reliability
of the true correctness likelihood of its classification decisions.
      </p>
      <p>
        The authors in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] discuss the importance of calibrating DNNs in order to guarantee high
accuracy and reliable output decisions. They show at least six calibration techniques that
increase both parameters in widely recognized datasets (i.e., CIFAR-10 and ImageNet) applied
in pretrained DNNs (i.e., RestNet, WideNet, and LeNet). In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the authors justify the need to
specify the uncertainty especially in critical real-world settings, in which the input distribution
deviates from the training distribution because of sample bias and non-stationarity.
      </p>
      <p>
        Understanding questions of risk, uncertainty, and trust in a model’s output becomes
increasingly important when augmented techniques are used at the original data preprocessing stage.
The authors in [8] suggest that prepossessing and post-processing techniques can improve 
inputs and  class DNNs. The authors in [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ] also propose methods that increase accuracy
while reducing uncertainty in classification tasks and mathematical approaches to calculate the
Expected Calibration Error (ECE), the Maximum Calibration Error (MCE), and estimate if the
DNN is over-confident or under-confident.
      </p>
      <p>Inspired by the possibility of choosing a tolerable degree of uncertainty and increasing the
reliability of DNN outputs used in 5G UAV security, this study presents several new combined
prepossessing and post-processing techniques that increase the overall accuracy and reliability
of binary classification deep networks by adjusting the uncertainty. We assess these methods
using seven key performance metrics related to errors in calibration and in confidence values.
Then, we utilize the Reliability Score (RS) that measures the diference between the Mean
Accuracy (MA) and Mean Confidence (MC) to measure the degree of uncertainty. Finally, we
evaluate the proposed algorithms’ impact on the DNN’s performance compared to the baseline
DNN with no algorithms applied and the DNN added to the eXtreme Gradient Boosting (XGB)
classifier. The XGB classifier is selected because of its superior accuracy in comparison to five
other classifiers we test with our data [9].</p>
    </sec>
    <sec id="sec-2">
      <title>2. System Model</title>
      <sec id="sec-2-1">
        <title>2.1. Dataset and Methods</title>
        <sec id="sec-2-1-1">
          <title>Dataset</title>
          <p>Our dataset contains data from the Received Signal Strength Indicator (RSSI) and the Signal
to Interference-plus-Noise Ratio (SINR) measurements collected when an authenticated UAV
is connected in the small cell through the 5G communication system, and there are power
attacks from other UAVs in the network. There are other terrestrial users connected to the
network. The measured parameters in the authenticated UAV change as the interference from
the other devices increases or decreases. More details on the dataset construction and one
possible application for the dataset is available in [10] and in [11].</p>
          <p>We apply this method on the probabilistic outputs of the DNN for all the augmented samples.
Each output is in the one hot encoding form for binary classification. For example, [, 1 −  ] in
which  is a number between zero and one.</p>
          <p>In Method 2, we convert outputs from a probabilistic to an integer form and apply a majority
voting algorithm to them.</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>Method 1</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>Method 2</title>
        </sec>
        <sec id="sec-2-1-4">
          <title>Method 3</title>
          <p>Method 3 calculates the confidence of each output. The output with the maximum confidence
value is selected as the final result.</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Evaluation Metrics</title>
        <p>
          We use well-known metrics proposed by [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] to measure the model’s uncertainty, accuracy, and
quality to compare method improvements with each other. These metrics are explained below:
        </p>
        <p>Accuracy per Confidence. This metric is used in its visual form to analyze the calibration
and uncertainty of the DNN model.</p>
        <p>Mean Confidence and Mean Accuracy. These two metrics are the total weighted average
of confidence and accuracy for the number of samples per each confidence interval.</p>
        <p>Reliability Score. We define the diference between the MC and MA values by another
metric which is denominated the Reliability Score.</p>
        <p>Expected and Maximum Calibration Errors. At each confidence interval, the accuracy
deviation away from the confidence interval center is considered as the error per each interval.
The Expected Calibration Error is defined as the weighted error and the Maximum Calibration
Error describes the maximum error per all intervals.</p>
        <p>Negative LogLikelihood Loss (NLL). This metric is known as cross-entropy loss and is
used as a loss function for DNNs [12]. It is also utilized as a metric to measure the quality of the
probabilistic model [13].</p>
        <p>Brier Score Loss (BSL). This metric is defined by the square error of the predicted probability
vector and ground truth values in one hot encoding form.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Experimental Results</title>
      <p>In this section, we present the simulations results. We compare the results of the DNN using
each of the five prospective methods to the results of the DNN with no method and the DNN
with the XGB. We choose XGB because it is the best performing publicly available classifier
applied to our dataset in terms of accuracy [11]. We use the Accuracy vs the Confidence Intervals
Central Values and we evaluate the performance of each algorithm using the seven metrics
previously mentioned in subsection 2.2.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>It is expected to have ML mechanisms in 5G and 6G UAV communication systems. Therefore, it
is fundamental to understand the uncertainties of the deep networks used in those systems and
how reliable they are. In this study, we proposed five combined methods to increase accuracy
and reliability concomitantly in binary classification deep networks applied to UAV security
scenarios. By analyzing seven reliability metrics and the accuracy per confidence, Method 1
combined with Method 3 presented the best overall performance that satisfied most of the
metrics by achieving the top three in each one. This algorithm reached an ECE of 2.19 and was
closer to all ideal levels’ values.</p>
      <p>Method 3 was the second-best performing algorithm in terms of reliability. With Method
2 + XGB, we showed that a lower performing ML algorithm can be combined with one of the
proposed methods to increase the total DNN accuracy, but in terms of the reliability, this might
not be a good option.</p>
      <p>Finally, four of the five methods presented were able to increase accuracy, but not all of
them increased the reliability. As a result, network engineers and developers must take extra
precaution when proposing DNN architectures and analyze them in terms of accuracy and
reliability.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgment</title>
      <p>This research received funding from the European Union’s Horizon 2020 research and innovation
programme under the Marie Sklodowska-Curie Project Number 813391. Also, this work was
partially supported by Fundação para a Ciência e a Tecnologia and Instituto de Telecomunicações
under Project UIDB/50008/2020.
