{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:23:21Z","timestamp":1773008601874,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377644.3377670","type":"proceedings-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T08:16:17Z","timestamp":1582704977000},"page":"146-151","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion"],"prefix":"10.1145","author":[{"given":"Lianxiao","family":"Meng","sequence":"first","affiliation":[{"name":"Information Security Research Center of HEU, Harbin Heilongjiang, China; National Key Laboratory of Science and Technology on Information System Security, Beijing, China"}]},{"given":"Shuangyin","family":"Ren","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China"}]},{"given":"Gaigai","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology of HEU, Harbin Heilongjiang, China; National Key Laboratory of Science and Technology on Information System Security, Beijing, China"}]},{"given":"Chao","family":"Yang","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China"}]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[{"name":"Information Security Research Center of HEU, Harbin Heilongjiang, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Information Engineering & Computer Science. IEEE","author":"Changhong F","year":"2009","unstructured":"Changhong F , Shunxiang W , Zhifeng L , Research and Design of the Differential Autonomous Mobile Robot Based on Multi-Sensor Information Fusion Technology[C ] International Conference on Information Engineering & Computer Science. IEEE , 2009 . Changhong F, Shunxiang W, Zhifeng L, et al. Research and Design of the Differential Autonomous Mobile Robot Based on Multi-Sensor Information Fusion Technology[C] International Conference on Information Engineering & Computer Science. IEEE, 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-014-0347-2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1665-6423(15)30004-3"},{"key":"e_1_3_2_1_4_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE) - Lausanne, Switzerland (2017","author":"Feng Z","year":"2017","unstructured":"Feng Z , Guan N , Lv M , [IEEE 2017 Design , Automation & Test in Europe Conference & Exhibition (DATE) - Lausanne, Switzerland (2017 .3.27-- 2017 .3.31)] Design, Automation & Test in Europe Conference & Exhibition (DATE) , 2017 - Efficient drone hijacking detection using onboard motion sensors[J]. 2017:1414--1419. Feng Z, Guan N, Lv M, et al. [IEEE 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE) - Lausanne, Switzerland (2017.3.27--2017.3.31)] Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 - Efficient drone hijacking detection using onboard motion sensors[J]. 2017:1414--1419."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2010.5509777"},{"issue":"3","key":"e_1_3_2_1_6_1","first-page":"353","article-title":"Ethical Issues of Transplanting Organs from Transgenic Animals into Human Beings[J]","volume":"16","author":"Manesh S B","year":"2014","unstructured":"Manesh S B , Samani R O , Manesh S B . Ethical Issues of Transplanting Organs from Transgenic Animals into Human Beings[J] . Cell Journal , 2014 , 16 ( 3 ): 353 -- 360 . Manesh S B, Samani R O, Manesh S B. Ethical Issues of Transplanting Organs from Transgenic Animals into Human Beings[J]. Cell Journal, 2014, 16(3):353--360.","journal-title":"Cell Journal"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2007.364210"},{"key":"e_1_3_2_1_8_1","volume-title":"Guidance and nonlinear control system for autonomous flight of minirotorcraft unmanned aerial vehicles. Journal of Field Robotics, 27(3), 311--334","author":"Kendoul F.","year":"2010","unstructured":"Kendoul , F. , Yu , Z. , & Nonami , K. ( 2010 ). Guidance and nonlinear control system for autonomous flight of minirotorcraft unmanned aerial vehicles. Journal of Field Robotics, 27(3), 311--334 . Kendoul, F., Yu, Z., & Nonami, K. (2010). Guidance and nonlinear control system for autonomous flight of minirotorcraft unmanned aerial vehicles. Journal of Field Robotics, 27(3), 311--334."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2013.6630805"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"USA","author":"Manesh J.","year":"2019","unstructured":"M. R. Manesh , J. Kenney , W. C. Hu , V. K. Devabhaktuni and N. Kaabouch , \" Detection of GPS Spoofing Attacks on Unmanned Aerial Systems,\" 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV , USA , 2019 , pp. 1 -- 6 . M. R. Manesh, J. Kenney, W. C. Hu, V. K. Devabhaktuni and N. Kaabouch, \"Detection of GPS Spoofing Attacks on Unmanned Aerial Systems,\" 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2019, pp. 1--6."