Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic study of physical sensor attack hardness
Physical sensor attacks against robotic vehicles (RV) have become a serious concern due to
their prevalence and potential physical threat. However, RV software developers often do …
their prevalence and potential physical threat. However, RV software developers often do …
Specguard: Specification aware recovery for robotic autonomous vehicles from physical attacks
Robotic Autonomous Vehicles (RAVs) rely on their sensors for perception, and follow strict
mission specifications (eg, altitude, speed, and geofence constraints) for safe and timely …
mission specifications (eg, altitude, speed, and geofence constraints) for safe and timely …
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring
There are many various data-oriented attacks on robotic vehicles (RVs) that change the
inputs of an RV control program. While much research has been dedicated to detecting the …
inputs of an RV control program. While much research has been dedicated to detecting the …
Sensor attack online classification for UAVs using machine learning
Abstract Unmanned Aerial Vehicle (UAV) sensors play a vital role in maintaining flight safety
and stability. However, the increasing frequency and complexity of sensor attacks have …
and stability. However, the increasing frequency and complexity of sensor attacks have …
Sensor Deprivation Attacks for Stealthy UAV Manipulation
Unmanned Aerial Vehicles autonomously perform tasks with the use of state-of-the-art
control algorithms. These control algorithms rely on the freshness and correctness of sensor …
control algorithms. These control algorithms rely on the freshness and correctness of sensor …
Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent
Configurations are supported by most flight control systems, allowing users to control a flying
drone adapted to complexities such as environmental changes or mission alterations. Such …
drone adapted to complexities such as environmental changes or mission alterations. Such …
RobIn: Robust Invariant-Based Physical Attack Detector for Unmanned Aerial Vehicles
Q Zhong, S Guo, A Cui, K Pan… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are widespread in Internet of Things (IoT) systems
applications. However, UAVs suffer cyberspace security threats, especially physical attacks …
applications. However, UAVs suffer cyberspace security threats, especially physical attacks …
[PDF][PDF] ROS2-Based Simulation Framework for Cyberphysical Security Analysis of UAVs
We present a new simulator of Uncrewed Aerial Vehicles (UAVs) that is tailored to the needs
of testing cyber-physical security attacks and defenses. Recent investigations into UAV …
of testing cyber-physical security attacks and defenses. Recent investigations into UAV …
Siren Song: Manipulating Pose Estimation in XR Headsets Using Acoustic Attacks
Extended Reality (XR) experiences involve interactions between users, the real world, and
virtual content. A key step to enable these experiences is the XR headset sensing and …
virtual content. A key step to enable these experiences is the XR headset sensing and …
Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles
As our reliance on micro autonomous vehicles increases, security vulnerabilities and
software defects threaten the successful completion of tasks and missions. Recent work has …
software defects threaten the successful completion of tasks and missions. Recent work has …