{"id":"https://openalex.org/W7125954427","doi":"https://doi.org/10.1109/smc58881.2025.11342778","title":"An Experimental Study of Trojan Vulnerabilities in UAV Autonomous Landing","display_name":"An Experimental Study of Trojan Vulnerabilities in UAV Autonomous Landing","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125954427","doi":"https://doi.org/10.1109/smc58881.2025.11342778"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11342778","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342778","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084571605","display_name":"Reza Ahmari","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Reza Ahmari","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124081269","display_name":"Ahmad Mohammadi","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmad Mohammadi","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093279939","display_name":"Vahid Hemmati","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vahid Hemmati","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088956116","display_name":"Mohammed Mynuddin","orcid":"https://orcid.org/0000-0001-7898-5485"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Mynuddin","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018554930","display_name":"Mahmoud Nabil","orcid":"https://orcid.org/0000-0003-3059-7912"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud Nabil Mahmoud","raw_affiliation_strings":["MN. Mahmoud is With the University of Alabama,Tuscaloosa,USA,AL 35487"],"affiliations":[{"raw_affiliation_string":"MN. Mahmoud is With the University of Alabama,Tuscaloosa,USA,AL 35487","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088897776","display_name":"Parham M. Kebria","orcid":"https://orcid.org/0000-0001-7049-928X"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Parham Kebria","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124124856","display_name":"Abdollah Homaifar","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abdollah Homaifar","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,USA,NC 27411","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124025627","display_name":"Mehrdad Saif","orcid":null},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mehrdad Saif","raw_affiliation_strings":["Windsor University, Windsor,Department of Electrical and Computer Engineering,Canada"],"affiliations":[{"raw_affiliation_string":"Windsor University, Windsor,Department of Electrical and Computer Engineering,Canada","institution_ids":["https://openalex.org/I74413500"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5084571605"],"corresponding_institution_ids":["https://openalex.org/I35777872"],"apc_list":null,"apc_paid":null,"fwci":7.0705,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97097134,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"6253","last_page":"6258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9345999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9345999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.015699999406933784,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.012000000104308128,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.9476000070571899},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5855000019073486},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5461000204086304},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5171999931335449},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.40860000252723694},{"id":"https://openalex.org/keywords/interdiction","display_name":"Interdiction","score":0.37229999899864197},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.33180001378059387},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.30329999327659607}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.9476000070571899},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5855000019073486},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5472999811172485},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5461000204086304},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5171999931335449},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5145999789237976},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.40860000252723694},{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.37229999899864197},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.34459999203681946},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.33180001378059387},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C28849524","wikidata":"https://www.wikidata.org/wiki/Q181860","display_name":"Cruise missile","level":3,"score":0.2994999885559082},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.29190000891685486},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26660001277923584},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2556000053882599}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11342778","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342778","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","score":0.7443127036094666,"id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2162844575","https://openalex.org/W2586239168","https://openalex.org/W2781837462","https://openalex.org/W2788239209","https://openalex.org/W2803667073","https://openalex.org/W2953682668","https://openalex.org/W2954388198","https://openalex.org/W3169262488","https://openalex.org/W4307117543","https://openalex.org/W4362582226","https://openalex.org/W4389664961","https://openalex.org/W4400072132","https://openalex.org/W4402992428","https://openalex.org/W4404411081","https://openalex.org/W4406266988","https://openalex.org/W4406949855","https://openalex.org/W4408017688","https://openalex.org/W4409284804","https://openalex.org/W4416747871","https://openalex.org/W7125969637"],"related_works":[],"abstract_inverted_index":{"This":[0,125],"study":[1],"investigates":[2],"the":[3,55,65,74,128,138,145],"vulnerabilities":[4],"of":[5,67,147],"autonomous":[6],"navigation":[7],"and":[8,107,136],"landing":[9],"systems":[10],"in":[11,61,83],"Urban":[12,68],"Air":[13],"Mobility":[14],"(UAM)":[15],"vehicles.":[16],"Specifically,":[17],"it":[18],"focuses":[19],"on":[20,87,92,143],"Trojan":[21,34,96,134],"attacks":[22,35,135],"that":[23],"target":[24],"deep":[25],"learning":[26],"models,":[27],"such":[28],"as":[29],"Convolutional":[30],"Neural":[31],"Networks":[32],"(CNNs).":[33],"work":[36,126],"by":[37,95,133],"embedding":[38],"covert":[39],"triggers":[40,47],"within":[41],"a":[42,80,104],"model\u2019s":[43],"training":[44],"data.":[45],"These":[46],"cause":[48],"specific":[49],"failures":[50],"under":[51],"certain":[52],"conditions,":[53],"while":[54],"model":[56],"continues":[57],"to":[58,90,110,121],"perform":[59],"normally":[60],"other":[62],"situations.We":[63],"assessed":[64],"vulnerability":[66],"Autonomous":[69],"Aerial":[70],"Vehicles":[71],"(UAAVs)":[72],"using":[73],"DroNet":[75],"framework.":[76],"Our":[77],"experiments":[78],"showed":[79],"significant":[81],"drop":[82],"accuracy,":[84],"from":[85],"96.4%":[86],"clean":[88],"data":[89,93],"73.3%":[91],"triggered":[94],"attacks.":[97],"To":[98],"conduct":[99],"this":[100],"study,":[101],"we":[102],"collected":[103],"custom":[105],"dataset":[106],"trained":[108],"models":[109],"simulate":[111],"real-world":[112],"conditions.":[113],"We":[114],"also":[115],"developed":[116],"an":[117],"evaluation":[118],"framework":[119],"designed":[120],"identify":[122],"Trojan-infected":[123],"models.":[124],"demonstrates":[127],"potential":[129],"security":[130],"risks":[131],"posed":[132],"lays":[137],"groundwork":[139],"for":[140],"future":[141],"research":[142],"enhancing":[144],"resilience":[146],"UAM":[148],"systems.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-29T00:00:00"}
