{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:40:27Z","timestamp":1776530427284,"version":"3.51.2"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Information Engineering University Thesis Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2927539","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T16:13:32Z","timestamp":1562688812000},"page":"96359-96371","source":"Crossref","is-referenced-by-count":21,"title":["Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS\/IMU and NIS Sequence Detection"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1059-0131","authenticated-orcid":false,"given":"Yangjun","family":"Gao","sequence":"first","affiliation":[]},{"given":"Zhiwei","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Lundong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"ref11","first-page":"2646","article-title":"An evaluation of the vestigial signal defense for civil GPS anti-spoofing","volume":"6955","author":"wesson","year":"2011","journal-title":"Proc Radionavigat Lab Conf"},{"key":"ref12","article-title":"GPS spoofer and repeater mitigation system using digital spatial nulling","author":"mcdowell","year":"2007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2007.4441741"},{"key":"ref14","first-page":"1048","article-title":"Performance analysis of maximum likelihood detection for satellite navigation receiver anti-spoofing","volume":"44","author":"sun","year":"2014","journal-title":"Sci China"},{"key":"ref15","first-page":"2916","article-title":"A civil GPS anti-spoofing and recovering method using multiple tracking loops and an adaptive filter technique","author":"moon","year":"2013","journal-title":"Proc ION GNSS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2014.6851498"},{"key":"ref18","first-page":"16","article-title":"Bias analysis of GPS\/INS integrated navigation under GPS deception","volume":"23","author":"shi","year":"2016","journal-title":"Electron Opt Control"},{"key":"ref19","first-page":"420","article-title":"Jamming of unmanned aerial vehicle with GPS\/INS integrated navigation system based on trajectory cheating","volume":"49","author":"li","year":"2017","journal-title":"J Nanjing Univ Aeronaut Astronaut"},{"key":"ref4","first-page":"3591","article-title":"Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks","author":"shepard","year":"2012","journal-title":"Proc ION GNSS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2017.00074"},{"key":"ref3","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"warner","year":"2002","journal-title":"J Security Admin"},{"key":"ref6","first-page":"2083","article-title":"Analysis of effect of spoofing signal in GPS receiver","author":"kim","year":"2012","journal-title":"Proc 12th Int Conf Control Automat Syst"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2012.6236917"},{"key":"ref8","first-page":"822","article-title":"Multipath and spoofing detection using angle of arrival in a multi-antenna system","author":"bitner","year":"2015","journal-title":"Proc Int Tech Meeting Inst Navigat"},{"key":"ref7","first-page":"2843","article-title":"Investigating and utilizing the limitations of spoofing in a map-matching anti-spoofing algorithm","volume":"3","author":"ziedan","year":"2014","journal-title":"Proc 7th Int Tech Meeting Satell Division Inst Navig"},{"key":"ref2","first-page":"163","article-title":"Anti-spoofing and authenticated signal architectures for civil navigation systems","author":"scott","year":"2001","journal-title":"Proceedings of the 16th International Technical Meeting of the Satellite Division of the Institute of Navigation ION GPS\/GNSS"},{"key":"ref9","first-page":"1172","article-title":"A novel spoofing attack detection method in satellite navigation tracking phase","volume":"36","author":"zhao","year":"2015","journal-title":"Astron J"},{"key":"ref1","first-page":"28","article-title":"Assessing the spoofing threat","volume":"20","author":"humphreys","year":"2009"},{"key":"ref20","first-page":"161","article-title":"Design and field test of a GPS spoofer for UAV trajectory manipulation","author":"kou","year":"2018","journal-title":"Proc 1st China Satell Navig Conf"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2469105"},{"key":"ref21","author":"grove","year":"2013","journal-title":"Principles of GNSS Inertial and Multisensor Integrated Navigation Systems"},{"key":"ref24","first-page":"462","article-title":"Method of multi-resolution and effective singular value decomposition in under-determined blind source separation and its application to the fault diagnosis of roller bearing","author":"zhou","year":"2016","journal-title":"Proc Int Conf Comput Intell Secur (CIS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2241424"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2018.8409835"},{"key":"ref25","first-page":"334","article-title":"Optimal Tikhonov regularization matrix and its applicationin GNSS ambiguity resolution","volume":"44","author":"bian","year":"2019","journal-title":"Geomatics Inf Sci Wuhan Univ"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08758089.pdf?arnumber=8758089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:32:54Z","timestamp":1641987174000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8758089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2927539","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}