{"id":"https://openalex.org/W3007519464","doi":"https://doi.org/10.1145/3377644.3377670","title":"UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion","display_name":"UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W3007519464","doi":"https://doi.org/10.1145/3377644.3377670","mag":"3007519464"},"language":"en","primary_location":{"id":"doi:10.1145/3377644.3377670","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004499350","display_name":"Lianxiao Meng","orcid":"https://orcid.org/0000-0002-9471-0614"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lianxiao Meng","raw_affiliation_strings":["Information Security Research Center of HEU, Harbin Heilongjiang, China; National Key Laboratory of Science and Technology on Information System Security, Beijing, China","Information Security Research Center of HEU, Harbin Heilongjiang, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center of HEU, Harbin Heilongjiang, China; National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Information Security Research Center of HEU, Harbin Heilongjiang, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030564699","display_name":"Shuangyin Ren","orcid":"https://orcid.org/0000-0003-4439-8965"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuangyin Ren","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Information System Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015422592","display_name":"Gaigai Tang","orcid":"https://orcid.org/0000-0003-1798-5718"},"institutions":[{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaigai Tang","raw_affiliation_strings":["College of Computer Science and Technology of HEU, Harbin Heilongjiang, China; National Key Laboratory of Science and Technology on Information System Security, Beijing, China","College of Computer Science and Technology of HEU, Harbin Heilongjiang, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology of HEU, Harbin Heilongjiang, China; National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science and Technology of HEU, Harbin Heilongjiang, China","institution_ids":["https://openalex.org/I1300757298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100604019","display_name":"Chao Yang","orcid":"https://orcid.org/0000-0001-9276-5673"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chao Yang","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Information System Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100741279","display_name":"Yang Wu","orcid":"https://orcid.org/0000-0001-8010-6857"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Yang","raw_affiliation_strings":["Information Security Research Center of HEU, Harbin Heilongjiang, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center of HEU, Harbin Heilongjiang, China","institution_ids":["https://openalex.org/I4210126530"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004499350"],"corresponding_institution_ids":["https://openalex.org/I4210126530"],"apc_list":null,"apc_paid":null,"fwci":1.6609,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.86038852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"146","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10531","display_name":"Advanced Vision and Imaging","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10531","display_name":"Advanced Vision and Imaging","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10191","display_name":"Robotics and Sensor-Based Localization","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10586","display_name":"Robotic Path Planning Algorithms","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8184403777122498},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.7180606722831726},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7156524658203125},{"id":"https://openalex.org/keywords/sensor-fusion","display_name":"Sensor fusion","score":0.639655590057373},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.5589345693588257},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4952522814273834},{"id":"https://openalex.org/keywords/optical-flow","display_name":"Optical flow","score":0.4760674834251404},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3770553469657898},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35790956020355225},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.34289315342903137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2500750422477722},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11458000540733337}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8184403777122498},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.7180606722831726},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7156524658203125},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.639655590057373},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.5589345693588257},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4952522814273834},{"id":"https://openalex.org/C155542232","wikidata":"https://www.wikidata.org/wiki/Q736111","display_name":"Optical flow","level":3,"score":0.4760674834251404},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3770553469657898},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35790956020355225},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.34289315342903137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2500750422477722},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11458000540733337},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377644.3377670","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W295823309","https://openalex.org/W1968353223","https://openalex.org/W1990357615","https://openalex.org/W2007963058","https://openalex.org/W2069834277","https://openalex.org/W2082940498","https://openalex.org/W2097275045","https://openalex.org/W2187598515","https://openalex.org/W2333709229","https://openalex.org/W2568472206","https://openalex.org/W2765906326","https://openalex.org/W2785735866","https://openalex.org/W2914527150","https://openalex.org/W2918472297","https://openalex.org/W2967044743","https://openalex.org/W3083270461","https://openalex.org/W6600422077","https://openalex.org/W6745541373"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541","https://openalex.org/W3200286695","https://openalex.org/W2945504560"],"abstract_inverted_index":{"The":[0,102],"UAV":[1,35],"security":[2,12],"problem":[3],"is":[4,15,31,73,93,104,117],"becoming":[5],"more":[6,8],"and":[7,10,28,57,68,88,110],"serious,":[9],"the":[11,23,63,76,82,86,89,98,111],"of":[13,66,78,85],"sensors":[14],"receiving":[16],"much":[17],"attention.":[18],"UAV's":[19],"operation":[20],"depends":[21],"on":[22,55],"data":[24,30,72,80],"collected":[25],"by":[26],"sensors,":[27],"spoofed":[29],"prone":[32],"to":[33,41,95,119],"lead":[34],"making":[36],"wrong":[37],"decisions.":[38],"In":[39,61],"order":[40],"detect":[42],"sensor":[43,49,99],"spoofing,":[44],"we":[45],"propose":[46],"a":[47],"drone":[48],"spoofing":[50],"detection":[51,123],"(SSDGOF)":[52],"algorithm":[53],"based":[54],"GPS":[56,67,107],"optical":[58,69],"flow":[59,70],"fusion.":[60],"SSDGOF,":[62],"fusion":[64,79],"model":[65,77],"raw":[71],"compared":[74],"with":[75],"in":[81,122],"normal":[83],"state":[84],"drone,":[87],"difference":[90],"between":[91],"them":[92],"used":[94],"determine":[96],"whether":[97],"was":[100],"attacked.":[101],"SSDGOF":[103],"evaluated":[105],"through":[106],"deception":[108],"experiments,":[109],"results":[112],"show":[113],"that":[114],"this":[115],"method":[116],"superior":[118],"other":[120],"methods":[121],"efficiency.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
