{"id":"https://openalex.org/W4317927981","doi":"https://doi.org/10.1145/3560905.3568532","title":"KITE","display_name":"KITE","publication_year":2022,"publication_date":"2022-11-06","ids":{"openalex":"https://openalex.org/W4317927981","doi":"https://doi.org/10.1145/3560905.3568532"},"language":"en","primary_location":{"id":"doi:10.1145/3560905.3568532","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3560905.3568532","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3560905.3568532","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3560905.3568532","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024947839","display_name":"Ming Gao","orcid":"https://orcid.org/0000-0002-1075-0564"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Gao","raw_affiliation_strings":["Zhejiang University, Hangzhou, China and ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China and ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101749693","display_name":"Lingfeng Zhang","orcid":"https://orcid.org/0000-0002-4048-4500"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingfeng Zhang","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049975132","display_name":"Leming Shen","orcid":"https://orcid.org/0000-0001-7661-6432"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Leming Shen","raw_affiliation_strings":["The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100715465","display_name":"Xiang Zou","orcid":"https://orcid.org/0000-0003-3090-3369"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Zou","raw_affiliation_strings":["Zhejiang University, Hangzhou, China and Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China and Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476","https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023885705","display_name":"Jinsong Han","orcid":"https://orcid.org/0000-0001-5064-1955"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinsong Han","raw_affiliation_strings":["Zhejiang University, Hangzhou, China and ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China and ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057037620","display_name":"Feng Lin","orcid":"https://orcid.org/0000-0001-8003-4793"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Lin","raw_affiliation_strings":["Zhejiang University, Hangzhou, China and ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China and ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105297718","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0002-1969-2591"},"institutions":[{"id":"https://openalex.org/I4210141176","display_name":"Communication University of Zhejiang","ror":"https://ror.org/04t7gxr16","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210141176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["Zhejiang University, Hangzhou, China and Zhejiang Provincial Key Laboratory of Blockchain and Cyberspace Governance, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China and Zhejiang Provincial Key Laboratory of Blockchain and Cyberspace Governance, Hangzhou, China","institution_ids":["https://openalex.org/I4210141176"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5024947839"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.8485,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.7269016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"696","last_page":"709"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6586413979530334},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.6345317959785461},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6094789505004883},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5980004072189331},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.58514004945755},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5784634947776794},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.5222933292388916},{"id":"https://openalex.org/keywords/kite","display_name":"Kite","score":0.48605042695999146},{"id":"https://openalex.org/keywords/transduction","display_name":"Transduction (biophysics)","score":0.4729180932044983},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4647919833660126},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41022825241088867},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15375378727912903},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.14983728528022766}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6586413979530334},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.6345317959785461},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6094789505004883},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5980004072189331},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.58514004945755},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5784634947776794},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.5222933292388916},{"id":"https://openalex.org/C2777229633","wikidata":"https://www.wikidata.org/wiki/Q107061","display_name":"Kite","level":2,"score":0.48605042695999146},{"id":"https://openalex.org/C15152581","wikidata":"https://www.wikidata.org/wiki/Q7833966","display_name":"Transduction (biophysics)","level":2,"score":0.4729180932044983},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4647919833660126},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41022825241088867},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15375378727912903},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.14983728528022766},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3560905.3568532","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3560905.3568532","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3560905.3568532","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3560905.3568532","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3560905.3568532","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3560905.3568532","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8299999833106995}],"awards":[{"id":"https://openalex.org/G6482864322","display_name":null,"funder_award_id":"U21A20462, 61872285, 62032021, 61772236, 62172359, and 61972348","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320317141","display_name":"Research Institute of Cyberspace Governance in Zhejiang University","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4317927981.pdf","grobid_xml":"https://content.openalex.org/works/W4317927981.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W13094485","https://openalex.org/W1591226258","https://openalex.org/W1659294350","https://openalex.org/W1921864689","https://openalex.org/W2003012460","https://openalex.org/W2015626305","https://openalex.org/W2062110419","https://openalex.org/W2106974856","https://openalex.org/W2114302432","https://openalex.org/W2117435128","https://openalex.org/W2320883753","https://openalex.org/W2786193123","https://openalex.org/W2889144763","https://openalex.org/W2938880258","https://openalex.org/W2953695968","https://openalex.org/W3115128472","https://openalex.org/W4213247124","https://openalex.org/W4233471450","https://openalex.org/W4234372861","https://openalex.org/W4299301436","https://openalex.org/W4353004773","https://openalex.org/W4365800068"],"related_works":["https://openalex.org/W2883428388","https://openalex.org/W1859517631","https://openalex.org/W4229448053","https://openalex.org/W1991958628","https://openalex.org/W2059768187","https://openalex.org/W4247925126","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W3174401943","https://openalex.org/W4377000511"],"abstract_inverted_index":{"In":[0],"cyber-physical":[1],"systems,":[2,61,134],"inertial":[3],"sensors":[4,25],"are":[5,136],"the":[6,21,40,51,55,67,75,105,113,120,129,149,157,168],"basis":[7],"for":[8,166],"identifying":[9],"motion":[10],"states":[11],"and":[12,78,94,173],"making":[13],"actuation":[14],"decisions.":[15],"However,":[16],"extensive":[17],"studies":[18],"have":[19],"proved":[20],"vulnerability":[22],"of":[23,50,69,107,116,122,151],"those":[24],"under":[26,98],"acoustic":[27,70,84,161],"transduction":[28,71,117,162],"attacks,":[29,72,163],"which":[30,135],"leverage":[31],"malicious":[32],"acoustics":[33],"to":[34,132,170],"trigger":[35],"sensor":[36],"measurement":[37],"errors.":[38],"Unfortunately,":[39],"threat":[41,68,115,159],"from":[42,160],"such":[43],"attacks":[44,118],"is":[45],"not":[46],"assessed":[47],"properly":[48],"because":[49],"incomplete":[52],"investigation":[53],"on":[54],"attack's":[56],"potential,":[57],"especially":[58],"towards":[59],"multiple-degree-of-freedom":[60,133],"e.g.,":[62],"drones.":[63],"To":[64],"thoroughly":[65],"explore":[66],"we":[73,127,164],"revisit":[74],"attack":[76,91,130],"model":[77],"design":[79],"a":[80],"new":[81],"yet":[82],"practical":[83,158],"modulation-based":[85],"attack,":[86],"named":[87],"KITE.":[88],"Such":[89],"an":[90],"enables":[92],"stable":[93],"controllable":[95],"injections,":[96],"even":[97],"frequency":[99],"offset":[100],"based":[101],"distortions":[102],"that":[103],"limit":[104],"effect":[106],"prior":[108,143],"attacking":[109,152],"approaches.":[110],"KITE":[111],"exploits":[112],"potential":[114],"without":[119],"need":[121],"strengthening":[123],"attackers'":[124],"abilities.":[125],"Furthermore,":[126],"extend":[128],"surface":[131],"more":[137],"widely":[138],"deployed":[139],"but":[140],"ignored":[141],"by":[142],"work.":[144],"Our":[145],"study":[146],"also":[147],"covers":[148],"scenario":[150],"moving":[153],"targets.":[154],"By":[155],"revealing":[156],"appeal":[165],"both":[167],"attention":[169],"their":[171],"harm":[172],"necessary":[174],"countermeasures.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2023-01-25T00:00:00"}