[8] D. Hafner, D. Tran, T. P. Lillicrap, A. Irpan, J. Davidson, Noise contrastive priors for
functional uncertainty, in: Conference on Uncertainty in Artificial Intelligence, 2018.
[9] J. Viana, H. Farkhari, P. Sebastiao, L. M. Campos, K. Koutlia, B. Bojovic, S. Lagen, R. Dinis,
Deep attention recognition for attack identification in 5g uav scenarios: Novel architecture
and end-to-end evaluation, 2023. arXiv:2303.12947.
[10] J. Viana, H. Farkhari, P. Sebastiao, S. Lagen, K. Koutlia, B. Bojovic, R. Dinis, A
synthetic dataset for 5g uav attacks based on observable network parameters, 2022.
arXiv:2211.09706.
[11] J. Viana, H. Farkhari, L. M. Campos, P. Sebastião, K. Koutlia, S. Lagén, L. Bernardo, R. Dinis,
A convolutional attention based deep learning solution for 5g uav network attack
recognition over fading channels and interference, in: 2022 IEEE 96th Vehicular Technology
Conference (VTC2022-Fall), 2022, pp. 1–5. doi:10.1109/VTC2022-Fall57202.2022.
10012726.
[12] T. Hastie, R. Tibshirani, J. Friedman, The Elements of Statistical Learning: Data Mining,</p>
      <p>Inference, and Prediction, Springer series in statistics, Springer, 2009.
[13] M. P. Naeini, G. F. Cooper, M. Hauskrecht, Obtaining well calibrated probabilities using
bayesian binning, in: Proceedings of the Twenty-Ninth AAAI Conference on Artificial
Intelligence, AAAI’15, AAAI Press, 2015, p. 2901–2907.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>X.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <article-title>An overview of 5g advanced evolution in 3gpp release 18</article-title>
          ,
          <source>IEEE Communications Standards Magazine</source>
          <volume>6</volume>
          (
          <year>2022</year>
          )
          <fpage>77</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.-H. F.</given-names>
            <surname>Juang</surname>
          </string-name>
          ,
          <article-title>Deep learning in physical layer communications</article-title>
          ,
          <source>IEEE Wireless Communications</source>
          <volume>26</volume>
          (
          <year>2019</year>
          )
          <fpage>93</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Machine learning and deep learning methods for cybersecurity</article-title>
          ,
          <source>IEEE Access 6</source>
          (
          <year>2018</year>
          )
          <fpage>35365</fpage>
          -
          <lpage>35381</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pawlak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Price</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Al Shamaileh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Niyaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Paheding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Devabhaktuni</surname>
          </string-name>
          ,
          <article-title>Jamming detection and classification in ofdm-based uavs via feature- and spectrogram-tailored machine learning</article-title>
          ,
          <source>IEEE Access 10</source>
          (
          <year>2022</year>
          )
          <fpage>16859</fpage>
          -
          <lpage>16870</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Krayani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Marcenaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nallanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Regazzoni</surname>
          </string-name>
          ,
          <article-title>Automatic jamming signal classification in cognitive uav radios</article-title>
          ,
          <source>IEEE Transactions on Vehicular Technology</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Guo</surname>
          </string-name>
          , G. Pleiss,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. Q.</given-names>
            <surname>Weinberger</surname>
          </string-name>
          ,
          <article-title>On calibration of modern neural networks</article-title>
          ,
          <source>Proceedings of the 34th International Conference on Machine Learning</source>
          - Volume
          <volume>70</volume>
          (
          <year>2017</year>
          )
          <fpage>1321</fpage>
          -
          <lpage>1330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ovadia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Fertig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Nado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sculley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nowozin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. V.</given-names>
            <surname>Dillon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lakshminarayanan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Snoek</surname>
          </string-name>
          ,
          <article-title>Can you trust your model's uncertainty? evaluating predictive uncertainty under dataset shift</article-title>
          ,
          <source>Proceedings of the 33rd International Conference on Neural Information Processing Systems</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>