{"id":"https://openalex.org/W4394841742","doi":"https://doi.org/10.1109/tvt.2024.3387737","title":"Security Analysis for Autonomous Ground Vehicle Under Stealthy Sensor Attacks","display_name":"Security Analysis for Autonomous Ground Vehicle Under Stealthy Sensor Attacks","publication_year":2024,"publication_date":"2024-04-16","ids":{"openalex":"https://openalex.org/W4394841742","doi":"https://doi.org/10.1109/tvt.2024.3387737"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2024.3387737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2024.3387737","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046035584","display_name":"Zhaoxia Peng","orcid":"https://orcid.org/0000-0002-0275-9614"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhaoxia Peng","raw_affiliation_strings":["School of Transportation Science and Engineering, Beihang University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-0275-9614","affiliations":[{"raw_affiliation_string":"School of Transportation Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077998698","display_name":"Yingwen Zhang","orcid":"https://orcid.org/0000-0002-5293-7028"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingwen Zhang","raw_affiliation_strings":["School of Transportation Science and Engineering, Beihang University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-5293-7028","affiliations":[{"raw_affiliation_string":"School of Transportation Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061458979","display_name":"Guoguang Wen","orcid":"https://orcid.org/0000-0001-9128-1802"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoguang Wen","raw_affiliation_strings":["School of Mathematics and Statistics, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-9128-1802","affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jinhuan Wang","orcid":"https://orcid.org/0000-0003-2149-6685"},"institutions":[{"id":"https://openalex.org/I184843921","display_name":"Hebei University of Technology","ror":"https://ror.org/018hded08","country_code":"CN","type":"education","lineage":["https://openalex.org/I184843921"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhuan Wang","raw_affiliation_strings":["School of Science, Hebei University of Technology, Tianjin, China"],"raw_orcid":"https://orcid.org/0000-0003-2149-6685","affiliations":[{"raw_affiliation_string":"School of Science, Hebei University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I184843921"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074290686","display_name":"Tingwen Huang","orcid":"https://orcid.org/0000-0001-9610-846X"},"institutions":[{"id":"https://openalex.org/I58152225","display_name":"Texas A&M University at Qatar","ror":"https://ror.org/03vb4dm14","country_code":"QA","type":"education","lineage":["https://openalex.org/I58152225","https://openalex.org/I91045830"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Tingwen Huang","raw_affiliation_strings":["Science Program, Texas A&amp;M University at Qatar, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0001-9610-846X","affiliations":[{"raw_affiliation_string":"Science Program, Texas A&amp;M University at Qatar, Doha, Qatar","institution_ids":["https://openalex.org/I58152225"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046035584"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":1.3153,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.78789164,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"73","issue":"9","first_page":"12426","last_page":"12437"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8964999914169312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8964999914169312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.8934000134468079,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8194000124931335,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5101971626281738},{"id":"https://openalex.org/keywords/unmanned-ground-vehicle","display_name":"Unmanned ground vehicle","score":0.43770521879196167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39508676528930664},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3695474863052368},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3215344548225403},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1963731050491333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5101971626281738},{"id":"https://openalex.org/C2776548393","wikidata":"https://www.wikidata.org/wiki/Q2031473","display_name":"Unmanned ground