{"id":"https://openalex.org/W4385236723","doi":"https://doi.org/10.1109/eit57321.2023.10187274","title":"Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles","display_name":"Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles","publication_year":2023,"publication_date":"2023-05-18","ids":{"openalex":"https://openalex.org/W4385236723","doi":"https://doi.org/10.1109/eit57321.2023.10187274"},"language":"en","primary_location":{"id":"doi:10.1109/eit57321.2023.10187274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit57321.2023.10187274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019676675","display_name":"Tala Talaei Khoei","orcid":"https://orcid.org/0000-0002-7630-9034"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tala Talaei Khoei","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of North Dakota,Grand Forks,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of North Dakota,Grand Forks,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075406955","display_name":"Ghilas Aissou","orcid":null},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ghilas Aissou","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of North Dakota,Grand Forks,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of North Dakota,Grand Forks,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037545173","display_name":"Khair Al Shamaileh","orcid":"https://orcid.org/0000-0003-4112-2605"},"institutions":[{"id":"https://openalex.org/I117015748","display_name":"Purdue University Northwest","ror":"https://ror.org/04keq6987","country_code":"US","type":"education","lineage":["https://openalex.org/I117015748"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Khair Al Shamaileh","raw_affiliation_strings":["Purdue University Northwest,Electrical and Computer Engineering Department,Hammond,IN,USA,46323"],"affiliations":[{"raw_affiliation_string":"Purdue University Northwest,Electrical and Computer Engineering Department,Hammond,IN,USA,46323","institution_ids":["https://openalex.org/I117015748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025730663","display_name":"V. Devabhaktuni","orcid":"https://orcid.org/0000-0001-9526-0347"},"institutions":[{"id":"https://openalex.org/I7947594","display_name":"University of Maine","ror":"https://ror.org/01adr0w49","country_code":"US","type":"education","lineage":["https://openalex.org/I2802397601","https://openalex.org/I7947594"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijaya Kumar Devabhaktuni","raw_affiliation_strings":["The University of Maine,Electrical and Computer Engineering Department,Orono,ME,USA,04469"],"affiliations":[{"raw_affiliation_string":"The University of Maine,Electrical and Computer Engineering Department,Orono,ME,USA,04469","institution_ids":["https://openalex.org/I7947594"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071211423","display_name":"Naima Kaabouch","orcid":null},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naima Kaabouch","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of North Dakota,Grand Forks,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of North Dakota,Grand Forks,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5019676675"],"corresponding_institution_ids":["https://openalex.org/I24571045"],"apc_list":null,"apc_paid":null,"fwci":2.0872,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89541561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"340","last_page":"346"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7634076476097107},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7352569699287415},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6781718730926514},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6658058166503906},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.6563892364501953},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5923405289649963},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.5596938133239746},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.476830393075943},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.438412070274353},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3986668288707733},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3830164074897766},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10126054286956787}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7634076476097107},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7352569699287415},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6781718730926514},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6658058166503906},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.6563892364501953},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5923405289649963},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.5596938133239746},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.476830393075943},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.438412070274353},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3986668288707733},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3830164074897766},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10126054286956787},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit57321.2023.10187274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit57321.2023.10187274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6184296758","display_name":null,"funder_award_id":"2006674","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W2561208905","https://openalex.org/W2657631929","https://openalex.org/W2730952500","https://openalex.org/W2743265561","https://openalex.org/W2918472297","https://openalex.org/W2996356094","https://openalex.org/W3006481394","https://openalex.org/W3033421831","https://openalex.org/W3080282496","https://openalex.org/W3112040548","https://openalex.org/W3134269199","https://openalex.org/W3168732511","https://openalex.org/W3199615441","https://openalex.org/W3200780444","https://openalex.org/W4205608252","https://openalex.org/W4205637629","https://openalex.org/W4214844948","https://openalex.org/W4214897310","https://openalex.org/W4284883433","https://openalex.org/W4313225536","https://openalex.org/W4319439792"],"related_works":["https://openalex.org/W1983393909","https://openalex.org/W2040150569","https://openalex.org/W2468095590","https://openalex.org/W2132174924","https://openalex.org/W1911540634","https://openalex.org/W2013909972","https://openalex.org/W2280598164","https://openalex.org/W4388425184","https://openalex.org/W2189092700","https://openalex.org/W2993555267"],"abstract_inverted_index":{"Unmanned":[0],"Aerial":[1],"Networks":[2],"(UAVs)":[3],"are":[4,77],"prone":[5],"to":[6,22],"several":[7],"cyber-atttacks,":[8],"including":[9],"Global":[10],"Positioining":[11],"Spoofing":[12],"attacks.":[13],"For":[14],"this":[15,51,54],"purpose,":[16],"numerous":[17],"studies":[18,37],"have":[19],"been":[20],"conducted":[21],"detect,":[23],"classify,":[24],"and":[25,45,70,96,144],"mitigate":[26],"these":[27,36,153,172],"attacks,":[28],"using":[29],"Artificial":[30],"Intelligence":[31],"technqiues;":[32],"howver,":[33],"most":[34],"of":[35,81,113,117,119,123,128,135,141,148],"provided":[38],"techniques":[39],"with":[40,111],"low":[41],"detection,":[42],"high":[43,46],"misdetection,":[44],"bias":[47],"rates.":[48],"To":[49],"fill":[50],"gap,":[52],"in":[53,79],"paper,":[55],"we":[56],"propose":[57],"three":[58],"supervised":[59],"deep":[60],"learning":[61],"techniques,":[62],"namely":[63],"Deep":[64],"Neural":[65,68,106],"Network,":[66,69],"U":[67,105],"Long":[71,158],"Short":[72,159],"Term":[73,160],"Memory.":[74],"These":[75],"models":[76,110,169],"evaluated":[78],"terms":[80],"Accuracy,":[82],"Detection":[83],"Rate,":[84,86,89],"Misdetection":[85],"False":[87],"Alarm":[88],"Training":[90],"Time":[91],"per":[92,133],"Sample,":[93],"Prediction":[94],"Time,":[95],"Memory":[97,161],"Size.":[98],"The":[99],"simulation":[100],"results":[101,154],"indicated":[102],"that":[103,156],"the":[104,157,164],"Network":[107],"outperforms":[108],"other":[109,168],"accuracy":[112],"98.80%,":[114],"a":[115,121,125,130,138,145],"probability":[116],"detection":[118],"98.85%,":[120],"misdetection":[122],"1.15%,":[124],"false":[126],"alarm":[127],"1.8%,":[129],"training":[131],"time":[132,140],"sample":[134],"0.22":[136],"seconds,":[137,143],"prediction":[139],"0.2":[142],"memory":[146],"size":[147],"199.87":[149],"MiB.":[150],"In":[151],"addition,":[152],"depicted":[155],"model":[162],"provides":[163],"lowest":[165],"performance":[166],"among":[167],"for":[170],"detecting":[171],"attacks":[173],"on":[174],"UAVs.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2025-10-10T00:00:00"}
