1Jaysen A Yochim. The vulnerabilities of unmanned aircraft system common data links of electronic attack. Fort Leav- enworth, Kansas: U. S. Army Command and General Staff College, 2010.
1US. Department of Defense. Technical Standard for the ATCRBS/IFF/Mark XII A Electronic Identification System and Military Implementation of Mode S. AIMS 03-1000A[R]. US. DoD, 2006.
1Moravec H P. Towards automatic visual obstacle avoidance. Proceedings of International Joint Conference on Artificial Intelligence, New York, N J, USA: ACM, 1977.
2Harris C, Stephens M. A combined comer and edge detector. Aivey Vision Conference, 1988.
3Smith S M, Brady J M. SUSANA-A new approach to low level image processing. International Journal of ComputerVision, 1977, 2( 1).
4Rosten E,Drummond T. Machine learning for high-speed comer detection. Proceedings of the European Conference on Computer Vision, 2006.
5Lowe D G. Distinctive image features from scale-invariant key points. International Journal of Computer Vision, 2004 , 60(2).
6Bay H,Ess A,Tuvtellars T,et al. SURF: speeded up robust features. Computer Vision and Image Understanding, 2008, 110(3).
7Calonder M,Lepetit V,Ozuysal M,et al. BRIEF: computing a local binary descriptor very fast. IEEE Transactions on Model Analysis and Machine Intelligence ,2012, 34(7).
8Riblee E, Rabaud V,Konolidgek, et al. ORB: an efficient alternative to SIFT or SURF. Proceedings of the 13th IEEE International on Conference Computer Vision ,Los Alamitos : IEEE Computer Society Press,2011.
9Leutenegger S, Chli M,Siegwart R. BRISK: Binary robust invariant scalable keypoints. Proceedings of the 13th IEEE International Conference on Computer Vision ,Los Alamitos : IEEE Computer Society Press,2012.
10Mari E,Hager G, Burschka G, et al. Adaptive and generic comer detection based on the accelerated segment test. Proceedings of the 11th European Conference on Computer Vision, 2010.