{"id":"https://openalex.org/W4406395056","doi":"https://doi.org/10.1007/s10207-024-00978-x","title":"Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles","display_name":"Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles","publication_year":2025,"publication_date":"2025-01-15","ids":{"openalex":"https://openalex.org/W4406395056","doi":"https://doi.org/10.1007/s10207-024-00978-x"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-024-00978-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00978-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00978-x.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00978-x.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019676675","display_name":"Tala Talaei Khoei","orcid":"https://orcid.org/0000-0002-7630-9034"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tala Talaei\u00a0Khoei","raw_affiliation_strings":["Khoury College of Computer Sciences, Roux Institute at Northeastern University, Portland, ME, 04101, USA"],"affiliations":[{"raw_affiliation_string":"Khoury College of Computer Sciences, Roux Institute at Northeastern University, Portland, ME, 04101, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037545173","display_name":"Khair Al Shamaileh","orcid":"https://orcid.org/0000-0003-4112-2605"},"institutions":[{"id":"https://openalex.org/I117015748","display_name":"Purdue University Northwest","ror":"https://ror.org/04keq6987","country_code":"US","type":"education","lineage":["https://openalex.org/I117015748"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Khair Al\u00a0Shamaileh","raw_affiliation_strings":["Electrical and Computer Engineering Department, Purdue University Northwest, Hammond, IN, 46323, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Purdue University Northwest, Hammond, IN, 46323, USA","institution_ids":["https://openalex.org/I117015748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025730663","display_name":"V. Devabhaktuni","orcid":"https://orcid.org/0000-0001-9526-0347"},"institutions":[{"id":"https://openalex.org/I47301684","display_name":"Illinois State University","ror":"https://ror.org/050kcr883","country_code":"US","type":"education","lineage":["https://openalex.org/I47301684"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijaya Kumar Devabhaktuni","raw_affiliation_strings":["Electrical and Computer Engineering Department, Illinois State University, Normal, IL, 61761, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Illinois State University, Normal, IL, 61761, USA","institution_ids":["https://openalex.org/I47301684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071211423","display_name":"Naima Kaabouch","orcid":null},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naima Kaabouch","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of North Dakota, Grand Forks, ND, 58202, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of North Dakota, Grand Forks, ND, 58202, USA","institution_ids":["https://openalex.org/I24571045"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019676675"],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":20.0088,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.98601838,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"24","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8152784109115601},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.722822904586792},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.6684761047363281},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5031725764274597},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.370930552482605},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32709163427352905},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21533915400505066}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8152784109115601},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.722822904586792},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.6684761047363281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5031725764274597},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.370930552482605},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32709163427352905},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21533915400505066}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-024-00978-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00978-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00978-x.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-024-00978-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00978-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00978-x.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6184296758","display_name":null,"funder_award_id":"2006674","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4406395056.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1677182931","https://openalex.org/W1921864689","https://openalex.org/W2117539524","https://openalex.org/W2194775991","https://openalex.org/W2765906326","https://openalex.org/W2785735866","https://openalex.org/W2789876780","https://openalex.org/W2886061540","https://openalex.org/W2918472297","https://openalex.org/W2944772476","https://openalex.org/W2994954803","https://openalex.org/W2996356094","https://openalex.org/W3005166742","https://openalex.org/W3006481394","https://openalex.org/W3008363920","https://openalex.org/W3040837071","https://openalex.org/W3112040548","https://openalex.org/W3134269199","https://openalex.org/W3177921646","https://openalex.org/W3186928351","https://openalex.org/W3201498213","https://openalex.org/W4205608252","https://openalex.org/W4205637629","https://openalex.org/W4214844948","https://openalex.org/W4214897310","https://openalex.org/W4313225536"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2998478967","https://openalex.org/W2989910292","https://openalex.org/W2123299109","https://openalex.org/W3128793638","https://openalex.org/W2021230337","https://openalex.org/W4401097268","https://openalex.org/W4391805690","https://openalex.org/W2945504560","https://openalex.org/W4388934690"],"abstract_inverted_index":{"Abstract":[0],"Unmanned":[1],"aerial":[2],"vehicles":[3],"(UAVs)":[4],"are":[5,24],"prone":[6],"to":[7,55],"several":[8],"cyber-attacks,":[9],"including":[10],"global":[11],"positioning":[12],"system":[13],"(GPS)":[14],"spoofing.":[15],"The":[16,103],"use":[17],"of":[18,45,82,85,88,91,119,123,125,129,131,135,138,143,151,158],"machine":[19],"learning":[20,23],"and":[21,48,57,76,100,154],"deep":[22],"becoming":[25],"increasingly":[26],"common":[27],"for":[28,161],"UAV":[29],"GPS":[30,60],"spoofing":[31,61],"attack":[32],"detection;":[33],"however,":[34],"these":[35],"approaches":[36],"have":[37],"some":[38],"limitations,":[39],"such":[40],"as":[41,114],"a":[42,121,127,133,140,146,155],"high":[43],"rate":[44],"false":[46,92,136],"alarm":[47,137],"misdetection.":[49],"We":[50],"propose":[51],"using":[52],"capsule":[53,67,70,74],"networks":[54],"detect":[56],"classify":[58],"UAV-focused":[59],"attacks.":[62],"This":[63],"paper":[64],"compares":[65],"simple":[66],"networks,":[68,71,75],"efficient":[69],"dual":[72],"attention":[73],"convolutional":[77],"neural":[78],"network":[79,109],"in":[80],"terms":[81],"accuracy,":[83],"probability":[84,87,90,122,128,134],"detection,":[86],"misdetection,":[89],"alarm,":[93],"prediction":[94,141],"time,":[95],"training":[96,147],"time":[97,142,148],"per":[98,149],"sample,":[99],"memory":[101,156],"size.":[102],"results":[104],"indicate":[105],"that":[106],"the":[107,111],"Efficient-capsule":[108],"outperforms":[110],"other":[112],"models,":[113],"demonstrated":[115],"by":[116],"an":[117],"accuracy":[118],"99.1%,":[120],"detection":[124],"99.9%,":[126],"misdetection":[130],"0.1%,":[132],"0.37%,":[139],"0.5":[144],"seconds,":[145,153],"sample":[150],"0.2":[152],"size":[157],"123":[159],"mebibytes":[160],"binary":[162],"classification.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
