{"id":"https://openalex.org/W4390188068","doi":"https://doi.org/10.1109/tifs.2023.3346647","title":"Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks","display_name":"Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks","publication_year":2023,"publication_date":"2023-12-25","ids":{"openalex":"https://openalex.org/W4390188068","doi":"https://doi.org/10.1109/tifs.2023.3346647"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3346647","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3346647","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022407163","display_name":"Wenbing Tang","orcid":"https://orcid.org/0000-0003-0125-1939"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenbing Tang","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083918663","display_name":"Yuan Zhou","orcid":"https://orcid.org/0000-0002-1583-7570"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN","SG"],"is_corresponding":false,"raw_author_name":"Yuan Zhou","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Ave, Singapore"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Ave, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355692","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0001-7300-9215"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Ave, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Ave, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077615805","display_name":"Zuohua Ding","orcid":"https://orcid.org/0000-0002-9671-7836"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zuohua Ding","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100375018","display_name":"Jing Liu","orcid":"https://orcid.org/0000-0002-5347-8281"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Liu","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022407163"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":1.4148,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8571594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"2157","last_page":"2170"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9416999816894531,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9271000027656555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.80290287733078},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6765134334564209},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.6382268667221069},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6256464719772339},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5727311372756958},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.4934481680393219},{"id":"https://openalex.org/keywords/motion-planning","display_name":"Motion planning","score":0.46985092759132385},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.46907302737236023},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.4679986834526062},{"id":"https://openalex.org/keywords/motion","display_name":"Motion (physics)","score":0.4647860527038574},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.437118262052536},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.40327537059783936},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.39163678884506226},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33979448676109314}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80290287733078},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6765134334564209},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.6382268667221069},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6256464719772339},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5727311372756958},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.4934481680393219},{"id":"https://openalex.org/C81074085","wikidata":"https://www.wikidata.org/wiki/Q366872","display_name":"Motion planning","level":3,"score":0.46985092759132385},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.46907302737236023},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.4679986834526062},{"id":"https://openalex.org/C104114177","wikidata":"https://www.wikidata.org/wiki/Q79782","display_name":"Motion (physics)","level":2,"score":0.4647860527038574},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.437118262052536},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40327537059783936},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39163678884506226},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33979448676109314},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2023.3346647","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3346647","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/176231","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/176231","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G205818515","display_name":null,"funder_award_id":"62132014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3556809046","display_name":null,"funder_award_id":"2022YFC3302600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4844286744","display_name":null,"funder_award_id":"61972150","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8983560273","display_name":null,"funder_award_id":"NRF-NRFI06-2020-0001","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