{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T18:10:07Z","timestamp":1748455807338,"version":"3.41.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,7]]},"DOI":"10.1109\/icrca64997.2025.11011238","type":"proceedings-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T17:05:35Z","timestamp":1748365535000},"page":"160-170","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerabilities Analysis and Secure Controlling for Unmanned Aerial System Based on Reactive Synthesis"],"prefix":"10.1109","author":[{"given":"Dong","family":"Yang","sequence":"first","affiliation":[{"name":"National University of Defense Technology,College of Computer Science and Technology,Changsha,China"}]},{"given":"Wei","family":"Dong","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer Science and Technology,Changsha,China"}]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer Science and Technology,Changsha,China"}]},{"given":"Yanqi","family":"Dong","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer Science and Technology,Changsha,China"}]},{"given":"Sirui","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer Science and Technology,Changsha,China"}]},{"given":"Yijie","family":"Zheng","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer Science and Technology,Changsha,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.08.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2009.2030225"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-444-88074-1.50021-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11609773_24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6621819"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2019.00065"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"ref9","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Europe"},{"issue":"05","key":"ref10","first-page":"1076","article-title":"A survey on cyber security of unmanned aerial vehicles","volume":"42","author":"daojing","year":"2019","journal-title":"Chinese Journal of Computers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795496"},{"key":"ref12","article-title":"Maldrone the first backdoor for drones","author":"Sasi","year":"2015","journal-title":"Fb1h2s aka Rahul Sasi\u2019s Blog"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2514\/6.2012-2438"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.97"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LARS-SBR.2016.28"},{"issue":"2","key":"ref16","first-page":"13","article-title":"Security issues in flying ad-hoc networks (fanets)","volume":"9","author":"Bekmezci","year":"2016","journal-title":"Journal of Aeronautics and Space Technologies"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9707-1_18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14445\/23488549\/IJECE-V5I9P102"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2010.5650371"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18178\/ijmerr.9.1.1-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786824"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.2979873"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.3017343"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00868-z"}],"event":{"name":"2025 9th International Conference on Robotics, Control and Automation (ICRCA)","start":{"date-parts":[[2025,3,7]]},"location":"Shanghai, China","end":{"date-parts":[[2025,3,9]]}},"container-title":["2025 9th International Conference on Robotics, Control and Automation (ICRCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11010994\/11011008\/11011238.pdf?arnumber=11011238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T17:50:24Z","timestamp":1748454624000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11011238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icrca64997.2025.11011238","relation":{},"subject":[],"published":{"date-parts":[[2025,3,7]]}}}