Dr. Jiwon Seo
Yonsei University
Dr. Andrew Neish
Reliable Robotics
Sign in to:
2:05 |
Detecting GNSS Spoofing by Decomposition of the Complex Cross Ambiguity Function with Extended Coherent Integration Time
Sahil Ahmed, Samer Khanafseh, Boris Pervan, Illinois Institute of Technology |
|
2:27 |
Analysis of a Vector Tracking Aided Synthetic CRPA for Spoofing Mitigation
C. Anderson Givhan and Scott Martin, Auburn University Peer Reviewed |
|
2:49 |
Stochastic Modeling of the Radiation Pattern of an Airborne Single-Band GNSS Antenna
El-Mehdi Djelloul, Alexandre Chabory, Christophe Morlaas Rémi Douvenot, École Nationale de l'Aviation Civile |
|
3:11 |
Implementation of Data Authentication on SBAS
Todd Walter, Jason Anderson, Sherman Lo, Stanford University Peer Reviewed |
|
Break, 3:35 p.m. - 3:55 p.m. | ||
3:55 |
Low-Latency Authentication of Navigation Message
Sang Wu Kim, Iowa State University, and Khanh D. Pham, Air Force Research Laboratory Peer Reviewed |
|
4:17 |
Revisiting Combinatorial Watermarking Under SCER Adversarial Models
Jason Anderson, Sherman Lo, Todd Walter, Stanford University Peer Reviewed |
|
4:39 |
Performance Evaluation of LEO-Aided GPS Direct Position Estimation in Degraded Signal Environments
J. Tanner Koza, Auburn University; Samuel Morgan, The University of Texas at Austin; Scott Martin, Auburn University Peer Reviewed |