{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:12:12Z","timestamp":1748751132125,"version":"3.41.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/wcsp.2015.7341169","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T21:11:29Z","timestamp":1449177089000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["An ADS-B spoofing attack detection method based on LASSO ensemble empirical mode decomposition"],"prefix":"10.1109","author":[{"given":"Zhiyuan","family":"Shen","sequence":"first","affiliation":[]},{"given":"Han","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"750","article-title":"Impact of Public Key Enabled Applications on the Operation and Maintenance of Commercial Airplanes","author":"richard","year":"2007","journal-title":"AIAA Aviation Technology Integration and Operations (ATIO) Conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.313681"},{"key":"ref12","first-page":"1","article-title":"Wide Area Multilateration and ADS-B Proves Resilient in Afghanistan","volume":"a6","author":"jerry","year":"2012","journal-title":"Integrated Communications Navigation and Surveillance Conference (ICNS) 2012"},{"key":"ref13","first-page":"370","article-title":"A Technical Assessment of ADS-B and Multilateration Technology in the Gulf of Mexico","author":"anastasios","year":"2003","journal-title":"IEEE Radar Conference"},{"key":"ref14","first-page":"1","article-title":"Comparative analysis of ADS-B verification techniques","volume":"k3","author":"kovell","year":"2012","journal-title":"IEEE Integrated Communications Navigation and Surveillance Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2514\/6.2004-6263"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043627"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S1793536909000047"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1998.0193"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.fluid.31.1.417"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/521630"},{"key":"ref3","first-page":"1","article-title":"Towards ADS-B Implementation in Europe","author":"christos","year":"2008","journal-title":"Tyrrhenian International Workshop on Digital Communications - Enhanced Surveillance of Aircraft and Vehicles"},{"key":"ref6","first-page":"83","article-title":"Bringing Up Opensky: A Large-scale ADS-B Sensor Network for Research","author":"matthias","year":"2014","journal-title":"International Symposium on Information Processing in Sensor Networks"},{"key":"ref5","first-page":"78c87","article-title":"Security Analysis of the ADSB Implementation in the Next Generation Air Transportation system","volume":"4","author":"donald","year":"2011","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"ref8","article-title":"On the Security of the Automatic dependent Surveillance-Broadcast Protocol","author":"martin","year":"2015","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/MCOM.2014.6815901","article-title":"Realities and Challenges of NextGen Air Traffic Nanagement: the Case of ADS-B","volume":"52","author":"martin","year":"2014","journal-title":"IEEE Communication Magazine"},{"key":"ref2","first-page":"1","article-title":"ERASMUS contribution to the 2020 SESAR scenario","volume":"3a2","author":"gilles","year":"2008","journal-title":"IEEE\/AIAA Digital Avionics Systems Conference"},{"journal-title":"FAA FAA Aerospace Forecast Fiscal Years 2012&#x2013;2032","first-page":"1","year":"2012","key":"ref1"},{"key":"ref9","first-page":"64","article-title":"Lamming-Resistant Key Establishment Using Uncoordinated Frequency Hopping","author":"mario","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","article-title":"Regression Shrinkage and Selection via the LAASO","volume":"58","author":"tibshirani","year":"2008","journal-title":"J Royal Statist Soc"},{"key":"ref22","first-page":"1","article-title":"Numberical Optimization","author":"jorge","year":"2000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2012.2234123"}],"event":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","start":{"date-parts":[[2015,10,15]]},"location":"Nanjing, China","end":{"date-parts":[[2015,10,17]]}},"container-title":["2015 International Conference on Wireless Communications &amp; Signal Processing (WCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7322957\/7340966\/07341169.pdf?arnumber=7341169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T17:11:32Z","timestamp":1748711492000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7341169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wcsp.2015.7341169","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}