{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:04:30Z","timestamp":1771574670464,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Joint Funds of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20304"],"award-info":[{"award-number":["U23A20304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Hainan Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["621RC508"],"award-info":[{"award-number":["621RC508"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Key Laboratory of Information Security","award":["2022-MS-04"],"award-info":[{"award-number":["2022-MS-04"]}]},{"name":"Henan Key Laboratory of Network Cryptography Technology","award":["LNCT2021-A16"],"award-info":[{"award-number":["LNCT2021-A16"]}]},{"DOI":"10.13039\/501100005693","name":"Science Project of Hainan University","doi-asserted-by":"publisher","award":["KYQD(ZR)-21075"],"award-info":[{"award-number":["KYQD(ZR)-21075"]}],"id":[{"id":"10.13039\/501100005693","id-type":"DOI","asserted-by":"publisher"}]},{"name":"High Tech Industry and Technology Innovation Leadership Project in Hunan Province","award":["2020SK2022"],"award-info":[{"award-number":["2020SK2022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3368392","type":"journal-article","created":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T18:56:30Z","timestamp":1708541790000},"page":"28911-28925","source":"Crossref","is-referenced-by-count":18,"title":["Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM"],"prefix":"10.1109","volume":"12","author":[{"given":"Kaijun","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9236-2739","authenticated-orcid":false,"given":"Jiayu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hainan University, Haikou, China"}]},{"given":"Yangfei","family":"Shao","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8175-5567","authenticated-orcid":false,"given":"Lehua","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Hunan University of Science and Engineering, Yongzhou, China"}]},{"given":"Wei","family":"Ou","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, China"}]},{"given":"Wenbao","family":"Han","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0927-0678","authenticated-orcid":false,"given":"Qionglu","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3005361"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3019756"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2022.3219474"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/mits.2022.3190036"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/ijpcc-04-2022-0164"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2019.2936466"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1108\/lht-01-2021-0013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9865549"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3212412"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.06.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02963-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108543"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2022.3233880"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15771-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.2990984"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223658"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2021.3139170"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3071362"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/math10122030"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icc45855.2022.9838780"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3424819"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s23094399"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3210117"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s22197612"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3151377"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2023.3296002"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12112510"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.07.023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100809"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/cisda.2009.5356528"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3118573"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10443028.pdf?arnumber=10443028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T05:26:38Z","timestamp":1709270798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10443028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3368392","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}