{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T05:55:57Z","timestamp":1774763757744,"version":"3.50.1"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072408"],"award-info":[{"award-number":["62072408"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LY20F020030"],"award-info":[{"award-number":["LY20F020030"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"New Century 151 Talent Project of Zhejiang Province"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3209552","type":"journal-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T20:34:19Z","timestamp":1664224459000},"page":"3734-3747","source":"Crossref","is-referenced-by-count":11,"title":["ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9956-3732","authenticated-orcid":false,"given":"Zhen","family":"Hong","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5343-3921","authenticated-orcid":false,"given":"Xiong","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2914-912X","authenticated-orcid":false,"given":"Zhenyu","family":"Wen","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1793-7732","authenticated-orcid":false,"given":"Leiqiang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3824-6693","authenticated-orcid":false,"given":"Huan","family":"Chen","sequence":"additional","affiliation":[{"name":"Faculty of Mechanical Engineering and Automation, Zhejiang Sci-Tech University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1427-1253","authenticated-orcid":false,"given":"Jie","family":"Su","sequence":"additional","affiliation":[{"name":"Open Laboratory, School of Computing, Newcastle University, Newcastle Upon Tyne, U.K."}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Autonomous Vehicle Market Outlook\u20132026","year":"2020"},{"key":"ref2","first-page":"94","article-title":"Taxonomy of security attacks in sensor networks and countermeasures","volume-title":"Proc. 1st IEEE Int. Conf. Syst. Integr. Rel. Improvements","volume":"25","author":"Roosta"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3176402"},{"key":"ref5","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","volume-title":"Proc. 24th USENIX Secur. Symp. (USENIX Secur.)","author":"Son"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2070772"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0022-460X(87)90471-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1115\/IMECE2007-42108"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927084"},{"issue":"34","key":"ref11","first-page":"64","article-title":"Discovering the STM32 microcontroller","volume":"3","author":"Brown","year":"2012","journal-title":"Cortex"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIME.2009.96"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/00207177708922261"},{"key":"ref14","first-page":"II-125","article-title":"Low-pass filter approximation with evolutionary techniques","volume-title":"Proc. 7th Int. Conf. Elect. Electron. Eng. (ELECO)","author":"Ayten"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.257"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.082"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.109864"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7364089"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2018.5047"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2017.8284810"},{"issue":"1","key":"ref21","first-page":"57","article-title":"Study on the ESP system based on fuzzy logic pid control and multibody dynamics","volume":"8","author":"Wang","year":"2012","journal-title":"J. Elect. Syst."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/41.937407"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/app6120382"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-7754-3_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/1687-3963-2007-074706"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref27","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller","year":"2013","journal-title":"Def Con"},{"key":"ref28","first-page":"1","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. 20th USENIX Secur. Symp.","author":"Checkoway"},{"key":"ref29","first-page":"91","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2019.8904129"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4108\/sis.2.4.e4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/0037549716685874"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4018\/IJITN.2020100108"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_12"},{"key":"ref36","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","volume-title":"Proc. 25th USENIX Secur. Symp. (USENIX Secur.)","author":"Cho"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s18124444"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2017.8098883"},{"key":"ref39","first-page":"703","article-title":"Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer","volume-title":"Proc. 22nd USENIX Secur. Symp. (USENIX Secur.)","author":"Verdult"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2016.2634623"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"ref42","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Eur."},{"key":"ref43","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan","year":"2016","journal-title":"Def Con"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2867917"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2847418"},{"key":"ref47","first-page":"26","article-title":"Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer","volume-title":"Proc. Int. Tech. Meeting Inst. Navigat.","author":"Montgomery"},{"key":"ref48","first-page":"1","article-title":"Sampling race: Bypassing timing-based analog active sensor spoofing detection on analog-digital systems","volume-title":"Proc. 10th USENIX Workshop Offensive Technol. (WOOT)","author":"Shin"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-2766(00)80022-5"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4071\/1551-4897-2.4.223"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2003.1279042"},{"key":"ref52","first-page":"166","article-title":"Vibration isolation of MEMS sensors for aerospace applications","volume-title":"SPIE Proceedings Series","author":"Dean","year":"2002"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JMEMS.2006.876779"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2005.1597754"},{"key":"ref55","volume-title":"High Angular Rate and High G Effects in the MEMS Gyro","author":"Weber"},{"key":"ref56","article-title":"Mitigation of the effects of high levels of high-frequency noise on MEMS gyroscopes","author":"Soobramaney","year":"2013"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2015-47378"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMI46757.2019.9101437"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA.2014.6870975"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s12200-015-0474-2"},{"key":"ref61","first-page":"349","article-title":"Software-based realtime recovery from sensor attacks on robotic vehicles","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses (RAID)","author":"Choi"},{"key":"ref62","volume-title":"Logistic Regression","author":"Wright","year":"1995"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1002\/cem.873"},{"issue":"1","key":"ref64","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"issue":"4","key":"ref65","first-page":"1","article-title":"XGBoost: Extreme gradient boosting","volume":"1","author":"Chen","year":"2015","journal-title":"R Package Version 0.4-2 1"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1694-0_12"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09903073.pdf?arnumber=9903073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T02:28:57Z","timestamp":1706063337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9903073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3209552","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}