{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:43:27Z","timestamp":1766580207029,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/twc.2024.3445648","type":"journal-article","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T17:38:15Z","timestamp":1724693895000},"page":"16666-16682","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Detection of Cooperative External Attacks in Wireless Localization Systems"],"prefix":"10.1109","volume":"23","author":[{"given":"Jinchun","family":"Yuan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Radio Frequency Heterogeneous Integration and Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"given":"Yufeng","family":"Cai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Radio Frequency Heterogeneous Integration and Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"given":"Yicong","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Radio Frequency Heterogeneous Integration and Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6443-8111","authenticated-orcid":false,"given":"Ning","family":"Xie","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Radio Frequency Heterogeneous Integration and Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5772-8428","authenticated-orcid":false,"given":"Peichang","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Radio Frequency Heterogeneous Integration and Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4534-7625","authenticated-orcid":false,"given":"Lei","family":"Huang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Radio Frequency Heterogeneous Integration and Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Tampines, Singapore"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JPROC.2005.849717"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s11277-018-5747-9"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/JSAC.2005.863855"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/SURV.2009.090308"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/GLOCOM.2008.ECP.720"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/GLOCOM.2001.965202"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TWC.2006.256985"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/IPIN.2010.5647794"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/INFCOM.2005.1498470"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/JSEN.2018.2877306"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/JIOT.2020.3036849"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/IPIN57070.2023.10332533"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TPDS.2012.42"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TII.2021.3076770"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TPDS.2008.166"},{"key":"ref16","first-page":"207","article-title":"SecDEv: Secure distance evaluation in wireless networks","volume-title":"Proc. Int. Conf. Netw. Services (ICNS)","author":"Dini"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TII.2017.2767631"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/JIOT.2021.3078216"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/JSEN.2014.2330760"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TSP.2018.2802459"},{"year":"2020","author":"Pestourie","article-title":"UWB secure ranging and localization","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TCOMM.2021.3098794"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TVT.2022.3148199"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/JIOT.2023.3303353"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TMC.2018.2883578"},{"volume-title":"Fundamentals of Statistical Signal Processing: Detection Theory","year":"1998","author":"Kay","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TWC.2018.2883726"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/JPROC.2018.2819638"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/JIOT.2019.2958079"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TCOM.1971.1090666"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TCOMM.2020.2965447"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TCOMM.2020.2967393"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/78.661335"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/WCNC.2011.5779198"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/ieeestd.2017.7900315"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/TIT.2021.3126346"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/JPROC.2008.2008853"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TCOMM.2017.2744641"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ISIT.2015.7282473"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7693\/10750505\/10648660.pdf?arnumber=10648660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T15:10:18Z","timestamp":1732720218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10648660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":39,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/twc.2024.3445648","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"type":"print","value":"1536-1276"},{"type":"electronic","value":"1558-2248"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}