vehicle","level":2,"score":0.43770521879196167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39508676528930664},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3695474863052368},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3215344548225403},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1963731050491333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2024.3387737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2024.3387737","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1704343669","display_name":null,"funder_award_id":"61977004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7080961259","display_name":null,"funder_award_id":"YWF-22-L-631","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1544016679","https://openalex.org/W1971604476","https://openalex.org/W1972523481","https://openalex.org/W2087932696","https://openalex.org/W2164755285","https://openalex.org/W2314224933","https://openalex.org/W2329192114","https://openalex.org/W2766003054","https://openalex.org/W2780545917","https://openalex.org/W2792608682","https://openalex.org/W2805258854","https://openalex.org/W2913636944","https://openalex.org/W2948566387","https://openalex.org/W2962227480","https://openalex.org/W2967730887","https://openalex.org/W2969886037","https://openalex.org/W2979346274","https://openalex.org/W2999806826","https://openalex.org/W2999880122","https://openalex.org/W3000280594","https://openalex.org/W3016473151","https://openalex.org/W3036612116","https://openalex.org/W3039187353","https://openalex.org/W3044866117","https://openalex.org/W3047544524","https://openalex.org/W3093615997","https://openalex.org/W3100782268","https://openalex.org/W3102834833","https://openalex.org/W3105640347","https://openalex.org/W3119551850","https://openalex.org/W3125869297","https://openalex.org/W3132773748","https://openalex.org/W3138139098","https://openalex.org/W3140377724","https://openalex.org/W3156515716","https://openalex.org/W3181418801","https://openalex.org/W3195632635","https://openalex.org/W3201895306","https://openalex.org/W3204654370","https://openalex.org/W3211862199","https://openalex.org/W4240790602","https://openalex.org/W4242471985","https://openalex.org/W4296870560"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2011003748","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W4391913857","https://openalex.org/W2350741829"],"abstract_inverted_index":{"Lateral":[0],"stability":[1,34,53,91],"is":[2,16,112,128],"a":[3,20,28,56,147,171,184],"remarkably":[4],"critical":[5],"metric":[6],"for":[7],"the":[8,32,40,50,65,71,77,83,89,96,102,110,134,153,175,178,197],"autonomous":[9],"ground":[10],"vehicle":[11],"(AGV),":[12],"and":[13,67,82,149],"its":[14],"loss":[15],"probable":[17],"to":[18,38,140,162,165,173],"cause":[19],"fatal":[21],"accident.":[22],"Various":[23],"vehicular":[24],"sensors,":[25],"which":[26,157,190],"play":[27],"key":[29],"role":[30],"in":[31,88,189,200],"lateral":[33,52,90,136],"system,":[35],"are":[36,86,138],"coordinated":[37],"monitor":[39],"AGV's":[41,51],"driving":[42],"states.":[43],"However,":[44],"sensor":[45,74,99,115,142],"attacks":[46,100],"will":[47],"inevitably":[48],"push":[49],"system":[54,198],"into":[55],"insecure":[57],"situation.":[58],"In":[59],"this":[60,191],"paper,":[61],"therefore,":[62],"we":[63,94,117,145,169,182],"investigate":[64],"security":[66],"insecurity":[68,154],"conditions":[69],"of":[70,98,133,155,177],"AGV":[72,111],"under":[73],"attacks.":[75,143],"Firstly,":[76],"dynamics":[78,135],"output":[79],"control":[80],"protocol":[81],"anomaly":[84],"detector":[85],"developed":[87],"system.":[92],"Then,":[93],"analyze":[95],"stealthiness":[97],"from":[101],"given":[103],"detector's":[104],"viewpoint.":[105],"To":[106],"describe":[107],"how":[108,161],"much":[109],"influenced":[113],"by":[114],"attacks,":[116],"propose":[118],"an":[119],"equivalence":[120],"condition":[121,151],"associated":[122],"with":[123],"state":[124],"variations.":[125],"Besides,":[126],"it":[127],"shown":[129],"that":[130],"internal":[131],"states":[132],"controller":[137],"immune":[139],"stealthy":[141,186],"Secondly,":[144],"give":[146,170],"necessary":[148],"sufficient":[150],"about":[152],"AGV,":[156],"also":[158],"motivates":[159],"us":[160],"design":[163,183],"parameters":[164],"ensure":[166],"cyber-security.":[167],"Finally,":[168],"simulation":[172],"demonstrate":[174],"feasibility":[176],"presented":[179],"methodology.":[180],"Specifically,":[181],"self-generated":[185],"attack":[187],"sequence,":[188],"sequence":[192],"does":[193],"not":[194],"involve":[195],"utilizing":[196],"data":[199],"real-time.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