W192919555","https://openalex.org/W2510850936","https://openalex.org/W2617254988","https://openalex.org/W2761151150","https://openalex.org/W2809941692","https://openalex.org/W2890001928","https://openalex.org/W2891240227","https://openalex.org/W2913106923","https://openalex.org/W2945434604","https://openalex.org/W2959364614","https://openalex.org/W2963809389","https://openalex.org/W2963821308","https://openalex.org/W2964319688","https://openalex.org/W2966106606","https://openalex.org/W2970695854","https://openalex.org/W2978861658","https://openalex.org/W2984966510","https://openalex.org/W2991570803","https://openalex.org/W2995420159","https://openalex.org/W2997574889","https://openalex.org/W3006161194","https://openalex.org/W3008967682","https://openalex.org/W3035725276","https://openalex.org/W3044249689","https://openalex.org/W3091635810","https://openalex.org/W3098881644","https://openalex.org/W3130587811","https://openalex.org/W3139298425","https://openalex.org/W3158530087","https://openalex.org/W3161551690","https://openalex.org/W3162004380","https://openalex.org/W3167103746","https://openalex.org/W3177718249","https://openalex.org/W3184880618","https://openalex.org/W3187461039","https://openalex.org/W3199842479","https://openalex.org/W3206079449","https://openalex.org/W3209213092","https://openalex.org/W3209424681","https://openalex.org/W4226427184","https://openalex.org/W4231217887","https://openalex.org/W4281696864","https://openalex.org/W4285102188","https://openalex.org/W4285102394","https://openalex.org/W4293233278","https://openalex.org/W4294690666","https://openalex.org/W4297094416","https://openalex.org/W4319990511","https://openalex.org/W4324007071","https://openalex.org/W4386634496","https://openalex.org/W6681096077","https://openalex.org/W6784553926","https://openalex.org/W6846308036","https://openalex.org/W7049111048"],"related_works":["https://openalex.org/W2159052453","https://openalex.org/W3013693939","https://openalex.org/W2566616303","https://openalex.org/W3131327266","https://openalex.org/W2165717120","https://openalex.org/W2752972570","https://openalex.org/W4297051394","https://openalex.org/W2734887215","https://openalex.org/W2803255133","https://openalex.org/W2909431601"],"abstract_inverted_index":{"Deep":[0],"reinforcement":[1],"learning":[2],"(DRL)":[3],"is":[4,60,210,217],"widely":[5],"applied":[6,152],"in":[7,49,70,130,153,206,224],"motion":[8,109,226],"planning":[9,110,227],"for":[10,35],"multi-robot":[11,75],"systems":[12],"as":[13,83],"DRL":[14,30,122,196],"leverages":[15],"the":[16,22,29,40,50,56,63,71,95,142,174,178,207,248],"offline":[17],"training":[18],"process":[19],"to":[20,124,172,198],"improve":[21],"real-time":[23],"computation":[24],"efficiency.":[25],"In":[26,102],"DRL-based":[27],"methods,":[28],"models":[31],"compute":[32],"an":[33,167,191],"action":[34],"a":[36,74,100,107,117,133,170,201],"robot":[37],"based":[38],"on":[39],"states":[41,66],"of":[42,58,94,136,177,204,252],"its":[43],"surrounding":[44,96],"obstacles,":[45,179],"including":[46],"other":[47],"robots":[48],"system.":[51],"They":[52],"always":[53],"assume":[54],"that":[55,90,213,232],"number":[57,135,203],"obstacles":[59,97,205],"fixed":[61],"and":[62,87,155,158,169,219,241,250],"obtained":[64],"obstacles\u2019":[65],"are":[67],"reliable.":[68],"However,":[69],"real":[72],"world,":[73],"system":[76],"may":[77],"suffer":[78],"from":[79],"various":[80],"attacks,":[81,89],"such":[82,126],"remote":[84],"control":[85],"attacks":[86,129,240],"network":[88],"cause":[91],"wrong":[92],"positions":[93,176],"received":[98],"by":[99],"robot.":[101],"this":[103],"paper,":[104],"we":[105],"propose":[106],"robust":[108],"method":[111],"<monospace":[112,138,147,187,214,233,253],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[113,139,148,188,215,234,254],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">DAE-Crit-LSTM</monospace>":[114,140,149,189,216,235,255],",":[115],"integrating":[116],"denoising":[118],"autoencoder":[119],"(DAE)":[120],"with":[121,132,200],"models,":[123],"mitigate":[125,237],"position":[127,238],"deception":[128,239],"environments":[131],"different":[134],"obstacles.":[137],"shows":[141],"following":[143],"two":[144],"advantages.":[145],"First,":[146],"can":[150,220,236],"be":[151,221],"benign":[154],"attacked":[156],"scenarios":[157],"thus":[159],"does":[160],"not":[161],"require":[162],"any":[163],"detector.":[164],"It":[165,209],"learns":[166],"encoder":[168],"decoder":[171],"approximate":[173],"accurate":[175],"no":[180],"matter":[181],"under":[182],"attack":[183],"or":[184],"not.":[185],"Second,":[186],"applies":[190],"LSTM":[192],"(Long":[193],"Short-Term":[194],"Memory)-based":[195],"model":[197],"deal":[199],"variable":[202],"environment.":[208],"worth":[211],"noting":[212],"method-agnostic":[218],"easily":[222],"implemented":[223],"state-of-the-art":[225],"methods.":[228],"Comprehensive":[229],"experiments":[230],"show":[231],"guarantee":[242],"safe":[243],"motion.":[244],"We":[245],"also":[246],"demonstrate":[247],"effectiveness":[249],"generalization":[251],".":[256]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
