{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T06:13:14Z","timestamp":1758089594171,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/dac63849.2025.11133183","type":"proceedings-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:35:41Z","timestamp":1757957741000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Query-Based Black-Box Stealthy Sensor Attacks on Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Shixiong","family":"Jiang","sequence":"first","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Weizhe","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Mengyu","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Fanxin","family":"Kong","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Automatic steering methods for autonomous automobile path tracking","volume-title":"Robotics Institute, Pittsburgh, PA, Tech. Rep. CMU-RITR-09-08","author":"Snider","year":"2009"},{"key":"ref2","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Son"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2898510"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431073"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2307\/2333009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364723"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref8","article-title":"False data injection attacks in control systems","volume-title":"Preprints of the 1st workshop on Secure Control Systems","volume":"1","author":"Mo"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3028035"},{"key":"ref11","first-page":"879","article-title":"Learning based attacks in cyber physical systems: Exploration, detection, and control cost trade-offs","volume-title":"Proceedings of the 3rd Conference on Learning for Dynamics and Control, ser. Proceedings of Machine Learning Research","volume":"144","author":"Rangi"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS54341.2022.00030"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3477010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733561"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.485714"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714619"},{"article-title":"Quadrotor control: modeling, nonlinearcontrol design, and simulation","year":"2015","author":"Sabatino","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HORA49412.2020.9152897"},{"key":"ref19","first-page":"1","article-title":"Carla: An open urban driving simulator","volume-title":"Conference on robot learning. PMLR","author":"Dosovitskiy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS52030.2021.00027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS55097.2022.00029"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S1367-5788(02)00045-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803827"}],"event":{"name":"2025 62nd ACM\/IEEE Design Automation Conference (DAC)","start":{"date-parts":[[2025,6,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2025,6,25]]}},"container-title":["2025 62nd ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11132383\/11132091\/11133183.pdf?arnumber=11133183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T05:55:35Z","timestamp":1758002135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/dac63849.2025.11133183","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}