{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:41:30Z","timestamp":1773481290077,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11342778","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"6253-6258","source":"Crossref","is-referenced-by-count":3,"title":["An Experimental Study of Trojan Vulnerabilities in UAV Autonomous Landing"],"prefix":"10.1109","author":[{"given":"Reza","family":"Ahmari","sequence":"first","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"}]},{"given":"Ahmad","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"}]},{"given":"Vahid","family":"Hemmati","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"}]},{"given":"Mohammed","family":"Mynuddin","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"}]},{"given":"Mahmoud Nabil","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"MN. Mahmoud is With the University of Alabama,Tuscaloosa,USA,AL 35487"}]},{"given":"Parham","family":"Kebria","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"}]},{"given":"Abdollah","family":"Homaifar","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"}]},{"given":"Mehrdad","family":"Saif","sequence":"additional","affiliation":[{"name":"Windsor University, Windsor,Department of Electrical and Computer Engineering,Canada"}]}],"member":"263","reference":[{"key":"ref1","first-page":"80","article-title":"Evaluating trojan attack vulner-abilities in autonomous landing systems for urban air mobility","author":"Ahmari","year":"2025","journal-title":"Automation, Robotics & Communications for Industry 4.0\/5.0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2795643"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CAC.2017.8243120"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3447587.3447590"},{"issue":"14","key":"ref5","article-title":"A real-time semantic segmentation method based on stdc-ct for recognizing uav emergency landing zones","volume-title":"Sensors","volume":"23","author":"Jiang","year":"2023"},{"key":"ref6","article-title":"Image segmentation to identify safe landing zones for unmanned aerial vehicles","author":"Kinahan","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/1756829318757470"},{"key":"ref8","article-title":"A survey of neural trojan attacks and defenses in deep learning","author":"Wang","year":"2022"},{"key":"ref9","article-title":"Matter: Multi-stage adaptive thermal trojan for efficiency & resilience degradation","author":"Elahi","year":"2024"},{"key":"ref10","first-page":"74","article-title":"Gps spoofing attack detection on autonomous vehicles using modified dbscan with dynamic threshold","volume-title":"Proceedings of the 5th IFSA Winter Conference on Automation, Robotics & Communications for Industry 4.0\/5.0 (ARCI\u20192025)","author":"Mohammadi"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC63015.2025.10849307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SMC58881.2025.11343401"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2025.3559461"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102870"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3697830"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2016.7844895"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8755084"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INTCEC65580.2025.11256018"},{"key":"ref19","article-title":"Vision-based autonomous structural damage detection using data-driven methods","author":"Ataei","year":"2025"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DASC62030.2024.10749535"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8755087"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2024-Fall63153.2024.10758048"},{"key":"ref23","first-page":"77","article-title":"A data-driven approach for uav-ugv integration","author":"Ahmari","year":"2025","journal-title":"Automation, Robotics & Communications for Industry 4.0\/5.0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3342701"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3419800"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAEEI63658.2024.10899161"},{"key":"ref27","first-page":"453","article-title":"A survey of uav\/ugv collaborative systems","volume":"14","author":"\u00c7a\u015fka","year":"2014","journal-title":"CIE44&IMSS"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/aerospace9110634"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/0278364906061160"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11342778.pdf?arnumber=11342778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:50:14Z","timestamp":1770843014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11342778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11342778","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}