},{"key":"e_1_3_2_1_11_1","first-page":"260","volume-title":"Hong Kong","author":"Liu R.","year":"2019","unstructured":"G. Liu , R. Zhang , C. Wang and L. Liu , \" Synchronization-Free GPS Spoofing Detection with Crowd sourced Air Traffic Control Data,\" 2019 20th IEEE International Conference on Mobile Data Management (MDM) , Hong Kong , Hong Kong , 2019 , pp. 260 -- 268 G. Liu, R. Zhang, C. Wang and L. Liu, \"Synchronization-Free GPS Spoofing Detection with Crowd sourced Air Traffic Control Data,\" 2019 20th IEEE International Conference on Mobile Data Management (MDM), Hong Kong, Hong Kong, 2019, pp. 260--268"},{"key":"e_1_3_2_1_12_1","volume-title":"Chen X., Huang X., Zhang J. (eds) Machine Learning for Cyber Security. ML4CS","author":"Liang C.","year":"2019","unstructured":"Liang C. ( 2019 ) Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System . In: Chen X., Huang X., Zhang J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science, vol 11806. Springer , Cham Liang C. et al. (2019) Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. In: Chen X., Huang X., Zhang J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science, vol 11806. Springer, Cham"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Shanghai","author":"Wang Z.","year":"2018","unstructured":"Q. Wang , Z. Lu , M. Gao and G. Qu , \" Edge Computing based GPS Spoofing Detection Methods,\" 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP) , Shanghai , China , 2018 , pp. 1 -- 5 . Q. Wang, Z. Lu, M. Gao and G. Qu, \"Edge Computing based GPS Spoofing Detection Methods,\" 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), Shanghai, China, 2018, pp. 1--5."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE Computer Society","author":"Qiao Y","year":"2017","unstructured":"Qiao Y , Zhang Y , Du X. A Vision-Based GPS-Spoofing Detection Method for Small UAVs[C] 2017 13th International Conference on Computational Intelligence and Security (CIS) . IEEE Computer Society , 2017 . Qiao Y, Zhang Y, Du X. A Vision-Based GPS-Spoofing Detection Method for Small UAVs[C] 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE Computer Society, 2017."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Huddersfield","author":"Panice","year":"2017","unstructured":"G. Panice et al., \"A SVM-based detection approach for GPS spoofing attacks to UAV,\" 2017 23rd International Conference on Automation and Computing (ICAC) , Huddersfield , 2017 , pp. 1 -- 11 . G. Panice et al., \"A SVM-based detection approach for GPS spoofing attacks to UAV,\" 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, 2017, pp. 1--11."},{"key":"e_1_3_2_1_16_1","volume-title":"IECON 2016 42nd Annual Conference of the IEEE Industrial Electronics Society. IEEE","author":"Zou Q","year":"2016","unstructured":"Zou Q , Huang S , Lin F , Detection of GPS spoofing based on UAV model estimation[C ] IECON 2016 42nd Annual Conference of the IEEE Industrial Electronics Society. IEEE , 2016 . Zou Q, Huang S, Lin F, et al. Detection of GPS spoofing based on UAV model estimation[C] IECON 2016 42nd Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00568625"},{"key":"e_1_3_2_1_18_1","volume-title":"Decision and Control. Data and Information Fusion Symposium, Signal Processing and Communications Symposium and Decision and Control Symposium. Proceedings (Cat. No.99EX251)","author":"Bedworth","year":"1999","unstructured":"M.D. Bedworth . Source diversity and feature-level fusion[C] 1999 Information , Decision and Control. Data and Information Fusion Symposium, Signal Processing and Communications Symposium and Decision and Control Symposium. Proceedings (Cat. No.99EX251) . IEEE, 1999 . M.D. Bedworth. Source diversity and feature-level fusion[C] 1999 Information, Decision and Control. Data and Information Fusion Symposium, Signal Processing and Communications Symposium and Decision and Control Symposium. Proceedings (Cat. No.99EX251). IEEE, 1999."},{"key":"e_1_3_2_1_19_1","unstructured":"WIKI\n  : Sensor Fusion https:\/\/en.wikipedia.org\/wiki\/Sensor_ fusion  WIKI: Sensor Fusion https:\/\/en.wikipedia.org\/wiki\/Sensor_ fusion"},{"key":"e_1_3_2_1_20_1","unstructured":"Multi _sensor fusion technology. https:\/\/blog.csdn.net\/xing dou520\/article\/details\/84103987  Multi _sensor fusion technology. https:\/\/blog.csdn.net\/xing dou520\/article\/details\/84103987"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2013.6630805"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Shen L Gao S Zhang Y etal A Coordination Speed Control Method Between Patient and Treadmill in the Rehabilitation Training[C] The Joint Conferences of 2015 International Conference on Computer Science and Engineering Technology (CSET2015) and 2015 International Conference on Medical Science and Biological Engineering (MSBE2015). 2016.  Shen L Gao S Zhang Y et al. A Coordination Speed Control Method Between Patient and Treadmill in the Rehabilitation Training[C] The Joint Conferences of 2015 International Conference on Computer Science and Engineering Technology (CSET2015) and 2015 International Conference on Medical Science and Biological Engineering (MSBE2015). 2016.","DOI":"10.1142\/9789814651011_0043"}],"event":{"name":"ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy","location":"Nanjing China","acronym":"ICCSP 2020","sponsor":["NJU Nanjing University"]},"container-title":["Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377644.3377670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:53Z","timestamp":1750203893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":22,"alternative-id":["10.1145\/3377644.3377670","10.1145\/3377644"],"URL":"https:\/\/doi.org\/10.1145\/3377644.3377670","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}