{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:52:21Z","timestamp":1775069541481,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hunan project on Science and Technology in China","award":["2017R3045"],"award-info":[{"award-number":["2017R3045"]}]},{"name":"National Key R&amp;D Program of China","award":["2017YFC0601701"],"award-info":[{"award-number":["2017YFC0601701"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/tvt.2019.2914477","type":"journal-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:58:46Z","timestamp":1556827126000},"page":"6557-6564","source":"Crossref","is-referenced-by-count":139,"title":["Covert Spoofing Algorithm of UAV Based on GPS\/INS-Integrated Navigation"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2483-5526","authenticated-orcid":false,"given":"Yan","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3819-9281","authenticated-orcid":false,"given":"Meiping","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Kanghua","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Junbo","family":"Tie","sequence":"additional","affiliation":[]},{"given":"Xian","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3022449"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-016-9252-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/0037549716685874"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"7769","DOI":"10.1109\/TVT.2018.2830345","article-title":"Combating the control signal spoofing attack in UAV systems","volume":"67","author":"ke-wen","year":"2018","journal-title":"IEEE Trans Veh Technol"},{"key":"ref10","article-title":"Researchers raise uncomfortable questions by showing how GPS navigation devices can be duped","year":"2008"},{"key":"ref11","first-page":"1","article-title":"Detection of spoofed GPS signals at code and carrier tracking level","author":"cavaleri","year":"2011","journal-title":"Proc Satellite Navig Technol Eur Workshop GNSS Signals Signal Process"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.icte.2016.02.006","article-title":"GNSS spoofing detection: Theoretical analysis and performance of the ratio test metric in open sky ?","volume":"2","author":"jie","year":"2016","journal-title":"ICT Express"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/127072"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-014-0407-3"},{"key":"ref16","first-page":"2646","article-title":"An evaluation of the vestigial signal defense for civil GPS anti-spoofing","author":"wesson","year":"2011","journal-title":"Proc 24th Int Tech Meeting Satellite Div Inst Navig"},{"key":"ref17","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","author":"humphreys","year":"2008","journal-title":"Proc 21st Int Tech Meeting Satellite Div Inst Navig"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"ref19","article-title":"GPS spoofing and the financial sector","author":"humphreys","year":"2011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.11003\/JPNT.2015.4.2.057"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.076"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2014.6851498"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700152"},{"key":"ref6","first-page":"191","article-title":"Principles of GNSS, inertial, and multisensor integrated navigation systems","volume":"67","author":"groves","year":"2013","journal-title":"Ind Robot"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.412"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-017-0601-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463315001010"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1049\/iet-spr.2015.0122","article-title":"Robust anti-jamming algorithm for high dynamic global positioning system receiver","volume":"10","author":"tan","year":"2016","journal-title":"IET Signal Process"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2015.12.029"},{"key":"ref9","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"warner","year":"2003","journal-title":"J Security Admin"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08422-0_66"},{"key":"ref20","first-page":"3591","article-title":"Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks","author":"shepard","year":"2012","journal-title":"Proc Int Tech Meet Satellite Division Inst Navig"},{"key":"ref22","first-page":"2776","article-title":"GNSS spoofing detection using two-antenna differential carrier phase","author":"psiaki","year":"2014","journal-title":"Proc Int Tech Meet Satellite Division Inst Navig"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2018.2848318"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/navi.183"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699094"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2665221"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/8764674\/08704896.pdf?arnumber=8704896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:47:22Z","timestamp":1657745242000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8704896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":34,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2019.2914477","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}