{"id":"https://openalex.org/W4400120586","doi":"https://doi.org/10.1145/3634737.3644997","title":"Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks","display_name":"Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400120586","doi":"https://doi.org/10.1145/3634737.3644997"},"language":"en","primary_location":{"id":"doi:10.1145/3634737.3644997","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3644997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005171312","display_name":"Pritam Dash","orcid":"https://orcid.org/0000-0002-9818-4922"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Pritam Dash","raw_affiliation_strings":["University of British Columbia, Vancouver, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Vancouver, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025726299","display_name":"Guanpeng Li","orcid":"https://orcid.org/0000-0001-7773-7826"},"institutions":[{"id":"https://openalex.org/I126307644","display_name":"University of Iowa","ror":"https://ror.org/036jqmy94","country_code":"US","type":"education","lineage":["https://openalex.org/I126307644"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guanpeng Li","raw_affiliation_strings":["University of Iowa, Iowa City, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Iowa, Iowa City, United States of America","institution_ids":["https://openalex.org/I126307644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078335747","display_name":"Mehdi Karimibiuki","orcid":"https://orcid.org/0000-0002-2995-7354"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mehdi Karimibiuki","raw_affiliation_strings":["University of British Columbia, Vancouver, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Vancouver, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073641368","display_name":"Karthik Pattabiraman","orcid":"https://orcid.org/0000-0003-2380-3415"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Karthik Pattabiraman","raw_affiliation_strings":["University of British Columbia, Vancouver, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Vancouver, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5005171312"],"corresponding_institution_ids":["https://openalex.org/I141945490"],"apc_list":null,"apc_paid":null,"fwci":2.0967,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86945251,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"915","last_page":"929"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.9222980737686157},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6774585843086243},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6604938507080078},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3306678831577301},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11020782589912415}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.9222980737686157},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6774585843086243},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6604938507080078},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3306678831577301},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11020782589912415},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3634737.3644997","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3644997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W65153156","https://openalex.org/W1592601589","https://openalex.org/W1981364618","https://openalex.org/W2025864680","https://openalex.org/W2074040836","https://openalex.org/W2090934172","https://openalex.org/W2129504210","https://openalex.org/W2258876169","https://openalex.org/W2782500360","https://openalex.org/W2798493418","https://openalex.org/W2805597339","https://openalex.org/W2891240227","https://openalex.org/W2908471618","https://openalex.org/W2938880258","https://openalex.org/W2990924520","https://openalex.org/W3087381347","https://openalex.org/W3103553961","https://openalex.org/W3112040548","https://openalex.org/W3125882489","https://openalex.org/W3156877806","https://openalex.org/W3179897708","https://openalex.org/W3187461039","https://openalex.org/W3200969900","https://openalex.org/W4242582838"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W1978059949","https://openalex.org/W2512387791"],"abstract_inverted_index":{"Sensors":[0],"are":[1],"crucial":[2],"for":[3,36,99],"perception":[4],"and":[5,41,80,117,126],"autonomous":[6],"operation":[7],"in":[8,57,136],"robotic":[9],"vehicles":[10],"(RV).":[11],"Unfortunately,":[12],"RV":[13],"sensors":[14,64,84],"can":[15,50],"be":[16],"compromised":[17,100],"by":[18],"physical":[19,97],"attacks":[20,47],"such":[21],"as":[22],"sensor":[23,45],"tampering":[24],"or":[25,108],"spoofing.":[26],"In":[27],"this":[28],"paper,":[29],"we":[30,127],"present":[31],"DeLorean,":[32],"a":[33,68],"unified":[34],"framework":[35],"attack":[37,39,70,104],"detection,":[38],"diagnosis,":[40],"recovering":[42],"RVs":[43,52,120,133],"from":[44,54,134],"deception":[46],"(SDA).":[48],"DeLorean":[49,88,113],"recover":[51],"even":[53],"strong":[55],"SDAs":[56,122,135],"which":[58],"the":[59,75,82,139],"adversary":[60],"targets":[61],"multiple":[62],"heterogeneous":[63],"simultaneously.":[65],"We":[66,111],"propose":[67],"novel":[69],"diagnosis":[71],"technique":[72],"that":[73,129],"inspects":[74],"attack-induced":[76],"errors":[77],"under":[78,106,121],"SDAs,":[79],"identifies":[81],"targeted":[83,103],"using":[85],"causal":[86],"analysis.":[87],"then":[89],"uses":[90],"historic":[91],"state":[92],"information":[93],"to":[94],"selectively":[95],"reconstruct":[96],"states":[98],"sensors,":[101,125],"enabling":[102],"recovery":[105],"single":[107],"multi-sensor":[109],"SDAs.":[110],"evaluate":[112],"on":[114],"four":[115],"real":[116],"two":[118],"simulated":[119],"targeting":[123],"various":[124],"find":[128],"it":[130],"successfully":[131],"recovers":[132],"93%":[137],"of":[138],"cases.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
