{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T13:06:16Z","timestamp":1777381576838,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427254","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"304-319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching"],"prefix":"10.1145","author":[{"given":"Nian","family":"Xue","sequence":"first","affiliation":[{"name":"New York University, United States of America"}]},{"given":"Liang","family":"Niu","sequence":"additional","affiliation":[{"name":"New York University United States of America"}]},{"given":"Xianbin","family":"Hong","sequence":"additional","affiliation":[{"name":"University of Liverpool United Kingdom"}]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics School of Artificial Intelligence and Shanghai Grandhonor Infotech Co. Ltd., China"}]},{"given":"Larissa","family":"Hoffaeller","sequence":"additional","affiliation":[{"name":"Hasso Plattner Institute Germany"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/navi.19"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2016.150148"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-009-9373-3"},{"key":"e_1_3_2_1_4_1","unstructured":"Sharan Chetlur Cliff Woolley Philippe Vandermersch Jonathan Cohen John Tran Bryan Catanzaro and Evan Shelhamer. 2014. cuDNN: Efficient Primitives for Deep Learning. CoRR abs\/1410.0759(2014). arxiv:1410.0759http:\/\/arxiv.org\/abs\/1410.0759  Sharan Chetlur Cliff Woolley Philippe Vandermersch Jonathan Cohen John Tran Bryan Catanzaro and Evan Shelhamer. 2014. cuDNN: Efficient Primitives for Deep Learning. CoRR abs\/1410.0759(2014). arxiv:1410.0759http:\/\/arxiv.org\/abs\/1410.0759"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038465"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463308005213"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.100"},{"key":"e_1_3_2_1_9_1","volume-title":"Cyber Conflict (CyCon), 2013 5th International Conference on. IEEE, 1\u201323","author":"Hartmann Kim","year":"2013"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700916"},{"key":"e_1_3_2_1_11_1","volume-title":"Single image haze removal using dark channel prior","author":"He Kaiming","year":"2010"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_13_1","first-page":"58","article-title":"Authenticating GNSS: proofs against spoofs, Part 2","volume":"2","author":"Hein Guenter","year":"2007","journal-title":"Inside GNSS"},{"key":"e_1_3_2_1_14_1","unstructured":"Olli-Pekka Heinisuo. 2000. OpenCV: Open Source Computer Vision Library. https:\/\/opencv.org\/.  Olli-Pekka Heinisuo. 2000. OpenCV: Open Source Computer Vision Library. https:\/\/opencv.org\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PEITS.2009.5406988"},{"key":"e_1_3_2_1_16_1","volume-title":"Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing","author":"Humphreys Todd","year":"2012"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ION GNSS international technical meeting of the satellite division, Vol.\u00a055","author":"Humphreys E","year":"2008"},{"key":"e_1_3_2_1_18_1","unstructured":"Forrest\u00a0N Iandola Song Han Matthew\u00a0W Moskewicz Khalid Ashraf William\u00a0J Dally and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and < 0.5 MB model size. arXiv preprint arXiv:1602.07360(2016).  Forrest\u00a0N Iandola Song Han Matthew\u00a0W Moskewicz Khalid Ashraf William\u00a0J Dally and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and < 0.5 MB model size. arXiv preprint arXiv:1602.07360(2016)."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel. 2020. Intel Movidius Myriad 2 VPU Enables Advanced Computer Vision and Deep Learning Features in Ultra-Compact DJI Spark Drone. Retrieved 2020-Oct-12 from https:\/\/www.movidius.com\/news\/intel-movidius-myriad-2-vpu-enables-advanced-computer-vision-and-deep-learn  Intel. 2020. Intel Movidius Myriad 2 VPU Enables Advanced Computer Vision and Deep Learning Features in Ultra-Compact DJI Spark Drone. Retrieved 2020-Oct-12 from https:\/\/www.movidius.com\/news\/intel-movidius-myriad-2-vpu-enables-advanced-computer-vision-and-deep-learn"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning(Proceedings of Machine Learning Research), Francis Bach and David Blei (Eds.), Vol.\u00a037","author":"Ioffe Sergey","year":"2015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2004.1338639"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/127072"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098270"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00012"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991092"},{"key":"e_1_3_2_1_26_1","unstructured":"Alexander\u00a0B. Jung Kentaro Wada Jon Crall Satoshi Tanaka Jake Graving Christoph Reinders Sarthak Yadav Joy Banerjee G\u00e1bor Vecsei Adam Kraft Zheng Rui Jirka Borovec Christian Vallentin Semen Zhydenko Kilian Pfeiffer Ben Cook Ismael Fern\u00e1ndez Fran\u00e7ois-Michel De\u00a0Rainville Chi-Hung Weng Abner Ayala-Acevedo Raphael Meudec Matias Laporte 2020. imgaug. Retrieved 2019-Feb-01 from https:\/\/github.com\/aleju\/imgaug  Alexander\u00a0B. Jung Kentaro Wada Jon Crall Satoshi Tanaka Jake Graving Christoph Reinders Sarthak Yadav Joy Banerjee G\u00e1bor Vecsei Adam Kraft Zheng Rui Jirka Borovec Christian Vallentin Semen Zhydenko Kilian Pfeiffer Ben Cook Ismael Fern\u00e1ndez Fran\u00e7ois-Michel De\u00a0Rainville Chi-Hung Weng Abner Ayala-Acevedo Raphael Meudec Matias Laporte 2020. imgaug. Retrieved 2019-Feb-01 from https:\/\/github.com\/aleju\/imgaug"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Alan Kim Brandon Wampler James Goppert Inseok Hwang and Hal Aldridge. 