{"id":"https://openalex.org/W3157981443","doi":"https://doi.org/10.1109/ciss50987.2021.9400286","title":"Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security","display_name":"Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security","publication_year":2021,"publication_date":"2021-03-24","ids":{"openalex":"https://openalex.org/W3157981443","doi":"https://doi.org/10.1109/ciss50987.2021.9400286","mag":"3157981443"},"language":"en","primary_location":{"id":"doi:10.1109/ciss50987.2021.9400286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss50987.2021.9400286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035321347","display_name":"Lanier Watkins","orcid":"https://orcid.org/0000-0002-3322-1833"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]},{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]}],"countries":["JP","US"],"is_corresponding":true,"raw_author_name":"Lanier Watkins","raw_affiliation_strings":["Johns Hopkins University Information Security Institute"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University Information Security Institute","institution_ids":["https://openalex.org/I4210138172","https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014090606","display_name":"Denzel Hamilton","orcid":null},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Denzel Hamilton","raw_affiliation_strings":["Morgan State University"],"affiliations":[{"raw_affiliation_string":"Morgan State University","institution_ids":["https://openalex.org/I83909951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063608429","display_name":"Kevin Kornegay","orcid":"https://orcid.org/0000-0002-5233-0154"},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Kornegay","raw_affiliation_strings":["Morgan State University"],"affiliations":[{"raw_affiliation_string":"Morgan State University","institution_ids":["https://openalex.org/I83909951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111499449","display_name":"Aviel D. Rubin","orcid":"https://orcid.org/0000-0002-1061-8555"},"institutions":[{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]},{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["JP","US"],"is_corresponding":false,"raw_author_name":"Aviel Rubin","raw_affiliation_strings":["Johns Hopkins University Information Security Institute"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University Information Security Institute","institution_ids":["https://openalex.org/I4210138172","https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035321347"],"corresponding_institution_ids":["https://openalex.org/I145311948","https://openalex.org/I4210138172"],"apc_list":null,"apc_paid":null,"fwci":0.4192,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.68020258,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.8351478576660156},{"id":"https://openalex.org/keywords/autonomy","display_name":"Autonomy","score":0.7554312944412231},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6617405414581299},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6596640348434448},{"id":"https://openalex.org/keywords/premise","display_name":"Premise","score":0.5519042015075684},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.46499505639076233},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.42857179045677185},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.35683441162109375},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3476039469242096},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20891135931015015},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.20730015635490417},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15484383702278137},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08078119158744812}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.8351478576660156},{"id":"https://openalex.org/C65414064","wikidata":"https://www.wikidata.org/wiki/Q484105","display_name":"Autonomy","level":2,"score":0.7554312944412231},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6617405414581299},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6596640348434448},{"id":"https://openalex.org/C2778023277","wikidata":"https://www.wikidata.org/wiki/Q321703","display_name":"Premise","level":2,"score":0.5519042015075684},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46499505639076233},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.42857179045677185},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.35683441162109375},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3476039469242096},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20891135931015015},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.20730015635490417},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15484383702278137},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08078119158744812},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ciss50987.2021.9400286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss50987.2021.9400286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1930890093","https://openalex.org/W2564538084","https://openalex.org/W2740720719","https://openalex.org/W2762015674","https://openalex.org/W2774532011","https://openalex.org/W2785331481","https://openalex.org/W2788239209","https://openalex.org/W2807860498","https://openalex.org/W2895144199","https://openalex.org/W2899948687","https://openalex.org/W2908897238","https://openalex.org/W2953206368","https://openalex.org/W2965777010","https://openalex.org/W3116888175","https://openalex.org/W3122425653","https://openalex.org/W3162609778","https://openalex.org/W4243119296","https://openalex.org/W6787470269","https://openalex.org/W6795559805","https://openalex.org/W6824204983"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4247925126","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541","https://openalex.org/W3200286695","https://openalex.org/W4386322305"],"abstract_inverted_index":{"Our":[0],"premise":[1],"is":[2,35],"that":[3,12,36,144,165],"assuring":[4],"autonomy":[5,57,97,151],"has":[6,133],"operational":[7,56,74,150],"and":[8,11,58,98,123,152,177,180,190],"security":[9,132,153,178],"components":[10,122],"artificial":[13],"intelligence":[14],"(AI)":[15],"based":[16],"methods":[17],"are":[18,88],"appropriate":[19],"for":[20],"this":[21,41,183],"task;":[22],"however,":[23],"making":[24],"these":[25],"AI":[26,141,187],"techniques":[27],"\u201cExplainable\u201d":[28],"can":[29,92,109,160],"be":[30,64],"non-trivial.":[31],"Further,":[32],"our":[33],"position":[34],"a":[37,45,77],"reasonable":[38],"solution":[39],"to":[40,52,66,115,127],"problem":[42],"would":[43],"require":[44],"monitor":[46,62,91,108],"(preferably":[47],"at":[48],"the":[49,54,72,86,90,95,107,119,125,130,149,163,173,191],"ground":[50],"station)":[51],"access":[53],"drone's":[55,120,131],"individual":[59],"components.":[60],"The":[61],"could":[63],"developed":[65],"review":[67],"every":[68],"decision":[69],"made":[70],"by":[71],"native":[73,96],"autonomy.":[75],"When":[76],"significant":[78],"number":[79],"of":[80,118,154],"\u201cbad":[81],"decisions\u201d":[82],"(i.e.,":[83,185],"different":[84],"from":[85,112],"monitor)":[87],"made,":[89],"\u201clock":[93],"out\u201d":[94],"take":[99],"over":[100],"(establishing":[101],"an":[102,139],"explainable":[103],"\u201csafe":[104],"state\u201d).":[105],"Similarly,":[106],"use":[110],"data":[111],"mini-anomaly":[113],"detectors":[114],"observe":[116],"all":[117],"major":[121],"aggregate":[124],"feedback":[126],"determine":[128],"if":[129],"been":[134],"compromised.":[135],"Essentially,":[136],"we":[137],"propose":[138],"\u201cExplainable":[140],"Security\u201d":[142],"Monitor":[143],"not":[145],"only":[146],"simultaneously":[147],"assures":[148],"autonomous":[155],"drone":[156],"fleets":[157],"but":[158],"also":[159],"likely":[161],"output":[162],"logic":[164],"sourced":[166],"its":[167],"decisions.":[168],"This":[169],"paper":[170],"will":[171],"survey":[172],"current":[174],"autonomy,":[175],"assurance,":[176],"literature":[179],"point":[181],"out":[182],"gap":[184],"Explainable":[186],"Security":[188],"Monitor)":[189],"critical":[192],"need.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
