{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:08:02Z","timestamp":1751602082059,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319894997"},{"type":"electronic","value":"9783319895000"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89500-0_33","type":"book-chapter","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T13:35:44Z","timestamp":1523280944000},"page":"374-384","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Method to Effectively Detect Vulnerabilities on Path Planning of VIN"],"prefix":"10.1007","author":[{"given":"Jingjing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenjia","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yinqi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yingxiao","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,10]]},"reference":[{"issue":"3\u20134","key":"33_CR1","first-page":"279","volume":"8","author":"CJCH Watkins","year":"1992","unstructured":"Watkins, C.J.C.H., Dayan, P.: Q-learning. Mach. Learn. 8(3\u20134), 279\u2013292 (1992)","journal-title":"Mach. Learn."},{"issue":"2","key":"33_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/LRA.2015.2509024","volume":"1","author":"A Giusti","year":"2016","unstructured":"Giusti, A., Guzzi, J., Dan, C.C., et al.: A machine learning approach to visual perception of forest trails for mobile robots. IEEE Robot. Autom. Lett. 1(2), 661\u2013667 (2016)","journal-title":"IEEE Robot. Autom. Lett."},{"issue":"39","key":"33_CR3","first-page":"1","volume":"17","author":"S Levine","year":"2016","unstructured":"Levine, S., Finn, C., Darrell, T., et al.: End-to-end training of deep visuomotor policies. J. Mach. Learn. Res. 17(39), 1\u201340 (2016)","journal-title":"J. Mach. Learn. Res."},{"issue":"7540","key":"33_CR4","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih, V., Kavukcuoglu, K., Silver, D., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529\u2013533 (2015)","journal-title":"Nature"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Tamar, A., Wu, Y., Thomas, G., et al.: Value iteration networks. In: Advances in Neural Information Processing Systems, pp. 2154\u20132162 (2016)","DOI":"10.24963\/ijcai.2017\/700"},{"issue":"3","key":"33_CR6","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0169-2070(01)00110-8","volume":"18","author":"RJ Hyndman","year":"2002","unstructured":"Hyndman, R.J., Koehler, A.B., Snyder, R.D., et al.: A state space framework for automatic forecasting using exponential smoothing methods. Int. J. Forecast. 18(3), 439\u2013454 (2002)","journal-title":"Int. J. Forecast."},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/TSMC.1983.6313112","volume":"2","author":"RA Brooks","year":"1983","unstructured":"Brooks, R.A.: Solving the find-path problem by good representation of free space. IEEE Trans. Syst. Man Cybern. 2, 190\u2013197 (1983)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"2","key":"33_CR8","first-page":"132","volume":"27","author":"QB Zhu","year":"2005","unstructured":"Zhu, Q.B., Zhang, Y.: An ant colony algorithm based on grid method for mobile robot path planning. Robot 27(2), 132\u2013136 (2005)","journal-title":"Robot"},{"issue":"1","key":"33_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1107\/S0907444902018036","volume":"59","author":"TC Terwilliger","year":"2003","unstructured":"Terwilliger, T.C.: Automated main-chain model building by template matching and iterative fragment extension. Acta Crystallogr. Sect. D: Biol. Crystallogr. 59(1), 38\u201344 (2003)","journal-title":"Acta Crystallogr. Sect. D: Biol. Crystallogr."},{"key":"33_CR10","unstructured":"Warren, C.W.: Global path planning using artificial potential fields. In: Proceedings of 1989 IEEE International Conference on Robotics and Automation, pp. 316\u2013321. IEEE (1989)"},{"issue":"Dec","key":"33_CR11","first-page":"1107","volume":"4","author":"MG Lagoudakis","year":"2003","unstructured":"Lagoudakis, M.G., Parr, R.: Least-squares policy iteration. J. Mach. Learn. Res. 4(Dec), 1107\u20131149 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"33_CR12","unstructured":"Pineau, J., Gordon, G., Thrun, S.: Point-based value iteration: an anytime algorithm for POMDPs. In: IJCAI, vol. 3, pp. 1025\u20131032 (2003)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Dellaert, F., Fox, D., Burgard, W., et al.: Monte Carlo localization for mobile robots. In: Proceedings of 1999 IEEE International Conference on Robotics and Automation, vol. 2, pp. 1322\u20131328. IEEE (1999)","DOI":"10.1109\/ROBOT.1999.772544"},{"issue":"3","key":"33_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/203330.203343","volume":"38","author":"G Tesauro","year":"1995","unstructured":"Tesauro, G.: Temporal difference learning and TD-Gammon. Commun. ACM 38(3), 58\u201368 (1995)","journal-title":"Commun. ACM"},{"key":"33_CR15","unstructured":"Mnih, V., Kavukcuoglu, K., Silver, D., et al.: Playing Atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013)"},{"issue":"2","key":"33_CR16","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/JAS.2016.7471613","volume":"3","author":"FY Wang","year":"2016","unstructured":"Wang, F.Y., Zhang, J.J., Zheng, X., et al.: Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond. IEEE\/CAA J. Automatica Sin. 3(2), 113\u2013120 (2016)","journal-title":"IEEE\/CAA J. Automatica Sin."},{"key":"33_CR17","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial nets. In: Advances in neural information processing systems, pp. 2672\u20132680 (2014)"},{"key":"33_CR18","unstructured":"UC Berkeley. https:\/\/github.com\/avivt\/VIN"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89500-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T14:40:59Z","timestamp":1751553659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-89500-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319894997","9783319895000"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89500-0_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icics.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}