{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:28:22Z","timestamp":1771064902809,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679419","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"714-719","source":"Crossref","is-referenced-by-count":3,"title":["Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles"],"prefix":"10.1109","author":[{"given":"Fatimah","family":"Aloraini","sequence":"first","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University,Cardiff,United Kingdom"}]},{"given":"Amir","family":"Javed","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University,Cardiff,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100515"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085297"},{"key":"ref3","volume-title":"CAN Specification","author":"Bosch GmbH","year":"1991"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975048"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"ref7","article-title":"Remote Exploitation of an Unaltered Pasenger Vehicle","author":"Miller","journal-title":"Black Hat USA, 2015"},{"key":"ref8","article-title":"Free-Fall: Hacking Tesla From Wireless to CAN Bus","volume-title":"Keen Security Lab in Black Hat USA","author":"Nie","year":"2017"},{"key":"ref9","article-title":"Roadways to Exploit and Secure Connected BMW Cars","volume-title":"Keen Security Lab in Black Hat USA","author":"Cai","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3570954"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119771"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref13","article-title":"Intriguing Properties of Neural Networks","author":"Szegedy","year":"2014","journal-title":"arXiv"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1020014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5578335"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5220\/0010253501600171"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154328"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115782"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087242"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402618"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05981-0_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103472"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103341"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3061065"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2024.3422253"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7769-5_15"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s24123848"},{"key":"ref34","article-title":"Explaining and Harnessing Adversarial Examples","author":"Goodfellow","year":"2015","journal-title":"arXiv"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref36","volume-title":"Towards Deep Learning Models Resistant to Adversarial Attacks","author":"Madry","year":"2019"},{"key":"ref37","volume-title":"Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples","author":"Papernot","year":"2016"},{"key":"ref38","volume-title":"Adversarial Robustness Toolbox v1.0.0","author":"Nicolae","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421359"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679419.pdf?arnumber=10679419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:24:09Z","timestamp":1727241849000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679419","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}