{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:09:11Z","timestamp":1730232551609,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office for Scientific Research (AFOSR)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,9]]},"DOI":"10.1109\/icc51166.2024.10622852","type":"proceedings-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T15:34:42Z","timestamp":1724168082000},"page":"147-152","source":"Crossref","is-referenced-by-count":0,"title":["Evasive Camouflage Attack of RF Sensing and Imaging Systems"],"prefix":"10.1109","author":[{"given":"Lhamo","family":"Dorje","sequence":"first","affiliation":[{"name":"Binghamton University,Department of Electrical and Computer Engineering,Binghamton,NY,USA,19312"}]},{"given":"Xiaohua","family":"Li","sequence":"additional","affiliation":[{"name":"Binghamton University,Department of Electrical and Computer Engineering,Binghamton,NY,USA,19312"}]},{"given":"Soamar","family":"Homsi","sequence":"additional","affiliation":[{"name":"Air Force Research Lab,Information Warfare Division,Rome,NY,USA,13440"}]}],"member":"263","reference":[{"key":"ref1","first-page":"572","article-title":"Millimeter wave dielectric spectroscopy and breast cancer imaging","volume-title":"2012 7th European Microwave Integrated Circuit Conference","author":"Chao","year":"2012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.97"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2890128"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2018.2880757"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/22.942570"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2011.2164411"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/rs15010065"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10661-020-08546-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2020.111693"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10712-020-09606-4"},{"key":"ref11","first-page":"1","article-title":"A review of sar imagery exploitation methods in support of defence and security missions","volume-title":"Proceedings of EUSAR 2016: 11th European Conference on Synthetic Aperture Radar","author":"Robin","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934489"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2019.2933971"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701277"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2754578"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2008.01.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486039"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3061992"},{"key":"ref19","first-page":"143","article-title":"A systematic study of physical sensor attack hardness","volume-title":"2024 IEEE Symposium on Security and Privacy (SP)","author":"Kim","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"issue":"2","key":"ref21","first-page":"19","article-title":"A simple demonstration that the global positioning system (gps) is vulnerable to spoofing","volume":"25","author":"Warner","year":"2002","journal-title":"Journal of security administration"},{"key":"ref22","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable gps civilian spoofer","volume-title":"Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2008)","author":"Humphreys","year":"2008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24425\/ijet.2019.126284"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/navi.184"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PEITS.2009.5406988"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INTECH.2016.7845038"},{"key":"ref27","article-title":"Stars can tell: A robust method to defend against gps spoofing using off-the-shelf chipset","volume-title":"Proceedings of The 30th USENIX Security Symposium (USENIX Security)","author":"Liu","year":"2021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/navi.183"},{"key":"ref30","first-page":"2949","article-title":"Gnss spoofing detection using high-frequency antenna motion and carrier-phase data","volume-title":"proceedings of the 26th international technical meeting of the satellite division of the Institute of Navigation (ION GNSS+ 2013)","author":"Psiaki","year":"2013"},{"key":"ref31","first-page":"1","article-title":"Time and position spoofing with open source projects","volume":"148","author":"Wang","year":"2015","journal-title":"black hat Europe"},{"volume-title":"Gps jammimg and spoofing using software defined radio","year":"2017","author":"Silva","key":"ref32"},{"volume-title":"Millimeter-Wave Imaging Using MIMO-SAR Techniques","year":"2020","author":"Yanik","key":"ref33"},{"key":"ref34","first-page":"1","article-title":"High-resolution imaging satellite constellation","volume-title":"Proceedings of the Info rSymb i-otics\/Dynamic Data Driven Applications Systems (DDDAS2022)","author":"Li","year":"2022"}],"event":{"name":"ICC 2024 - IEEE International Conference on Communications","start":{"date-parts":[[2024,6,9]]},"location":"Denver, CO, USA","end":{"date-parts":[[2024,6,13]]}},"container-title":["ICC 2024 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10622104\/10622158\/10622852.pdf?arnumber=10622852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T19:50:21Z","timestamp":1724961021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10622852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icc51166.2024.10622852","relation":{},"subject":[],"published":{"date-parts":[[2024,6,9]]}}}