{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:30:53Z","timestamp":1772199053802,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_13","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:01:11Z","timestamp":1760364071000},"page":"235-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Deep Reinforcement Learning Framework for\u00a0Robust Maritime Collision Avoidance Under GPS Spoofing"],"prefix":"10.1007","author":[{"given":"Ying","family":"Ding","sequence":"first","affiliation":[]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Shaoming","family":"He","sequence":"additional","affiliation":[]},{"given":"Wenjuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.arcontrol.2012.09.008","volume":"36","author":"S Campbell","year":"2012","unstructured":"Campbell, S., Naeem, W., Irwin, G.W.: A review on improving the autonomy of unmanned surface vehicles through intelligent collision avoidance manoeuvres. Annu. Rev. Control. 36(2), 267\u2013283 (2012)","journal-title":"Annu. Rev. Control."},{"issue":"5","key":"13_CR2","doi-asserted-by":"publisher","first-page":"585","DOI":"10.3390\/jmse10050585","volume":"10","author":"P Zhai","year":"2022","unstructured":"Zhai, P., Zhang, Y., Wang, S.: Intelligent ship collision avoidance algorithm based on DDQN with prioritized experience replay under COLREGs. J. Mar. Sci. Eng. 10(5), 585 (2022)","journal-title":"J. Mar. Sci. Eng."},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s00773-020-00755-0","volume":"26","author":"R Sawada","year":"2021","unstructured":"Sawada, R., Sato, K., Majima, T.: Automatic ship collision avoidance using deep reinforcement learning with LSTM in continuous action spaces. J. Mar. Sci. Technol. 26(2), 509\u2013524 (2021)","journal-title":"J. Mar. Sci. Technol."},{"key":"13_CR4","volume-title":"Practical Ship Hydrodynamics","author":"V Bertram","year":"2000","unstructured":"Bertram, V.: Practical Ship Hydrodynamics. Butterworth-Heinemann, Oxford (2000)"},{"issue":"6","key":"13_CR5","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","volume":"104","author":"ML Psiaki","year":"2016","unstructured":"Psiaki, M.L., Humphreys, T.E.: GNSS spoofing and detection. Proc. IEEE 104(6), 1258\u20131270 (2016)","journal-title":"Proc. IEEE"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1002\/rob.21513","volume":"31","author":"AJ Kerns","year":"2014","unstructured":"Kerns, A.J., Shepard, D.P., Bhatti, J.A., et al.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617\u2013636 (2014)","journal-title":"J. Field Robot."},{"issue":"7540","key":"13_CR7","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih, V., Kavukcuoglu, K., Silver, D., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529\u2013533 (2015)","journal-title":"Nature"},{"key":"13_CR8","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., et al.: Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)"},{"key":"13_CR9","unstructured":"Haarnoja, T., Zhou, A., Abbeel, P., et al.: Soft actor-critic: off-policy maximum entropy deep reinforcement learning with a stochastic actor. In: International Conference on Machine Learning, pp. 1861\u20131870. PMLR (2018)"},{"issue":"1","key":"13_CR10","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/COMST.2021.3139052","volume":"24","author":"W Li","year":"2022","unstructured":"Li, W., Meng, W., Kwok, L.F.: Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions. IEEE Commun. Surv. Tutor. 24(1), 280\u2013305 (2022)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"13_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102510","volume":"127","author":"W Li","year":"2022","unstructured":"Li, W., Wang, Y., Li, J.: Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks. J. Syst. Architect. 127, 102510 (2022)","journal-title":"J. Syst. Architect."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zheng, K., Wang, C., et al.: A novel deep reinforcement learning for POMDP-based autonomous ship collision decision-making. Neural Comput. Appl. 1\u201315 (2023)","DOI":"10.1007\/s00521-023-08908-z"},{"issue":"8","key":"13_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3390\/robotics13080117","volume":"13","author":"S MahmoudZadeh","year":"2024","unstructured":"MahmoudZadeh, S., Yazdani, A., Kalantari, Y., et al.: Holistic review of UAV-centric situational awareness: applications, limitations, and algorithmic challenges. Robotics 13(8), 117 (2024)","journal-title":"Robotics"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s00773-010-0089-7","volume":"15","author":"CK Tam","year":"2010","unstructured":"Tam, C.K., Bucknall, R.: Collision risk assessment for ships. J. Mar. Sci. Technol. 15, 257\u2013270 (2010)","journal-title":"J. Mar. Sci. Technol."