{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:20:00Z","timestamp":1770106800943,"version":"3.49.0"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"DoD Center of Excellence in Artificial Intelligence (AI) and Machine Learning (CoE-AIML) at Howard University with U.S. Army Research Laboratory","award":["W911NF- 20-2-0277"],"award-info":[{"award-number":["W911NF- 20-2-0277"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2026.3652406","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T21:59:20Z","timestamp":1768255160000},"page":"1424-1437","source":"Crossref","is-referenced-by-count":0,"title":["RL-Enabled Lightweight Language Models for GPS Spoofing Defense in Autonomous Vehicles"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1403-5688","authenticated-orcid":false,"given":"Hassan El","family":"Alami","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, DoD Center of Excellence in AI\/ML (CoE-AIML), Howard University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3638-3464","authenticated-orcid":false,"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, DoD Center of Excellence in AI\/ML (CoE-AIML), Howard University, Washington, DC, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3387737"},{"key":"ref2","volume-title":"What is Positioning, Navigation and Timing (PNT)","author":"Department of Transportation","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2024.3366147"},{"key":"ref4","article-title":"A dataset for gps spoofing detection on autonomous vehicles","author":"Aissou","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3321522"},{"key":"ref7","first-page":"3503","article-title":"An experimental study of GPS spoofing and takeover attacks on UAVs","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Sathaye"},{"key":"ref8","first-page":"3935","article-title":"Stars can tell: A robust method to defend against gps spoofing using off-the-shelf chipset","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Liu"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567087"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM58377.2023.10356314"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228877"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.33012\/2024.19543"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3413320"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3236274"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2024.3407811"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3298785"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.33012\/navi.636"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2024.3382074"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625567"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2023.3278496"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3373818"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3371378"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/127072"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2024.03.018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3269029"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMLCN.2024.3386649"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3257228"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3197817"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3279831"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IROS55552.2023.10342017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/navi.183"},{"key":"ref33","article-title":"GPS-IDS: An anomaly-based GPS spoofing attack detection framework for autonomous vehicles","author":"Abrar","year":"2024","journal-title":"arXiv:2405.08359"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.33012\/2016.14668"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11343878.pdf?arnumber=11343878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:43:24Z","timestamp":1770065004000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/tifs.2026.3652406","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}