{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:54:04Z","timestamp":1764356044743,"version":"3.46.0"},"reference-count":5,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/msec.2025.3601756","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:06:28Z","timestamp":1764183988000},"page":"66-70","source":"Crossref","is-referenced-by-count":0,"title":["Spatiotemporal Consistency: A Universal Defense Against Attacks on Autonomous Systems"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4315-4160","authenticated-orcid":false,"given":"Raymond","family":"Muller","sequence":"first","affiliation":[{"name":"Lawrence Livermore National Laboratory, Livermore, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3130-0676","authenticated-orcid":false,"given":"Chenyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Arizona, Tucson, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8807-048X","authenticated-orcid":false,"given":"Ruoyu","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7712-1132","authenticated-orcid":false,"given":"Jean-Philippe","family":"Monteuuis","sequence":"additional","affiliation":[{"name":"Qualcomm, Boxborough, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3994-7416","authenticated-orcid":false,"given":"Yanmao","family":"Man","sequence":"additional","affiliation":[{"name":"Independent Researcher, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4073-0273","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0876-1181","authenticated-orcid":false,"given":"Ryan","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Arlington, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8644-1442","authenticated-orcid":false,"given":"Jonathan","family":"Petit","sequence":"additional","affiliation":[{"name":"Qualcomm, Boxborough, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7362-8905","authenticated-orcid":false,"given":"Z. Berkay","family":"Celik","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"6929","article-title":"That person moves like a car: Misclassification attack detection for autonomous systems using spatiotemporal consistency","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Man","year":"2023"},{"key":"ref2","first-page":"6327","article-title":"VOGUES: Validation of object guise using estimated components","volume-title":"Proc. 33rd USENIX Secur. Symp.","author":"Muller","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-024-51641-x"},{"article-title":"ADT: Agent-based dynamic thresholding for anomaly detection","year":"2023","author":"Yang","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690236"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/11269917\/11269948.pdf?arnumber=11269948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:45:02Z","timestamp":1764355502000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11269948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":5,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/msec.2025.3601756","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}