{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:37:19Z","timestamp":1762508239508,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590154"},{"type":"electronic","value":"9783030590161"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59016-1_28","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:05:10Z","timestamp":1599743110000},"page":"333-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Deep Learning Enabled Reliable Identity Verification and Spoofing Detection"],"prefix":"10.1007","author":[{"given":"Yongxin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuteng","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"issue":"1","key":"28_CR1","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2020","unstructured":"Butun, I., \u00d6sterberg, P., Song, H.: Security of the Internet of Things: vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutorials 22(1), 616\u2013644 (2020)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Cai, Z., He, Z.: Trading private range counting over big IoT data. In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 144\u2013153. IEEE (2019)","DOI":"10.1109\/ICDCS.2019.00023"},{"issue":"4","key":"28_CR3","first-page":"577","volume":"15","author":"Z Cai","year":"2016","unstructured":"Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577\u2013590 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","volume":"7","author":"Z Cai","year":"2018","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Network Sci. Eng. 7, 766\u2013775 (2018)","journal-title":"IEEE Trans. Network Sci. Eng."},{"issue":"12","key":"28_CR5","doi-asserted-by":"publisher","first-page":"6492","DOI":"10.1109\/TII.2019.2911697","volume":"15","author":"Z Cai","year":"2019","unstructured":"Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inf. 15(12), 6492\u20136499 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Chen, S., Zheng, S., Yang, L., Yang, X.: Deep learning for large-scale real-world ACARS and ADS-B radio signal classification. arXiv preprint arXiv:1904.09425 (2019)","DOI":"10.1109\/ACCESS.2019.2925569"},{"key":"28_CR7","unstructured":"Costin, A., Francillon, A.: Ghost in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black Hat, USA, pp. 1\u201312 (2012)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Ghose, N., Lazos, L.: Verifying ads-b navigation information through doppler shift measurements. In: IEEE\/AIAA 34th Digital Avionics Systems Conference (DASC), pp. 4A2-1. IEEE (2015)","DOI":"10.1109\/DASC.2015.7311412"},{"issue":"1","key":"28_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/CJECE.2015.2496143","volume":"39","author":"G Huang","year":"2016","unstructured":"Huang, G., Yuan, Y., Wang, X., Huang, Z.: Specific emitter identification based on nonlinear dynamical characteristics. Can. J. Electri. Comput. Eng. 39(1), 34\u201341 (2016)","journal-title":"Can. J. Electri. Comput. Eng."},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Husz\u00e1r, F.: Note on the quadratic penalties in elastic weight consolidation. In: Proceedings of the National Academy of Sciences, p. 201717042 (2018)","DOI":"10.1073\/pnas.1717042115"},{"key":"28_CR11","series-title":"Springer Series in Wireless Technology","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42559-7","volume-title":"Industrial Internet of Things","year":"2017","unstructured":"Jeschke, S., Brecher, C., Song, H., Rawat, D.B. (eds.): Industrial Internet of Things. SSWT. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-42559-7"},{"issue":"5","key":"28_CR12","doi-asserted-by":"publisher","first-page":"2370","DOI":"10.1109\/TAES.2018.2886616","volume":"55","author":"M Leonardi","year":"2018","unstructured":"Leonardi, M.: ADS-B anomalies and intrusions detection by sensor clocks tracking. IEEE Trans. Aerosp. Electron. Syst. 55(5), 2370\u20132381 (2018)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Leonardi, M., Di Fausto, D.: ADS-B signal signature extraction for intrusion detection in the air traffic surveillance system. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 2564\u20132568. IEEE (2018)","DOI":"10.23919\/EUSIPCO.2018.8553570"},{"issue":"4","key":"28_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.3390\/aerospace4040051","volume":"4","author":"M Leonardi","year":"2017","unstructured":"Leonardi, M., Di Gregorio, L., Di Fausto, D.: Air traffic security: aircraft classification using ADS-B message\u2019s phase-pattern. Aerospace 4(4), 51 (2017)","journal-title":"Aerospace"},{"issue":"4","key":"28_CR15","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Y Liang","year":"2018","unstructured":"Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8\u201314 (2018)","journal-title":"IEEE Netw."