{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:09:05Z","timestamp":1760659745921,"version":"build-2065373602"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office (ARO)","doi-asserted-by":"publisher","award":["W911NF-25-1-0184"],"award-info":[{"award-number":["W911NF-25-1-0184"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1109\/cns66487.2025.11195017","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:34:49Z","timestamp":1760549689000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["A Trust-Aware POMDP Framework for Thwarting Data Falsification Attacks in Cooperative Driving"],"prefix":"10.1109","author":[{"given":"Ziqi","family":"Xu","sequence":"first","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering"}]},{"given":"Jingcheng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering"}]},{"given":"Loukas","family":"Lazos","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3295384"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569947"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766505"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275598"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2024.10540078"},{"volume-title":"3GPP: Technical Specification Group Services and System Aspects. Security aspect for LTE support of Vehicle-to-Everything (V2X) services Rel-16, V16.0.0","year":"2020","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3596598"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3236448"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103196"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2975822"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3144599"},{"volume-title":"Risk-aware autonomous driving using POMDPs and responsibility-sensitive safety","year":"2021","author":"Skoglund","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323406"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399348"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575970"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23077"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085196"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/mtits.2017.8005648"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/vehiclesec.2024.23037"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433197"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/app14031173"},{"key":"ref25","first-page":"895","article-title":"SAVIOR: Securing autonomous vehicles with robust physical invariants","volume-title":"29th USENIX security symposium","author":"Quinonez"},{"issue":"2","key":"ref26","first-page":"30","article-title":"Remote attacks on automated vehicles sen-sors: Experiments on camera and lidar","volume":"2","author":"Petit","year":"2015","journal-title":"Journal of Vehicular Networks"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2015.7225830"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995816"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2017.2670463"},{"volume-title":"Next generation simulation vehicle trajectories and supporting data","key":"ref30"}],"event":{"name":"2025 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2025,9,8]]},"location":"Avignon, France","end":{"date-parts":[[2025,9,11]]}},"container-title":["2025 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11194903\/11194169\/11195017.pdf?arnumber=11195017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T04:50:14Z","timestamp":1760590214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11195017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cns66487.2025.11195017","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]}}}