{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:59Z","timestamp":1774541219567,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/tvt.2023.3346476","type":"journal-article","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T19:48:23Z","timestamp":1704916103000},"page":"7250-7261","source":"Crossref","is-referenced-by-count":8,"title":["Trustworthy Target Localization via ADMM in the Presence of Malicious Nodes"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5537-6716","authenticated-orcid":false,"given":"Slavisa","family":"Tomic","sequence":"first","affiliation":[{"name":"COPELABS, Universidade Lus&#x00F3;fona, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7315-8739","authenticated-orcid":false,"given":"Marko","family":"Beko","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100688"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.301.2000478"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921587"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3198273"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900413"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2963847"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2021.3119282"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2021.3051209"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3140084"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3324952"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380570"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.166"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2184094"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2877306"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2883578"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3071448"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3036849"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647742"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078216"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3104385"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3148199"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2023.3325063"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2322\/tjsass.60.312"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-019-0745-6"},{"issue":"2","key":"ref26","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"Warner","year":"2002","journal-title":"J. Secur. Admin."},{"key":"ref27","first-page":"73","article-title":"UWB-ED: Distance enlargement attack detection in ultra-wideband","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Singh","year":"2019"},{"key":"ref28","volume-title":"Fundamentals of Statistical Signal Processing: Estimation Theory","author":"Kay","year":"1993"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2045029"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref31","volume-title":"Fundamentals of Statistical Signal Processing: Detection Theory","author":"Kay","year":"1998"},{"key":"ref32","article-title":"UWB-based real time location system"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/10531102\/10387767.pdf?arnumber=10387767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T04:45:34Z","timestamp":1715834734000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10387767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":32,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2023.3346476","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}