{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:32:43Z","timestamp":1762342363708,"version":"3.32.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,13]]},"DOI":"10.1109\/aiotc63215.2024.10748330","type":"proceedings-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T18:49:47Z","timestamp":1731523787000},"page":"138-143","source":"Crossref","is-referenced-by-count":1,"title":["Hardware Security Vulnerability Mining Techniques for Intelligent Connected Vehicles"],"prefix":"10.1109","author":[{"given":"Dongqing","family":"Sun","sequence":"first","affiliation":[{"name":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"}]},{"given":"Mingming","family":"Yu","sequence":"additional","affiliation":[{"name":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"}]},{"given":"Zhen","family":"Guo","sequence":"additional","affiliation":[{"name":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"}]},{"given":"Tianling","family":"Liu","sequence":"additional","affiliation":[{"name":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"}]}],"member":"263","reference":[{"issue":"22","key":"ref1","first-page":"38","article-title":"Research on Hardware Security of Intelligent Terminal for Intelligent Connected Vehicles","volume":"46","author":"Huo","year":"2021","journal-title":"Automotive Practical Technology"},{"issue":"06","key":"ref2","first-page":"150","article-title":"Chip Hardware Security Technology Analysis and Protection Measures","volume":"08","author":"Guo","year":"2021","journal-title":"Industrial Technology Innovation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s23229221"},{"issue":"02","key":"ref4","first-page":"41","article-title":"Information Security Challenges and Thoughts of Intelligent and Connected Vehicles","volume-title":"China Information Security","author":"Liu","year":"2024"},{"issue":"1","key":"ref5","first-page":"67","article-title":"Challenges in hardware security: Gaps in current regulations and standards","volume-title":"IEEE Transactions on Dependable and Secure Computing","volume":"19","author":"Ghorbani Lyastani","year":"2022"},{"volume-title":"Research on Key Technologies for Analysis of Hardware Security Vulnerabilities of Autonomous Chips.","year":"2020","author":"Wu","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2003.01.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.01.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568955"},{"issue":"33","key":"ref10","first-page":"120","article-title":"Research on Security Reinforcement Technology of Intelligent Hardware Terminals","volume":"17","author":"Wu","year":"2021","journal-title":"Computer Knowledge and Technology"}],"event":{"name":"2024 3rd International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology (AIoTC)","start":{"date-parts":[[2024,9,13]]},"location":"Wuhan, China","end":{"date-parts":[[2024,9,15]]}},"container-title":["2024 3rd International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology (AIoTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10747826\/10748248\/10748330.pdf?arnumber=10748330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T19:38:51Z","timestamp":1736537931000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10748330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/aiotc63215.2024.10748330","relation":{},"subject":[],"published":{"date-parts":[[2024,9,13]]}}}