{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:29:23Z","timestamp":1743013763143,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031200984"},{"type":"electronic","value":"9783031200991"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-20099-1_11","type":"book-chapter","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:04:11Z","timestamp":1673535851000},"page":"130-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Extracting Random Secret Key Scheme for\u00a0One-Time Pad Under Intelligent Connected Vehicle"],"prefix":"10.1007","author":[{"given":"Junjie","family":"Chu","sequence":"first","affiliation":[]},{"given":"Mu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Shidian","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/MWC.2019.1800289","volume":"26","author":"Y Li","year":"2019","unstructured":"Li, Y., Luo, Q., Liu, J., Guo, H., Kato, N.: TSP security in intelligent and connected vehicles: challenges and solutions. IEEE Wirel. Commun. 26(3), 125\u2013131 (2019). https:\/\/doi.org\/10.1109\/MWC.2019.1800289","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3431233","volume":"54","author":"E Aliwa","year":"2021","unstructured":"Aliwa, E., Rana, O., Perera, C., et al.: Cyberattacks and countermeasures for in-vehicle networks. ACM Comput. Surv. (CSUR) 54(1), 1\u201337 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"5","key":"11_CR3","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/s12239-018-0085-1","volume":"19","author":"Q Hu","year":"2018","unstructured":"Hu, Q., Luo, F.: Review of secure communication approaches for in-vehicle network. Int. J. Autom. Technol. 19(5), 879\u2013894 (2018)","journal-title":"Int. J. Autom. Technol."},{"issue":"03","key":"11_CR4","first-page":"165","volume":"40","author":"K Liming","year":"2019","unstructured":"Liming, K., Haifeng, Y., Chunyi, C., et al.: Extraction of true random number based on atmospheric turbulence light flicker. Appl. Opt. 40(03), 165\u2013172 (2019)","journal-title":"Appl. Opt."},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"015004","DOI":"10.1103\/RevModPhys.89.015004","volume":"89","author":"M Herrero-Collantes","year":"2017","unstructured":"Herrero-Collantes, M., Garcia-Escartin, J.C.: Quantum random number generators. Rev. Mod. Phys. 89(1), 015004 (2017)","journal-title":"Rev. Mod. Phys."},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1103\/RevModPhys.82.1155","volume":"82","author":"AA Clerk","year":"2010","unstructured":"Clerk, A.A., Devoret, M.H., Girvin, S.M., et al.: Introduction to quantum noise, measurement, and amplification. Rev. Mod. Phys. 82(2), 1155 (2010)","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-021-25431-8","volume":"12","author":"L Vizioli","year":"2021","unstructured":"Vizioli, L., Moeller, S., Dowdle, L., et al.: Lowering the thermal noise barrier in functional brain mapping with magnetic resonance imaging. Nat. Commun. 12(1), 1\u201315 (2021)","journal-title":"Nat. Commun."},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s11071-015-1981-9","volume":"81","author":"E Avaro\u011flu","year":"2015","unstructured":"Avaro\u011flu, E., Tuncer, T., \u00d6zer, A.B., et al.: A novel chaos-based post-processing for TRNG. Nonlinear Dyn. 81(1), 189\u2013199 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"11_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TC.2007.250627","volume":"56","author":"B Sunar","year":"2007","unstructured":"Sunar, B., Martin, W.J., Stinson, D.R.: A provably secure true random number generator with built - in tolerance to active attacks. IEEE Trans. Comput. 56(1), 109\u2013119 (2007)","journal-title":"IEEE Trans. Comput."},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Rukhin, A., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800\u201322 Revision 1a, April 2010. https:\/\/doi.org\/10.6028\/NIST.SP.800-22r1a","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"105119","DOI":"10.1016\/j.mejo.2021.105119","volume":"114","author":"H Wu","year":"2021","unstructured":"Wu, H., Yin, Z., Xie, J., et al.: Design and implementation of true random number generators based on semiconductor superlattice chaos. Microelectron. J. 114, 105119 (2021)","journal-title":"Microelectron. J."