We built an unsupervised anomaly detector using JEPA — Joint Embedding Predictive Architecture — that learns what normal drone telemetry looks like, then flags tampering it's never seen before.
Modern drones rely on telemetry — accelerometer, gyroscope, GPS, and barometer readings — to operate safely. If an attacker tampers with these signals, the drone can be hijacked, crashed, or redirected without the operator knowing anything is wrong.
The hard part: you can't collect every possible attack in advance. Attackers adapt. A model trained on yesterday's attacks won't catch tomorrow's. The solution is to flip the problem — instead of learning what attacks look like, learn what normal looks like, and flag everything else.
Joint Embedding Predictive Architecture works by masking random portions of the input and learning to predict the masked content — not in pixel or feature space, but in embedding space. This forces the model to build abstract, semantic representations rather than memorising surface patterns.
JEPA v3 configuration: encoder hidden layers at 1024 → 768 → 384, adaptive masking between 12–72%, cosine learning rate schedule, 140 epochs. The deeper encoder forces richer representations than earlier versions.
We froze the JEPA checkpoint and swept over detector hyperparameters. Each configuration was scored on a composite metric penalising false alarms: 1.4×AUC + 1.9×Recall + 0.25×F1 − 3.0×max(0, FAR−0.20).
Manhattan distance outperformed Euclidean and Cosine consistently across all PCA dimensions — absolute feature differences are a better signal for telemetry anomalies than geometric distance.
Three test splits — balanced, strong, and subtle attacks. Subtle attacks are small, deliberate perturbations designed to evade detection. The model was trained on zero attack samples.
The video below walks through the full pipeline end-to-end in Colab — from loading the checkpoint to live inference across all three test splits.
Want to run it yourself? The pretrained models are available on Google Drive and the notebook runs on free Colab T4 GPU.