Fig. 5From: ADS-B spoofing attack detection method based on LSTMIllustration of sliding window. First uses the data with the serial number [1,10] to predict the 11th data; then, by sliding the window, the data with the serial number [2,11] are used to predict the 12th data, and the rest of the data all follow this patternBack to article page