{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:04:34Z","timestamp":1772121874179,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,5]]},"DOI":"10.1109\/icaic63015.2025.10849307","type":"proceedings-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:44:02Z","timestamp":1738176242000},"page":"1-9","source":"Crossref","is-referenced-by-count":10,"title":["Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles"],"prefix":"10.1109","author":[{"given":"Ahmad","family":"Mohammadi","sequence":"first","affiliation":[{"name":"North Carolina A&#x0026;T State University,Electrical and Computer Engineering,Greensboro,USA"}]},{"given":"Vahid","family":"Hemmati","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Electrical and Computer Engineering,Greensboro,USA"}]},{"given":"Reza","family":"Ahmari","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Computer Science,Greensboro,USA"}]},{"given":"Frederick","family":"Owusu-Ambrose","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Electrical and Computer Engineering,Greensboro,USA"}]},{"given":"Mahmoud Nabil","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Electrical and Computer Engineering,Greensboro,USA"}]},{"given":"Abdollah","family":"Homaifar","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Electrical and Computer Engineering,Greensboro,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00803"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3071405"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2024.110407"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3347989"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9659972"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224932"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2014.1013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3305620"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT57126.2023.10134743"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.22581\/muet1982.2303.15"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.12720\/jait.15.7.886-895"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3197817"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EURONAV.2018.8433227"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8755087"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47715-7_24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SMACD.2018.8434915"},{"key":"ref20","first-page":"38","article-title":"Learning-to-learn to guide random search: Derivative-free meta blackbox optimization on manifold","volume-title":"Learning for Dynamics and Control Conference.","author":"Sel"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625567"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.36227\/techrxiv.172789022.28202678\/v1","article-title":"Performance comparison of yolo models for safety helmet detection: Insights from yolov5 to yolov10 with transfer learning","volume-title":"International Conference of Adisutjipto on Aerospace Electrical Engineering and Informatics (ICAAEEI). Institute of Electrical and Electronics Engineers (IEEE)","author":"Chowdhury"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3419800"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2023.3333257"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DASC62030.2024.10749535"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973759"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/navi.44"},{"key":"ref28","first-page":"2211","article-title":"Real-time spoofing detection in a narrow-band civil gps receiver","volume-title":"Proceedings of the 23rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2010)","author":"O\u2019Hanlon"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"ref30","first-page":"1233","article-title":"A low-complexity gps anti-spoofing method using a multi-antenna array","volume-title":"Proceedings of the 25th international technical meeting of the satellite division of the institute of navigation (ION GNSS 2012)","author":"Daneshmand"},{"key":"ref31","first-page":"2776","article-title":"Gnss spoofing detection using two-antenna differential carrier phase","volume-title":"Proceedings of the 27th international technical meeting of the satellite division of the Institute of Navigation (ION GNSS+ 2014)","author":"Psiaki"},{"key":"ref32","first-page":"3935","article-title":"Stars can tell: a robust method to defend against GPS spoofing attacks using off-the-shelf chipset","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Liu"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.33012\/2018.15903"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.33012\/2018.15902"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.33012\/2016.14780"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.33012\/2020.17537"},{"issue":"5","key":"ref37","first-page":"670","article-title":"Gps spoofing detection based on decision fusion with a k-out-of-n rule","volume":"19","author":"Sun","year":"2017","journal-title":"Int. J. Netw. Secur."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2307\/2309088"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s20040954"},{"key":"ref40","article-title":"Gps spoofing attack detection on autonomous vehicles using modified dbscan with dynamic threshold","volume-title":"th IFSA Winter Conference on Automation, Robotics & Communications for Industry 4.0\/5.0 (ARCI) (submitted)","author":"Mohammadi"},{"key":"ref41","first-page":"68","volume-title":"VDM Publishing","author":"Miller"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511665622"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3269029"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1177\/03611981221095509"}],"event":{"name":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","location":"Houston, TX, USA","start":{"date-parts":[[2025,2,5]]},"end":{"date-parts":[[2025,2,7]]}},"container-title":["2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10848546\/10848537\/10849307.pdf?arnumber=10849307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T19:09:41Z","timestamp":1738264181000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10849307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,5]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icaic63015.2025.10849307","relation":{},"subject":[],"published":{"date-parts":[[2025,2,5]]}}}