{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:27:34Z","timestamp":1740101254204,"version":"3.37.3"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,6]]},"DOI":"10.1109\/cdc51059.2022.9992432","type":"proceedings-article","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T19:26:56Z","timestamp":1673378816000},"page":"2256-2263","source":"Crossref","is-referenced-by-count":1,"title":["Barrier Certificate based Safe Control for LiDAR-based Systems under Sensor Faults and Attacks"],"prefix":"10.1109","author":[{"given":"Hongchao","family":"Zhang","sequence":"first","affiliation":[{"name":"Washington University in St. Louis,McKelvey School of Engineering,Electrical and Systems Engineering Department,St. Louis,MO 63130"}]},{"given":"Shiyu","family":"Cheng","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis,McKelvey School of Engineering,Electrical and Systems Engineering Department,St. Louis,MO 63130"}]},{"given":"Luyao","family":"Niu","sequence":"additional","affiliation":[{"name":"University of Washington,Department of Electrical and Computer Engineering,Seattle,WA 98195"}]},{"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis,McKelvey School of Engineering,Electrical and Systems Engineering Department,St. Louis,MO 63130"}]}],"member":"263","reference":[{"key":"ref1","first-page":"547","article-title":"Safety critical systems: challenges and directions","volume-title":"24th International Conference on Software Engineering","author":"Knight"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2638961"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/9.664154"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.02.037"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s21062140"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s20072068"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2012.6225224"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"ref12","first-page":"1","article-title":"False data injection attacks in control systems","volume-title":"Preprints of the 1st workshop on Secure Control Systems","author":"Mo"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2326274"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2676679"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814821"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9303766"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78929-1_14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9303873"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/ACC53348.2022.9867612"},{"key":"ref22","first-page":"350","article-title":"Robust guarantees for perception-based control","author":"Dean","year":"2020","journal-title":"Learning for Dynamics and Control."},{"key":"ref23","article-title":"Guaranteeing safety of learned perception modules via measurement-robust control barrier functions","author":"Dean","year":"2020","journal-title":"CoRL"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2022.3141657"},{"article-title":"Differentiable control barrier functions for vision-based end-to-end autonomous driving","year":"2022","author":"Xiao","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1117\/12.2050765"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.110089"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3078111"},{"article-title":"Resiliency of perception-based controllers against attacks","volume-title":"Tech. Rep.","author":"Khazraei","key":"ref29"},{"article-title":"Security analysis of camera-LiDAR fusion against black-box attacks on autonomous vehicles","year":"2021","author":"Hallyburton","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/9.754809"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2003.1249285"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3013916"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.109614"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-004-0554-3"},{"key":"ref36","article-title":"Matlab UAV package delivery"}],"event":{"name":"2022 IEEE 61st Conference on Decision and Control (CDC)","start":{"date-parts":[[2022,12,6]]},"location":"Cancun, Mexico","end":{"date-parts":[[2022,12,9]]}},"container-title":["2022 IEEE 61st Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9992315\/9992317\/09992432.pdf?arnumber=9992432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T11:49:54Z","timestamp":1706788194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9992432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cdc51059.2022.9992432","relation":{},"subject":[],"published":{"date-parts":[[2022,12,6]]}}}