},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Liu, G., Zhang, R., Wang, C., Liu, L.: Synchronization-free gps spoofing detection with crowdsourced air traffic control data. In: 2019 20th IEEE International Conference on Mobile Data Management (MDM), pp. 260\u2013268. IEEE (2019)","DOI":"10.1109\/MDM.2019.00-49"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wang, J., Song, H., Li, J., Yuan, J.: Blockchain-based secure routing strategy for airborne mesh networks. In: 2019 IEEE International Conference on Industrial Internet (ICII), pp. 56\u201361. IEEE (2019)","DOI":"10.1109\/ICII.2019.00021"},{"issue":"4","key":"28_CR18","doi-asserted-by":"publisher","first-page":"1891","DOI":"10.1109\/TII.2017.2650204","volume":"13","author":"Z Lv","year":"2017","unstructured":"Lv, Z., Song, H., Basanta-Val, P., Steed, A., Jo, M.: Next-generation big data analytics: state of the art, challenges, and future research topics. IEEE Trans. Ind. Inf. 13(4), 1891\u20131899 (2017)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Monteiro, M., Barreto, A., Kacem, T., Carvalho, J., Wijesekera, D., Costa, P.: Detecting malicious ADS-B broadcasts using wide area multilateration. In: 2015 IEEE\/AIAA 34th Digital Avionics Systems Conference (DASC), pp. 4A3-1. IEEE (2015)","DOI":"10.1109\/DASC.2015.7311413"},{"key":"28_CR20","doi-asserted-by":"publisher","unstructured":"Pang, J., Huang, Y., Xie, Z., Han, Q., Cai, Z.: Realizing the heterogeneity: a self-organized federated learning framework for IoT. IEEE Internet Things J. 1 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3007662","DOI":"10.1109\/JIOT.2020.3007662"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer, M., Leu, P., Lenders, V., Schmitt, J.: Secure motion verification using the doppler effect. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 135\u2013145. ACM (2016)","DOI":"10.1145\/2939918.2939920"},{"key":"28_CR22","unstructured":"Sun, J.: An open-access book about decoding mode-s and ADS-B data, May 2017. https:\/\/mode-s.org\/"},{"key":"28_CR23","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/ACCESS.2016.2529723","volume":"4","author":"Y Sun","year":"2016","unstructured":"Sun, Y., Song, H., Jara, A.J., Bie, R.: Internet of things and big data analytics for smart and connected communities. IEEE Access 4, 766\u2013773 (2016)","journal-title":"IEEE Access"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.A.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: Thirty-first AAAI Conference on Artificial Intelligence (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Fountain code enabled ads-b for aviation security and safety enhancement. In: 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/PCCC.2018.8711001"},{"issue":"2","key":"28_CR26","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TSC.2015.2459709","volume":"10","author":"A Yang","year":"2015","unstructured":"Yang, A., Tan, X., Baek, J., Wong, D.S.: A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification. IEEE Trans. Serv. Comput. 10(2), 165\u2013175 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"28_CR27","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.1109\/JIOT.2018.2882633","volume":"6","author":"H Yang","year":"2018","unstructured":"Yang, H., Zhou, Q., Yao, M., Lu, R., Li, H., Zhang, X.: A practical and compatible cryptographic solution to ADS-B security. IEEE Internet Things J. 6(2), 3322\u20133334 (2018)","journal-title":"IEEE Internet Things J."},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Ying, X., Mazer, J., Bernieri, G., Conti, M., Bushnell, L., Poovendran, R.: Detecting ADS-B spoofing attacks using deep neural networks. arXiv preprint arXiv:1904.09969 (2019)","DOI":"10.1109\/CNS.2019.8802732"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59016-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T18:44:24Z","timestamp":1668710664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59016-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590154","9783030590161"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59016-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}