{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T11:15:02Z","timestamp":1768734902635,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Center for Connected and Automated Transportation (CCAT) under the Department of Transportation","award":["69A3551747105"],"award-info":[{"award-number":["69A3551747105"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3120700","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T23:44:30Z","timestamp":1634341470000},"page":"142475-142488","source":"Crossref","is-referenced-by-count":6,"title":["Adversarial Online Learning With Variable Plays in the Pursuit-Evasion Game: Theoretical Foundations and Application in Connected and Automated Vehicle Cybersecurity"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6478-7282","authenticated-orcid":false,"given":"Yiyang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6526-3317","authenticated-orcid":false,"given":"Neda","family":"Masoud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2412946"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.146"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyv007"},{"key":"ref31","first-page":"689","article-title":"Computing optimal randomized resource allocations for massive security games","volume":"1","author":"kiekintveld","year":"2009","journal-title":"Proc The 8th Int Conf Auto Agents Multiagent Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800279"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.804040"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2600370"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3007120.3007168"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444896"},{"key":"ref10","first-page":"19","article-title":"An introduction to cybersecurity issues in modern transportation systems","volume":"3","author":"fok","year":"2013","journal-title":"ITE J"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1147954.1147956"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4271\/11-01-02-0004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2906038"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2970295"},{"key":"ref14","article-title":"Anomaly detection in connected and automated vehicles using an augmented state formulation","author":"wang","year":"2020","journal-title":"arXiv 2004 09496"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492488"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref19","first-page":"2369","article-title":"The on-line shortest path problem under partial monitoring","volume":"8","author":"gy\u00f6rgy","year":"2007","journal-title":"J Mach Learn Res"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330862"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/0361198118756885"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16108-7_30"},{"key":"ref3","article-title":"Adversarial objects against LiDAR-based autonomous driving systems","author":"cao","year":"2019","journal-title":"arXiv 1907 05418"},{"key":"ref6","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"2011","journal-title":"Proc 20th USENIX Secur Symp (USENIX Security)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2765501"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref8","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"yan","year":"2016","journal-title":"DefCon"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2808414.2808423"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7368833"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.01.001"},{"key":"ref21","first-page":"263","article-title":"Competing in the dark: An efficient algorithm for bandit linear optimization","author":"abernethy","year":"2008","journal-title":"Proc 21st Annu Conf Learn Theory (COLT)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/17442509008833627"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1987.1104491"},{"key":"ref44","volume":"135","author":"sutton","year":"1998","journal-title":"Introduction to Reinforcement Learning"},{"key":"ref26","first-page":"2210","article-title":"Budgeted multi-armed bandits with multiple plays","author":"xia","year":"2016","journal-title":"Proc IJCAI"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref25","article-title":"Optimal regret analysis of Thompson sampling in stochastic multi-armed bandit problem with multiple plays","author":"komiyama","year":"2015","journal-title":"arXiv 1506 00779"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09576732.pdf?arnumber=9576732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T22:23:43Z","timestamp":1645482223000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9576732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3120700","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}