{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:48:28Z","timestamp":1776977308360,"version":"3.51.4"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11471951","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Spoofing in Slow Motion: Sub-Perceptual GPS Drift Attack Detection in Autonomous Vehicles"],"prefix":"10.1109","author":[{"given":"Denish Omondi","family":"Otieno","sequence":"first","affiliation":[{"name":"Texas Tech University,Department of Computer Science,Lubbock,TX,USA"}]},{"given":"Abdul","family":"Serwadda","sequence":"additional","affiliation":[{"name":"Texas Tech University,Department of Computer Science,Lubbock,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3298785"},{"key":"ref2","first-page":"931","article-title":"Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing","volume-title":"29th USENIX security symposium (USENIX Security 20)","author":"Shen"},{"key":"ref3","article-title":"The ghost navigator: Revisiting the hidden vulnerability of localization in autonomous driving","author":"Zhang"},{"key":"ref4","first-page":"3503","article-title":"An experimental study of {GPS} spoofing and takeover attacks on {UAVs}","volume-title":"31st USENIX security symposium (USENIX security 22)","author":"Sathaye"},{"key":"ref5","article-title":"Gps-ids: An anomaly-based gps spoofing attack detection framework for autonomous vehicles","author":"Abrar","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ojvt.2025.3580538"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13132654"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS51040.2020.00058"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MECO58584.2023.10154998"},{"key":"ref10","first-page":"1527","article-title":"All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems","volume-title":"27th USENIX security symposium (USENIX security 18)","author":"Zeng"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/c2022-0-02815-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/itr2.12504"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934632"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon52093.2024.10500196"},{"key":"ref15","article-title":"Unveiling the stealthy threat: Analyzing slow drift gps spoofing attacks for autonomous vehicles in urban environments and enabling the resilience","author":"Dasgupta","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625567"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319514"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3454416"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK63289.2024.10773593"},{"key":"ref20","article-title":"Auto-encoding variational bayes","author":"Kingma","year":"2013"},{"key":"ref21","article-title":"beta-vae: Learning basic visual concepts with a constrained variational framework","volume-title":"International conference on learning representations","author":"Higgins"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053558"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-55320-6"},{"key":"ref25","article-title":"Comparative analysis of deep learning-based anomaly detection models for gps spoofing detection","volume-title":"Master\u2019s thesis","author":"Mirzakhaninafchi","year":"2024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01163"},{"key":"ref27","first-page":"1842","article-title":"Meta-learning with memory-augmented neural networks","volume-title":"International conference on machine learning","author":"Santoro"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref29","article-title":"Av-gps-dataset: Gps spoofing data for autonomous vehicle ids research","author":"Abrar","year":"2024"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11471951.pdf?arnumber=11471951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:56:43Z","timestamp":1776974203000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11471951","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}