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Wr\u00f3bel, K., Gil, M., Huang, Y., et al.: The vagueness of COLREG versus collision avoidance techniques\u2014a discussion on the current state and future challenges concerning the operation of autonomous ships. Sustainability 14(24), 16516 (2022)","DOI":"10.3390\/su142416516"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1007\/s10207-023-00687-x","volume":"22","author":"W Li","year":"2023","unstructured":"Li, W., Wang, Y., Li, J.: A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. Int. J. Inf. Secur. 22, 1219\u20131230 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Li, W., Stidsen, C., Adam, T.: A blockchain-assisted security management framework for collaborative intrusion detection in smart cities. Comput. Electr. Eng. Part A 111, 108884, 1\u201313 (2023)","DOI":"10.1016\/j.compeleceng.2023.108884"},{"issue":"103713","key":"13_CR18","first-page":"1","volume":"81","author":"W Li","year":"2024","unstructured":"Li, W., Rosenberg, P., Glisby, M., Han, M.: Designing energy-aware collaborative intrusion detection in IoT networks. J. Inf. Secur. Appl. 81(103713), 1\u201310 (2024)","journal-title":"J. Inf. Secur. Appl."},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.dcan.2020.09.003","volume":"7","author":"W Li","year":"2021","unstructured":"Li, W., Wang, Y., Jin, Z., Yu, K., Li, J., Xiang, Y.: Challenge-based collaborative intrusion detection in software defined networking: an evaluation. Digit. Commun. Netw. 7, 257\u2013263 (2021)","journal-title":"Digit. Commun. Netw."},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Akos, D.M.: Who\u2019s afraid of the spoofer? GPS\/GNSS spoofing detection via automatic gain control (AGC). NAVIGATION J. Inst. Navig. 59(4), 281\u2013290 (2012)","DOI":"10.1002\/navi.19"},{"issue":"12","key":"13_CR21","doi-asserted-by":"publisher","first-page":"23559","DOI":"10.1109\/TITS.2022.3197817","volume":"23","author":"S Dasgupta","year":"2022","unstructured":"Dasgupta, S., Rahman, M., Islam, M., et al.: A sensor fusion-based GNSS spoofing attack detection framework for autonomous vehicles. IEEE Trans. Intell. Transp. Syst. 23(12), 23559\u201323572 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"7","key":"13_CR22","doi-asserted-by":"publisher","first-page":"2608","DOI":"10.3390\/s22072608","volume":"22","author":"B Davidovich","year":"2022","unstructured":"Davidovich, B., Nassi, B., Elovici, Y.: Towards the detection of GPS spoofing attacks against drones by analyzing camera s video stream. Sensors 22(7), 2608 (2022)","journal-title":"Sensors"},{"issue":"103179","key":"13_CR23","first-page":"1","volume":"128","author":"R Sahay","year":"2023","unstructured":"Sahay, R., Estay, D.A.S., Meng, W., Jensen, C.D., Barfod, M.B.: A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. Comput. Secur. 128(103179), 1\u201318 (2023)","journal-title":"Comput. Secur."},{"issue":"4","key":"13_CR24","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1002\/rob.21513","volume":"31","author":"AJ Kerns","year":"2014","unstructured":"Kerns, A.J., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617\u2013636 (2014)","journal-title":"J. Field Robot."},{"issue":"9","key":"13_CR25","first-page":"3912","volume":"21","author":"R Zhang","year":"2020","unstructured":"Zhang, R., Qian, C., Yang, J.: Resilient motion planning under GPS spoofing attacks using sensor fusion and anomaly detection. IEEE Trans. Intell. Transp. Syst. 21(9), 3912\u20133923 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1016\/j.future.2019.05.049","volume":"100","author":"R Sahay","year":"2019","unstructured":"Sahay, R., Meng, W., Estay, D.A.S., Jensen, C.D., Barfod, M.B.: CyberShip-IoT: a dynamic and adaptive SDN-based security policy enforcement framework for ships. Futur. Gener. Comput. Syst. 100, 736\u2013750 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"13_CR27","first-page":"1","volume":"2012","author":"A Jafarnia-Jahromi","year":"2012","unstructured":"Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., Lachapelle, G.: GPS vulnerability to spoofing threats and a review of antispoofing techniques. Int. J. Navig. Obs. 2012, 1\u201316 (2012)","journal-title":"Int. J. Navig. Obs."},{"issue":"4","key":"13_CR28","first-page":"3241","volume":"68","author":"L Xiao","year":"2019","unstructured":"Xiao, L., Wan, Y., Lu, X., Du, X., Guizani, M.: Spoofing-resilient trajectory tracking for autonomous vehicles via reinforcement learning. IEEE Trans. Veh. Technol. 68(4), 3241\u20133254 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"13_CR29","doi-asserted-by":"publisher","first-page":"3087","DOI":"10.1002\/int.22397","volume":"36","author":"C Wu","year":"2021","unstructured":"Wu, C., Li, W.: Enhancing intrusion detection with feature selection and neural network. Int. J. Intell. Syst. 36(7), 3087\u20133105 (2021)","journal-title":"Int. J. Intell. Syst."}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:05Z","timestamp":1772196485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}