},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TPWRS.2006.889140","volume":"22","author":"ME Baran","year":"2007","unstructured":"Baran, M.E., El-Markabi, I.M.: A multiagent-based dispatching scheme for distributed generators for voltage support on distribution feeders. IEEE Trans. Power Syst. 22(1), 52\u201359 (2007)","journal-title":"IEEE Trans. Power Syst."},{"key":"11_CR13","series-title":"Texts in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-17989-2_3","volume-title":"Fundamentals of Image Data Mining","author":"D Zhang","year":"2019","unstructured":"Zhang, D.: Wavelet transform. In: Fundamentals of Image Data Mining. TCS, pp. 35\u201344. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17989-2_3"},{"issue":"511","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1248","DOI":"10.1080\/01621459.2015.1012391","volume":"110","author":"F Liang","year":"2015","unstructured":"Liang, F., Song, Q., Qiu, P.: An equivalent measure of partial correlation coefficients for high-dimensional gaussian graphical models. J. Am. Stat. Assoc. 110(511), 1248\u20131265 (2015)","journal-title":"J. Am. Stat. Assoc."},{"issue":"6","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1214\/aos\/1015957472","volume":"28","author":"I Csisz\u00e1r","year":"2000","unstructured":"Csisz\u00e1r, I., Shields, P.C.: The consistency of the BIC Markov order estimator. Ann. Stat. 28(6), 1601\u20131619 (2000)","journal-title":"Ann. Stat."},{"issue":"1\u20132","key":"11_CR16","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1080\/10807039.2019.1568860","volume":"25","author":"F Su","year":"2019","unstructured":"Su, F., Wu, J., He, S.: Set pair analysis-Markov chain model for groundwater quality assessment and prediction: a case study of Xi\u2019an city, China. Hum. Ecol. Risk Assess. Int. J. 25(1\u20132), 158\u2013175 (2019)","journal-title":"Hum. Ecol. Risk Assess. Int. J."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Srivastava, A.: Accurate temperature estimation using noisy thermal sensors for Gaussian and non-Gaussian cases. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 19(9), 1617\u20131626 (2010)","DOI":"10.1109\/TVLSI.2010.2051567"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"092608","DOI":"10.1117\/1.OE.58.9.092608","volume":"58","author":"X Guo","year":"2019","unstructured":"Guo, X., Shu, Y., Kim, G.H., et al.: Pseudorandom orbiting stroke for freeform optics postprocessing. Opt. Eng. 58, 092608 (2019)","journal-title":"Opt. Eng."},{"issue":"3","key":"11_CR19","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/TCOMM.2009.03.060721","volume":"57","author":"Z Li","year":"2009","unstructured":"Li, Z., Cai, J., Chang, Y.: Determining the complexity of FH\/SS sequence by approximate entropy. IEEE Trans. Commun. 57(3), 812\u2013820 (2009)","journal-title":"IEEE Trans. Commun."},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-319-12060-7_18","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"M S\u00fds","year":"2014","unstructured":"S\u00fds, M., \u0158\u00edha, Z.: Faster randomness testing with the NIST statistical test suite. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 272\u2013284. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12060-7_18"},{"issue":"12","key":"11_CR21","doi-asserted-by":"publisher","first-page":"1205005","DOI":"10.3788\/IRLA201948.1205005","volume":"48","author":"L Zhonghui","year":"2019","unstructured":"Zhonghui, L., Chunyi, C., Haifeng, Y., et al.: Study on extraction of true random numbers based on propagated laser speckle in atmospheric turbulence. Infrared Laser Eng. 48(12), 1205005\u20131205005 (2019)","journal-title":"Infrared Laser Eng."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20099-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:19:51Z","timestamp":1673536791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20099-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031200984","9783031200991"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20099-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}