{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:10:39Z","timestamp":1775837439891,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,9]]},"DOI":"10.1109\/ccnc49032.2021.9369569","type":"proceedings-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T16:35:06Z","timestamp":1615480506000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["An Adversarial Attack Defending System for Securing In-Vehicle Networks"],"prefix":"10.1109","author":[{"given":"Yi","family":"Li","sequence":"first","affiliation":[]},{"given":"Jing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Kaiqi","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"50","volume":"31","author":"liu","year":"2017","journal-title":"In-vehicle network attacks and countermeasures Challenges and future directions"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.26.306"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref13","author":"kurakin","year":"2016","journal-title":"Adversarial examples in the physical world"},{"key":"ref14","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref15","author":"qayyum","year":"2019","journal-title":"Securing connected & autonomous vehicles Challenges posed by adversarial machine learning and the way forward"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref18","year":"0","journal-title":"OpenDBC"},{"key":"ref19","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref4","author":"avatefipour","year":"2018","journal-title":"State-of-the-art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700448"},{"key":"ref6","author":"khan","year":"2019","journal-title":"In-vehicle false information attack detection and mitigation framework using machine learning and software defined networking"},{"key":"ref5","first-page":"1","author":"carsten","year":"2015","journal-title":"In-vehicle networks Attacks vulnerabilities and proposed solutions"},{"key":"ref8","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"ICLRE"},{"key":"ref7","volume":"11","author":"kang","year":"2016","journal-title":"Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s19020334"},{"key":"ref1","author":"mudalige","year":"2015","journal-title":"Efficient data flow algorithms for autonomous lane changing passing and overtaking behaviors"},{"key":"ref9","author":"chakraborty","year":"2018","journal-title":"Adversarial Attacks and Defences A Survey"},{"key":"ref20","first-page":"1","article-title":"Robust machine learning against adversarial samples at test time","author":"lin","year":"2020","journal-title":"ICC 2020-2020 IEEE International Conference on Communications (ICC)"}],"event":{"name":"2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2021,1,9]]},"end":{"date-parts":[[2021,1,12]]}},"container-title":["2021 IEEE 18th Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9369428\/9369448\/09369569.pdf?arnumber=9369569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:42:17Z","timestamp":1652182937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9369569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ccnc49032.2021.9369569","relation":{},"subject":[],"published":{"date-parts":[[2021,1,9]]}}}