{"id":"https://openalex.org/W7135096919","doi":"https://doi.org/10.1109/tifs.2026.3673573","title":"GCI-GANomaly: A Novel GPS Spoofing Detection Scheme Based on Grayscale Constellation Image","display_name":"GCI-GANomaly: A Novel GPS Spoofing Detection Scheme Based on Grayscale Constellation Image","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7135096919","doi":"https://doi.org/10.1109/tifs.2026.3673573"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3673573","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3673573","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jianing Wang","orcid":"https://orcid.org/0009-0007-7801-214X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianing Wang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0009-0007-7801-214X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018053861","display_name":"Yuanyu Zhang","orcid":"https://orcid.org/0000-0002-3248-5909"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyu Zhang","raw_affiliation_strings":["School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-3248-5909","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128321354","display_name":"Xinghui Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinghui Zhu","raw_affiliation_strings":["School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-7677-6193","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100608622","display_name":"Ji He","orcid":"https://orcid.org/0000-0003-3640-3488"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji He","raw_affiliation_strings":["School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0003-3640-3488","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042357091","display_name":"Shuangrui Zhao","orcid":"https://orcid.org/0000-0001-7677-4027"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuangrui Zhao","raw_affiliation_strings":["School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0001-7677-4027","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128877971","display_name":"Yulong Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-8448-705X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology and Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128855044","display_name":"Xiaohong Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Jiang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0001-9739-1930","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54754053,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"3022","last_page":"3037"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10655","display_name":"GNSS positioning and interference","score":0.34709998965263367,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10655","display_name":"GNSS positioning and interference","score":0.34709998965263367,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13282","display_name":"Automated Road and Building Extraction","score":0.19349999725818634,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12549","display_name":"Image and Object Detection Techniques","score":0.18070000410079956,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.6532999873161316},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.5232999920845032},{"id":"https://openalex.org/keywords/constellation","display_name":"Constellation","score":0.5166000127792358},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4959999918937683},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4404999911785126},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.36800000071525574}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8137999773025513},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6626999974250793},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6608999967575073},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.6532999873161316},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.5232999920845032},{"id":"https://openalex.org/C70352696","wikidata":"https://www.wikidata.org/wiki/Q8928","display_name":"Constellation","level":2,"score":0.5166000127792358},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4959999918937683},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4404999911785126},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.36800000071525574},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3375999927520752},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3231000006198883},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C124504099","wikidata":"https://www.wikidata.org/wiki/Q56933","display_name":"Image segmentation","level":3,"score":0.2703999876976013},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.26089999079704285},{"id":"https://openalex.org/C57493831","wikidata":"https://www.wikidata.org/wiki/Q3134666","display_name":"Projection (relational algebra)","level":2,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3673573","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3673573","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.5247898697853088}],"awards":[{"id":"https://openalex.org/G2405502826","display_name":null,"funder_award_id":"ZDRC2202","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4820269321","display_name":null,"funder_award_id":"92467201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5767509517","display_name":null,"funder_award_id":"62220106004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6081895214","display_name":null,"funder_award_id":"2024GX-YBXM-073","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G6897572917","display_name":null,"funder_award_id":"QTZX25080","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7811055721","display_name":null,"funder_award_id":"62202354","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1983340603","https://openalex.org/W2142584542","https://openalex.org/W2152326245","https://openalex.org/W2318186270","https://openalex.org/W2332630870","https://openalex.org/W2537123666","https://openalex.org/W2593150782","https://openalex.org/W2616215575","https://openalex.org/W2620661538","https://openalex.org/W2809835104","https://openalex.org/W2918465401","https://openalex.org/W2962858109","https://openalex.org/W2963045681","https://openalex.org/W2982145123","https://openalex.org/W3044615379","https://openalex.org/W3120334400","https://openalex.org/W3142951936","https://openalex.org/W3158153532","https://openalex.org/W3164438975","https://openalex.org/W3172553205","https://openalex.org/W3185879232","https://openalex.org/W4224092474","https://openalex.org/W4226483861","https://openalex.org/W4288781252","https://openalex.org/W4311411594","https://openalex.org/W4319593756","https://openalex.org/W4361267957","https://openalex.org/W4366697927","https://openalex.org/W4384519137","https://openalex.org/W4386590153","https://openalex.org/W4387400903","https://openalex.org/W4387407957","https://openalex.org/W4387987100","https://openalex.org/W4389723693","https://openalex.org/W4392940135","https://openalex.org/W4402673976","https://openalex.org/W4402917136","https://openalex.org/W4405001755","https://openalex.org/W4405182083","https://openalex.org/W4405785723","https://openalex.org/W4406094058"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"the":[3,8,27,37,45,60,101,110,115,129,145,169,189],"spoofing":[4,77,172,203],"detection":[5,78,102,130,164,199],"issue":[6],"for":[7,96],"Global":[9],"Positioning":[10],"System":[11],"(GPS)":[12],"based":[13,76,113,178],"on":[14,114,179],"radio":[15],"frequency":[16],"fingerprinting":[17],"(RFF).":[18],"We":[19,43,99,166],"first":[20],"introduce":[21],"a":[22,74,84,90,180],"new":[23,46],"RFF":[24,47],"feature":[25,48],"in":[26],"post-despreading":[28],"domain":[29],"of":[30,40,109,132,148,176],"GPS":[31,41,182],"signal":[32,134,183],"processing":[33],"to":[34,58,141],"better":[35,162],"capture":[36],"hardware":[38,61],"characteristics":[39,62],"satellites.":[42],"model":[44],"as":[49,209],"grayscale":[50],"constellation":[51],"images":[52],"(GCIs)":[53],"and":[54,104,143,174,205],"provide":[55],"in-depth":[56],"analysis":[57],"show":[59],"that":[63,126,185,195],"can":[64],"be":[65],"captured":[66],"by":[67,139,152],"GCIs.":[68],"Using":[69],"this":[70],"feature,":[71],"we":[72,186],"develop":[73],"deep-learning":[75],"framework":[79],"named":[80],"GCI-GANomaly,":[81],"which":[82],"applies":[83],"generative":[85],"adversarial":[86],"network":[87],"(GAN)":[88],"with":[89,154],"cosine":[91],"latent":[92],"anomaly":[93],"scoring":[94],"strategy":[95],"robust":[97,198],"detection.":[98],"evaluate":[100,168],"accuracy":[103,131],"false":[105],"positive":[106],"rate":[107],"(FPR)":[108],"proposed":[111],"method":[112],"open-source":[116],"Texas":[117],"Spoofing":[118],"Test":[119],"Battery":[120],"(TEXBAT)":[121],"dataset.":[122],"The":[123,192],"results":[124,193],"showed":[125,194],"GCI-GANomaly":[127,177,196],"improves":[128],"traditional":[133],"quality":[135],"monitoring":[136],"(SQM)-based":[137],"methods":[138,151],"up":[140],"30.8%":[142],"reduces":[144],"average":[146,163],"FPR":[147],"existing":[149],"RFF-based":[150],"4.2%":[153],"much":[155],"less":[156],"training":[157],"data":[158],"while":[159],"achieving":[160],"slightly":[161],"accuracy.":[165],"further":[167],"robustness":[170],"(against":[171],"power":[173,204],"time)":[175],"specific":[181],"dataset":[184],"collected":[187],"from":[188],"real-world":[190],"constellation.":[191],"achieves":[197],"performance":[200],"under":[201],"varying":[202],"shows":[206],"acceptable":[207],"stability":[208],"time":[210],"elapses.":[211]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-13T00:00:00"}
