{"id":"https://openalex.org/W2969198928","doi":"https://doi.org/10.1109/icra.2019.8794385","title":"Security-Aware Synthesis of Human-UAV Protocols","display_name":"Security-Aware Synthesis of Human-UAV Protocols","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2969198928","doi":"https://doi.org/10.1109/icra.2019.8794385","mag":"2969198928"},"language":"en","primary_location":{"id":"doi:10.1109/icra.2019.8794385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra.2019.8794385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006106545","display_name":"Mahmoud Elfar","orcid":"https://orcid.org/0000-0002-5579-1255"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mahmoud Elfar","raw_affiliation_strings":["Department of Electrical & Computer Engineering, Duke University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Duke University, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082103092","display_name":"Haibei Zhu","orcid":"https://orcid.org/0000-0003-1565-267X"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haibei Zhu","raw_affiliation_strings":["Department of Electrical & Computer Engineering, Duke University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Duke University, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000895787","display_name":"Mary L. Cummings","orcid":"https://orcid.org/0000-0003-2557-6930"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. L. Cummings","raw_affiliation_strings":["Department of Electrical & Computer Engineering, Duke University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Duke University, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086742584","display_name":"Miroslav Paji\u0107","orcid":"https://orcid.org/0000-0002-5357-0117"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Miroslav Pajic","raw_affiliation_strings":["Department of Electrical & Computer Engineering, Duke University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Duke University, USA","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006106545"],"corresponding_institution_ids":["https://openalex.org/I170897317"],"apc_list":null,"apc_paid":null,"fwci":1.3006,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.85719978,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"8011","last_page":"8017"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/geolocation","display_name":"Geolocation","score":0.864788293838501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8422019481658936},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8253899812698364},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6819481253623962},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5411102175712585},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.47936588525772095},{"id":"https://openalex.org/keywords/operator","display_name":"Operator (biology)","score":0.45139169692993164},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.41248902678489685},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3977382779121399},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3953831195831299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24339354038238525},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17589527368545532},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.09479913115501404},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09155920147895813}],"concepts":[{"id":"https://openalex.org/C22041718","wikidata":"https://www.wikidata.org/wiki/Q638949","display_name":"Geolocation","level":2,"score":0.864788293838501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8422019481658936},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8253899812698364},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6819481253623962},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5411102175712585},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47936588525772095},{"id":"https://openalex.org/C17020691","wikidata":"https://www.wikidata.org/wiki/Q139677","display_name":"Operator (biology)","level":5,"score":0.45139169692993164},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.41248902678489685},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3977382779121399},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3953831195831299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24339354038238525},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17589527368545532},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.09479913115501404},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09155920147895813},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C86339819","wikidata":"https://www.wikidata.org/wiki/Q407384","display_name":"Transcription factor","level":3,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C158448853","wikidata":"https://www.wikidata.org/wiki/Q425218","display_name":"Repressor","level":4,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icra.2019.8794385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra.2019.8794385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1512912754","https://openalex.org/W1553059490","https://openalex.org/W1581800915","https://openalex.org/W1604244228","https://openalex.org/W1921864689","https://openalex.org/W1980763452","https://openalex.org/W1984893382","https://openalex.org/W2003530067","https://openalex.org/W2105773843","https://openalex.org/W2106272197","https://openalex.org/W2156340783","https://openalex.org/W2164933205","https://openalex.org/W2207856858","https://openalex.org/W2238898812","https://openalex.org/W2319542951","https://openalex.org/W2323089860","https://openalex.org/W2336416123","https://openalex.org/W2516521254","https://openalex.org/W2566510693","https://openalex.org/W2597062023","https://openalex.org/W2613752109","https://openalex.org/W2791385109","https://openalex.org/W2807105862","https://openalex.org/W2899043600","https://openalex.org/W2919486271","https://openalex.org/W2962749812","https://openalex.org/W2963117388","https://openalex.org/W2963890529","https://openalex.org/W2963896562","https://openalex.org/W2966004640","https://openalex.org/W6699840735","https://openalex.org/W6731781941","https://openalex.org/W6739554287","https://openalex.org/W6752112059"],"related_works":["https://openalex.org/W2163194970","https://openalex.org/W3105229732","https://openalex.org/W2799094075","https://openalex.org/W2883256816","https://openalex.org/W2892370851","https://openalex.org/W2945387931","https://openalex.org/W2187946387","https://openalex.org/W2052024186","https://openalex.org/W2939141610","https://openalex.org/W2171408034"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"we":[3,82,100,140,157],"synthesize":[4,146],"collaboration":[5],"protocols":[6,147,172],"for":[7,42,47,148],"human-unmanned":[8],"aerial":[9],"vehicle":[10],"(H-UAV)":[11],"command":[12],"and":[13,51,135,176],"control":[14],"systems,":[15],"where":[16,170],"the":[17,23,43,49,62,77,93,106,112,129,137,149,159,162,171],"human":[18,84,180],"operator":[19,50],"aids":[20],"in":[21],"securing":[22],"UAV":[24,63],"by":[25,179],"intermittently":[26],"performing":[27],"geolocation":[28,94,116],"tasks":[29],"to":[30,64,76,91,110,145],"confirm":[31],"its":[32,67,124],"reported":[33],"location.":[34],"We":[35,69],"first":[36],"present":[37],"a":[38,72,87,115,119,132,167],"stochastic":[39],"game-based":[40],"model":[41,130,143],"system":[44,138],"that":[45,96,152],"accounts":[46],"both":[48],"an":[52],"adversary":[53],"capable":[54],"of":[55,114,161],"launching":[56],"stealthy":[57],"false-data":[58],"injection":[59],"attacks,":[60],"causing":[61],"deviate":[65],"from":[66],"path.":[68],"also":[70],"describe":[71],"synthesis":[73,165],"challenge":[74],"due":[75],"UAV's":[78],"hidden-information":[79],"constraint.":[80],"Next,":[81],"perform":[83],"experiments":[85],"using":[86],"developed":[88],"RESCHU-SA":[89],"testbed":[90],"recognize":[92],"strategies":[95],"operators":[97],"adopt.":[98],"Furthermore,":[99],"deploy":[101],"machine":[102],"learning":[103],"techniques":[104],"on":[105,123],"collected":[107],"experimental":[108],"data":[109],"predict":[111],"correctness":[113],"task":[117],"at":[118],"given":[120],"location":[121],"based":[122],"geographical":[125],"features.":[126],"By":[127],"representing":[128],"as":[131],"delayed-action":[133],"game":[134],"formalizing":[136],"objectives,":[139],"utilize":[141],"off-the-shelf":[142],"checkers":[144],"human-UAV":[150],"coalition":[151],"satisfy":[153],"these":[154],"objectives.":[155],"Finally,":[156],"demonstrate":[158],"usefulness":[160],"H-UAV":[163],"protocol":[164],"through":[166],"case":[168],"study":[169],"are":[173],"experimentally":[174],"analyzed":[175],"further":[177],"evaluated":[178],"operators.":[181]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
