{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:49:36Z","timestamp":1774021776346,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228877","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":13,"title":["Your Locations May Be Lies: Selective-PRS-Spoofing Attacks and Defence on 5G NR Positioning Systems"],"prefix":"10.1109","author":[{"given":"Kaixuan","family":"Gao","sequence":"first","affiliation":[{"name":"Harbin Engineering University,College of Computer Science and Technology,Harbin,China"}]},{"given":"Huiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Harbin Engineering University,College of Computer Science and Technology,Harbin,China"}]},{"given":"Hongwu","family":"Lv","sequence":"additional","affiliation":[{"name":"Harbin Engineering University,College of Computer Science and Technology,Harbin,China"}]},{"given":"Pengfei","family":"Gao","sequence":"additional","affiliation":[{"name":"China Unicom Heilongjiang Brench,Harbin,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"ref12","first-page":"900915","article-title":"Dont hand it over: Vulnerabilities in the handover procedure of cellular telecommunications","author":"bitsikas","year":"0"},{"key":"ref34","article-title":"Murat: Multi-RAT false base station detector","author":"nakarmi","year":"2021"},{"key":"ref15","article-title":"Study on 5G security enhancement against false base stations (FBS)","year":"2022","journal-title":"3GPP Technical Report 33 809"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090308"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3161148"},{"key":"ref30","article-title":"Practical attacks against privacy and availability in 4G\/LTE mobile communication systems","author":"shaik","year":"2015","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453082"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470098"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3157397"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2100615"},{"key":"ref17","first-page":"5572","article-title":"Hiding in plain signal: Physical signal overshadowing attack on LTE","author":"yang","year":"2019","journal-title":"Proceedings of the 28th USENIX Conference on Security Symposium"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2911558"},{"key":"ref19","article-title":"Physical channels and modulation","year":"2022","journal-title":"3GPP Technical Specification 38 211"},{"key":"ref18","article-title":"Security architecture and procedures for 5G system","year":"2022","journal-title":"3GPP Technical Specification 33 501"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"ref26","article-title":"Multi-scale context aggregation by dilated convolutions","author":"yu","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382245"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326082"},{"key":"ref28","article-title":"More than 1 billion people will have access to 5G coverage by the end of 2020","year":"2020"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1109\/CVPR.2016.308","article-title":"Rethinking the Inception architecture for computer vision","author":"szegedy","year":"2016","journal-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref29","article-title":"LTE network automation under threat","year":"2018","journal-title":"Technical Report"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.011.2100091"},{"key":"ref7","article-title":"Stage 2 functional specification of User Equipment (UE) positioning in NG-RAN","year":"2021","journal-title":"3GPP Technical Specification 38 305"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3088852"},{"key":"ref4","article-title":"NGMN 5G White Paper 2","year":"2020","journal-title":"NGMN Alliance white paper"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3146932"},{"key":"ref6","article-title":"NR Physical layer Measurements","year":"2021","journal-title":"3GPP Technical Specification 38 215"},{"key":"ref5","article-title":"Service requirements for next generation new services and markets","year":"2022","journal-title":"Technical Specification (TS) 22 261 3GPP"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","location":"New York City, NY, USA","start":{"date-parts":[[2023,5,17]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228877.pdf?arnumber=10228877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:44:24Z","timestamp":1695059064000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228877","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}