|
[1]E. Basoglu、M.Yigit、B.Erol (2017) Evaluation of GPS Spoofing Impact on UAV Navigation System IEEE Aerospace Conference Proceedings, pp. 1-8, [2]A.Chapman, (2017) "GPS Spoofing" [3]Silvio Semanjski , Ivana Semanjski, Wim De Wilde and Alain Muls (2020) "Use of Supervised Machine Learning for GNSS Signal Spoofing Detection with Validation on Real-World Meaconing and Spoofing Data" [4] Taro Suzuki and Yoshiharu Amano (2021) "NLOS Multipath Classification of GNSS Signal Correlation Output Using Machine Learning" [5] Louis H. Estey and Charles M. Meertens. (1999).TEQC: The Multi-Purpose Toolkit for GPS/GLONASS Data. GPS Solutions, Vol. 3, No. 1, pp. 42-49 [6]Psiaki、Humphreys(2016 )GNSS Spoofing and Detection. [7]Alex Sherstinsky (2020), Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network [8]Sepp Hochreiter, Jürgen Schmidhuber, “Long Short-Term Memory”, in Neural Computation 9(8):1735-80, December 1997. [9]Understanding LSTM Networks:http://colah.github.io/posts/2015-08-Understanding-LSTMs/. [10]Phan Q.H. , Tan S.L. , McLoughlin I. (2013). GPS multipath mitigation: A nonlinear regression approach. GPS Solut. [11]Phan Q.H. , Tan S.L. , McLoughlin I, Vu D.L. (2013). A unified framework for GPS code and carrier-phase multipath mitigation using support vector regression. Adv. Artif. Neural Syst. [12]莊智清 and 黃國興, 電子導航. 全華科技, 2003. [13]Z. Liao, Y. Yu, and B. Chen, "Anomaly detection in GPS data based on visual analytics," in 2010 IEEE Symposium on Visual Analytics Science and Technology, 2010, pp. 51-58: IEEE. [14]X. Shen and S. Agrawal, "Kernel Density Estimation for An Anomaly Based Intrusion Detection System," in MLMTA, 2006. [15]E. Kaplan and C. Hegarty, Understanding GPS: principles and applications. Artech house, 2005. [16]K. C. Zeng et al., "All your GPS are belong to us: Towards stealthy manipulation of road navigation systems," in 27th USENIX Security Symposium (USENIX Security 18), 2018.
|