{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:07:13Z","timestamp":1743084433403,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031264085"},{"type":"electronic","value":"9783031264092"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26409-2_17","type":"book-chapter","created":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T09:04:46Z","timestamp":1678957486000},"page":"269-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for\u00a0Autonomous Platoons"],"prefix":"10.1007","author":[{"given":"Guoxin","family":"Sun","sequence":"first","affiliation":[]},{"given":"Tansu","family":"Alpcan","sequence":"additional","affiliation":[]},{"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[]},{"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,17]]},"reference":[{"issue":"6","key":"17_CR1","doi-asserted-by":"publisher","first-page":"3468","DOI":"10.1109\/TITS.2020.2983392","volume":"22","author":"F Alotibi","year":"2020","unstructured":"Alotibi, F., Abdelhakim, M.: Anomaly detection for cooperative adaptive cruise control in autonomous vehicles using statistical learning and kinematic model. IEEE Trans. Intell. Transp. Syst. 22(6), 3468\u20133478 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"9","key":"17_CR2","doi-asserted-by":"publisher","first-page":"15655","DOI":"10.1109\/TITS.2022.3144599","volume":"23","author":"S Boddupalli","year":"2022","unstructured":"Boddupalli, S., Rao, A.S., Ray, S.: Resilient cooperative adaptive cruise control for autonomous vehicles using machine learning. IEEE Trans. Intell. Transp. Syst. 23(9), 15655\u201315672 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Boeira, F., Barcellos, M.P., de Freitas, E.P., Vinel, A., Asplund, M.: Effects of colluding sybil nodes in message falsification attacks for vehicular platooning. In: 2017 IEEE Vehicular Networking Conference (VNC), pp. 53\u201360. IEEE (2017)","DOI":"10.1109\/VNC.2017.8275641"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Cao, Y., et al.: Adversarial sensor attack on lidar-based perception in autonomous driving. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2267\u20132281 (2019)","DOI":"10.1145\/3319535.3339815"},{"key":"17_CR5","unstructured":"Daw, A., Karpatne, A., Watkins, W., Read, J., Kumar, V.: Physics-guided neural networks (PGNN): an application in lake temperature modeling. arXiv preprint arXiv:1710.11431 (2017)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Garcia, L., Brasser, F., Cintuglu, M.H., Sadeghi, A.R., Mohammed, O.A., Zonouz, S.A.: Hey, my malware knows physics! attacking PLCS with physical model aware rootkit. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23313"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Goh, J., Adepu, S., Tan, M., Lee, Z.S.: Anomaly detection in cyber physical systems using recurrent neural networks. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 140\u2013145. IEEE (2017)","DOI":"10.1109\/HASE.2017.36"},{"key":"17_CR8","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"17_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100452","volume":"34","author":"Y Jia","year":"2021","unstructured":"Jia, Y., Wang, J., Poskitt, C.M., Chattopadhyay, S., Sun, J., Chen, Y.: Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems. Int. J. Crit. Infrastruct. Prot. 34, 100452 (2021)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"10","key":"17_CR10","doi-asserted-by":"publisher","first-page":"3309","DOI":"10.1109\/TPAMI.2020.2986319","volume":"43","author":"F Karim","year":"2020","unstructured":"Karim, F., Majumdar, S., Darabi, H.: Adversarial attacks on time series. IEEE Trans. Pattern Anal. Mach. Intell. 43(10), 3309\u20133320 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Khanapuri, E., Chintalapati, T., Sharma, R., Gerdes, R.: Learning-based adversarial agent detection and identification in cyber physical systems applied to autonomous vehicular platoon. In: 2019 IEEE\/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), pp. 39\u201345. IEEE (2019)","DOI":"10.1109\/SEsCPS.2019.00014"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Kravchik, M., Shabtai, A.: Detecting cyber attacks in industrial control systems using convolutional neural networks. In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, pp. 72\u201383 (2018)","DOI":"10.1145\/3264888.3264896"},{"key":"17_CR13","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S., et al.: Adversarial examples in the physical world (2016)"},{"issue":"6","key":"17_CR14","doi-asserted-by":"publisher","first-page":"5103","DOI":"10.1109\/JIOT.2020.2975654","volume":"7","author":"J Li","year":"2020","unstructured":"Li, J., Liu, Y., Chen, T., Xiao, Z., Li, Z., Wang, J.: Adversarial attacks and defenses on cyber-physical systems: a survey. IEEE Internet Things J. 7(6), 5103\u20135115 (2020)","journal-title":"IEEE Internet Things J."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Lopez, P.A., et al.: Microscopic traffic simulation using sumo. In: The 21st IEEE International Conference on Intelligent Transportation Systems. IEEE (2018). https:\/\/elib.dlr.de\/124092\/","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Segata, M., Joerer, S., Bloessl, B., Sommer, C., Dressler, F., Cigno, R.L.: Plexe: a platooning extension for veins. In: 2014 IEEE Vehicular Networking Conference (VNC), pp. 53\u201360. IEEE (2014)","DOI":"10.1109\/VNC.2014.7013309"},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1109\/TAES.2018.2799758","volume":"54","author":"MS Seyfio\u011flu","year":"2018","unstructured":"Seyfio\u011flu, M.S., \u00d6zbayo\u011flu, A.M., G\u00fcrb\u00fcz, S.Z.: Deep convolutional autoencoder for radar-based classification of similar aided and unaided human activities. IEEE Trans. Aerosp. Electron. Syst. 54(4), 1709\u20131723 (2018)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"17_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-981-287-158-9_5","volume-title":"Vehicular Ad-hoc Networks for Smart Cities","author":"IA Sumra","year":"2015","unstructured":"Sumra, I.A., Hasbullah, H.B., AbManan, J.B.: Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey. In: Laouiti, A., Qayyum, A., Mohamad Saad, M.N. (eds.) Vehicular Ad-hoc Networks for Smart Cities. AISC, vol. 306, pp. 51\u201361. Springer, Singapore (2015). https:\/\/doi.org\/10.1007\/978-981-287-158-9_5"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Sun, G., Alpcan, T., Rubinstein, B.I.P., Camtepe, S.: Strategic mitigation against wireless attacks on autonomous platoons. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. ECML-PKDD (2021)","DOI":"10.1007\/978-3-030-86514-6_5"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1016\/j.rser.2015.11.016","volume":"55","author":"P Tielens","year":"2016","unstructured":"Tielens, P., Van Hertem, D.: The relevance of inertia in power systems. Renew. Sustain. Energy Rev. 55, 999\u20131009 (2016)","journal-title":"Renew. Sustain. Energy Rev."},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 176\u2013183. IEEE (2010)","DOI":"10.1109\/WONS.2010.5437115"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Yang, L., Moubayed, A., Hamieh, I., Shami, A.: Tree-based intelligent intrusion detection system in internet of vehicles. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"key":"17_CR23","unstructured":"Yuan, X., et al.: Commandersong: a systematic approach for practical adversarial voice recognition. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 49\u201364 (2018)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, C., et al.: A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 1409\u20131416 (2019)","DOI":"10.1609\/aaai.v33i01.33011409"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26409-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T09:24:51Z","timestamp":1678958691000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26409-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031264085","9783031264092"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26409-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenoble","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1060","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"236","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17 demo track papers have been accepted from 28 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}