2012. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. In Infotech@Aerospace.  Alan Kim Brandon Wampler James Goppert Inseok Hwang and Hal Aldridge. 2012. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. In Infotech@Aerospace.","DOI":"10.2514\/6.2012-2438"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_17"},{"key":"e_1_3_2_1_30_1","volume-title":"ICLR Workshop","author":"Kurakin Alexey","year":"2017"},{"key":"e_1_3_2_1_31_1","volume-title":"2009 International Conference on Advanced Robotics. IEEE, 1\u20136.","author":"Lange Sven","year":"2009"},{"key":"e_1_3_2_1_32_1","volume-title":"Deep learning. nature 521, 7553","author":"LeCun Yann","year":"2015"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5039-5"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 7th International Joint Conference on Artificial Intelligence -","volume":"2","author":"D."},{"key":"e_1_3_2_1_35_1","volume-title":"Detection of GPS Spoofing Attacks on Unmanned Aerial Systems. In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1\u20136.","author":"Manesh Mohsen\u00a0Riahi","year":"2019"},{"key":"e_1_3_2_1_36_1","volume-title":"GPS for Dummies","author":"McNamara Joel"},{"key":"e_1_3_2_1_37_1","volume-title":"Radionavigation Laboratory Conference Proceedings.","author":"Montgomery Y","year":"2011"},{"key":"e_1_3_2_1_38_1","volume-title":"Post-Mission Autonomous Return and Precision Landing of UAV. In 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 1747\u20131752","author":"Nguyen Thien\u00a0Hoang","year":"2018"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382245"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309735"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/navi.44"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319719"},{"key":"e_1_3_2_1_43_1","volume-title":"Rapid Radio Reversing. Black Hat Asia","author":"Ossmann Michael","year":"2016"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753512"},{"key":"e_1_3_2_1_45_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. In NIPS-W.  Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. In NIPS-W."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2017.00074"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973753"},{"key":"e_1_3_2_1_49_1","volume-title":"Honeywell T-Hawk Aids Fukushima Daiichi Disaster Recovery: Unmanned Micro Air Vehicle Provides Video Feed to Remote Monitors","author":"Reavis B","year":"2011"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 16th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GPS\/GNSS","author":"Scott Logan","year":"2001"},{"key":"e_1_3_2_1_51_1","volume-title":"Recommendation ITU (2015)","author":"Series M","year":"2015"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463317000558"},{"key":"e_1_3_2_1_53_1","unstructured":"Scott Shane and David\u00a0E Sanger. 2011. Drone Crash in Iran reveals secret US surveillance effort. The New York Times 7(2011).  Scott Shane and David\u00a0E Sanger. 2011. Drone Crash in Iran reveals secret US surveillance effort. The New York Times 7(2011)."},{"key":"e_1_3_2_1_54_1","volume-title":"Radionavigation Laboratory Conference Proceedings.","author":"Shepard P","year":"2012"},{"key":"e_1_3_2_1_55_1","first-page":"373","article-title":"Drones: Updating the Fourth Amendment and the Technological Trespass Doctrine","volume":"16","author":"Spelman S\u00a0Alex","year":"2015","journal-title":"Nevada Law Journal"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_1_57_1","volume-title":"GPS Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule.IJ Network Security 19, 5","author":"Sun Minhong","year":"2017"},{"key":"e_1_3_2_1_58_1","volume-title":"International conference on machine learning. 1139\u20131147","author":"Sutskever Ilya","year":"2013"},{"key":"e_1_3_2_1_59_1","volume-title":"2013 International Technical Meeting of the Institute of Navigation. 884\u2013892","author":"Swaszek F","year":"2013"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.33012\/2017.15338"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_62_1","unstructured":"J Volpe. 2001. Vulnerability assessment of the transportation infrastructure relying on the global positioning system. In Final Report.  J Volpe. 2001. Vulnerability assessment of the transportation infrastructure relying on the global positioning system. In Final Report."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778048"},{"key":"e_1_3_2_1_64_1","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"Warner S","year":"2002","journal-title":"Journal of Security Administration"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/navi.14"},{"key":"e_1_3_2_1_67_1","volume-title":"2017 IEEE Workshop on. IEEE, 304\u2013308","author":"Zhang Yichi","year":"2017"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91467-1_13"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":67,"alternative-id":["10.1145\/3427228.3427254","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427254","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}