{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:19:21Z","timestamp":1725787161055},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icra.2019.8794385","type":"proceedings-article","created":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T21:26:12Z","timestamp":1565645172000},"page":"8011-8017","source":"Crossref","is-referenced-by-count":6,"title":["Security-Aware Synthesis of Human-UAV Protocols"],"prefix":"10.1109","author":[{"given":"Mahmoud","family":"Elfar","sequence":"first","affiliation":[]},{"given":"Haibei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"M. L.","family":"Cummings","sequence":"additional","affiliation":[]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00418"},{"key":"ref31","article-title":"Sampling-based optimal control synthesis for multi-robot systems under global temporal tasks","author":"kantaros","year":"2018","journal-title":"IEEE Transactions on Automatic Control"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2018.2888578"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2016.2643239"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2847418"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3064809"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2676679"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref19","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"journal-title":"Modeling human supervisory control in heterogeneous unmanned vehicle systems","year":"2009","author":"nehme","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_40"},{"journal-title":"Probabilistic Robotics","year":"2005","author":"thrun","key":"ref27"},{"key":"ref3","article-title":"Data-driven probabilistic modeling and verification of human driver behavior","author":"sadigh","year":"2014","journal-title":"Formal Verification and Modeling in Human-Machine Systems Papers from the AAAI Spring Symposium"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2812906"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2046731"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7140066"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2530623"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663263"},{"key":"ref2","article-title":"An operator function taxonomy for unmanned aerial vehicle missions","author":"nehme","year":"2007","journal-title":"12th International Command and Control Research and Technology Symposium"},{"key":"ref9","article-title":"Assessing the spoofing threat: Development of a portable gps civilian spoofer","author":"humphreys","year":"2008","journal-title":"Radionavigation Laboratory Conference Proceedings"},{"journal-title":"Automation architecture for single operator multiple uav command and control","year":"2007","author":"cummings","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2898510"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-013-0183-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2014.87"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_13"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_10"},{"key":"ref26","article-title":"Human augmentation of uav cyber-attack detection","author":"zhu","year":"2018","journal-title":"International Journal of Human-Computer Interaction"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010388"}],"event":{"name":"2019 International Conference on Robotics and Automation (ICRA)","start":{"date-parts":[[2019,5,20]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2019,5,24]]}},"container-title":["2019 International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8780387\/8793254\/08794385.pdf?arnumber=8794385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:17:26Z","timestamp":1657840646000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8794385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icra.2019.8794385","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}