{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T05:40:50Z","timestamp":1771566050869,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N00014-20-1-2745,N00014-23-1-2206"],"award-info":[{"award-number":["N00014-20-1-2745,N00014-23-1-2206"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"publisher","award":["FA9550-19-1-0169"],"award-info":[{"award-number":["FA9550-19-1-0169"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1652544"],"award-info":[{"award-number":["CNS-1652544"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.1109\/icra48891.2023.10160900","type":"proceedings-article","created":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T17:20:56Z","timestamp":1688491256000},"page":"3346-3352","source":"Crossref","is-referenced-by-count":7,"title":["Stealthy Perception-based Attacks on Unmanned Aerial Vehicles"],"prefix":"10.1109","author":[{"given":"Amir","family":"Khazraei","sequence":"first","affiliation":[{"name":"Duke University,Department of Electrical and Computer Engineering,Durham,NC,USA,27708"}]},{"given":"Haocheng","family":"Meng","sequence":"additional","affiliation":[{"name":"Duke University,Department of Electrical and Computer Engineering,Durham,NC,USA,27708"}]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[{"name":"Duke University,Department of Electrical and Computer Engineering,Durham,NC,USA,27708"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCS.2014.2364723","article-title":"Covert misappropriation of networked control systems: Presenting a feedback structure","volume":"35","author":"smith","year":"2015","journal-title":"IEEE Control Systems Magazine"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.110035"},{"key":"ref34","year":"0","journal-title":"Prometheus - open source autonomous drone project"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2987307"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.04.047"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9992711"},{"key":"ref30","article-title":"Attacks on perception-based control systems: Modeling and fundamental limits","author":"khazraei","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref33","year":"0","journal-title":"Video record"},{"key":"ref10","first-page":"1","article-title":"False data injection attacks in control systems","author":"yilin","year":"0","journal-title":"First Workshop on Secure Control Systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8461050"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1515\/ata-2016-0015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147833"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9992988"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2898510"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-016-0399-z"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-010-9473-0"},{"key":"ref26","first-page":"399","article-title":"Certainty equivalent perception-based control","author":"dean","year":"2021","journal-title":"Learning for Dynamics and Control"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3129486"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS54341.2022.00030"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9197081"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2280","DOI":"10.1016\/j.patcog.2014.01.005","article-title":"Automatic generation and detection of highly reliable fiducial markers under occlusion","volume":"47","author":"garrido-jurado","year":"2014","journal-title":"Pattern Recognition"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref29","first-page":"713","article-title":"Resiliency of perception-based controllers against attacks","author":"khazraei","year":"2022","journal-title":"Learning for Dynamics and Control Conference"},{"key":"ref8","article-title":"Adversarial attacks and defenses for deep learning-based unmanned aerial vehicles","author":"tian","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9812056"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref4","first-page":"1","article-title":"The vulnerability of UAVs to cyber attacks - An approach to the risk assessment","author":"hartmann","year":"2013","journal-title":"2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2013) CyCon"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS51884.2021.9476881"},{"key":"ref5","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"ArXiv Preprint"}],"event":{"name":"2023 IEEE International Conference on Robotics and Automation (ICRA)","location":"London, United Kingdom","start":{"date-parts":[[2023,5,29]]},"end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 IEEE International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10160211\/10160212\/10160900.pdf?arnumber=10160900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:31:42Z","timestamp":1690219902000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10160900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icra48891.2023.10160900","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}