{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:04:27Z","timestamp":1730282667405,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,28]]},"DOI":"10.1109\/milcom55135.2022.10017482","type":"proceedings-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T19:14:24Z","timestamp":1674587664000},"page":"1065-1069","source":"Crossref","is-referenced-by-count":0,"title":["Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs"],"prefix":"10.1109","author":[{"given":"Kyo Hyun","family":"Kim","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign,Department of Computer Science"}]},{"given":"Denizkhan","family":"Kara","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign,Department of Computer Science"}]},{"given":"Vineetha","family":"Paruchuri","sequence":"additional","affiliation":[{"name":"The George Washington University,Department of Computer Science"}]},{"given":"Sibin","family":"Mohan","sequence":"additional","affiliation":[{"name":"The George Washington University,Department of Computer Science"}]},{"given":"Greg","family":"Kimberly","sequence":"additional","affiliation":[{"name":"Boeing Research &#x0026; Technology"}]},{"given":"Denis","family":"Osipychev","sequence":"additional","affiliation":[{"name":"Boeing Research &#x0026; Technology"}]},{"given":"Jae H.","family":"Kim","sequence":"additional","affiliation":[{"name":"Boeing Research &#x0026; Technology"}]},{"given":"Josh D.","family":"Eckhardt","sequence":"additional","affiliation":[{"name":"Boeing Research &#x0026; Technology"}]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[{"name":"Duke University,Department of Electrical and Computer Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94779-2_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50936-1_42"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICUS50048.2020.9274974"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET51692.2021.9419470"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICETCI55101.2022.9832068"},{"article-title":"The iranian drones in ukraines already crowded skies","volume-title":"NYT","author":"Ismay","key":"ref6"},{"volume-title":"How are \u2018kamikaze\u2019 drones being used by russia and ukraine?","year":"2022","key":"ref7"},{"article-title":"What are the suicide drones bombarding ukraine, and where did russia get them?","volume-title":"NPR","author":"Davis","key":"ref8"},{"key":"ref9","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Son","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2172\/1670875"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.33012\/2018.15977"},{"key":"ref13","article-title":"Controlling {UAVs} with sensor input spoofing attacks","volume-title":"10th USENIX workshop on offensive technologies (WOOT 16)","author":"Davidson","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2017.7991314"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.116036"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7140074"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2004.1389727"},{"key":"ref18","article-title":"Rectified linear units improve restricted boltzmann machines","author":"Nair","year":"2010","journal-title":"Icml"},{"key":"ref19","article-title":"Fast and accurate deep network learning by exponential linear units (elus)","author":"Clevert","year":"2015","journal-title":"arXiv preprint"},{"key":"ref20","article-title":"Which neural net architectures give rise to exploding and vanishing gradients?","volume":"31","author":"Hanin","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref21","first-page":"1527","article-title":"All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems","volume-title":"27th USENIX security symposium (USENIX security 18)","author":"Zeng","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2018.00026"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS54341.2022.00030"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GWS.2018.8686727"}],"event":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2022,11,28]]},"location":"Rockville, MD, USA","end":{"date-parts":[[2022,12,2]]}},"container-title":["MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10017432\/10017302\/10017482.pdf?arnumber=10017482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T07:21:24Z","timestamp":1707808884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,28]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/milcom55135.2022.10017482","relation":{},"subject":[],"published":{"date-parts":[[2022,11,28]]}}}