{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:27Z","timestamp":1767340107156},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/upinlbs.2018.8559759","type":"proceedings-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T01:12:02Z","timestamp":1544145122000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Effectiveness Analysis of the Covariance Matrix for Spoofing Detection Application"],"prefix":"10.1109","author":[{"given":"Changhui","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Boya","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Bo","sequence":"additional","affiliation":[]},{"given":"Ziyi","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2240706"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6621814"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2014.6851498"},{"key":"ref5","first-page":"790","article-title":"Detection and mitigation of spoofing attacks on a vector-based tracking gps receiver","author":"jafarnia-jahromi","year":"2012","journal-title":"Proceedings of the International Technical Meeting of the Institute of Navigation"},{"key":"ref8","first-page":"884","article-title":"Analysis of a simple, multi-receiver gps spoof detector","author":"swaszek","year":"2013","journal-title":"Proceedings of the International Technical Meeting of the Institute of Navigation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-014-0347-2"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1155\/2012\/127072","article-title":"Gps vulnerability to spoofing threats and a review of antispoofing techniques","author":"jafarniajahromi","year":"2012","journal-title":"International Journal of Navigation and Observation"},{"key":"ref9","article-title":"Gnss spoof detection based on pseudoranges from multiple receivers","author":"radin","year":"2015","journal-title":"Proceedings of the International Technical Meeting of the Institute of Navigation"},{"key":"ref1","first-page":"2314","article-title":"Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer","author":"humphreys","year":"2008","journal-title":"International Technical Meeting of the Satellite Division of The Institute of Navigation"}],"event":{"name":"2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS)","start":{"date-parts":[[2018,3,22]]},"location":"Wuhan, China","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8541054\/8559698\/08559759.pdf?arnumber=8559759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:47:40Z","timestamp":1643255260000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8559759\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/upinlbs.2018.8559759","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}