{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:38:36Z","timestamp":1778258316016,"version":"3.51.4"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/itsc.2018.8569635","type":"proceedings-article","created":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T20:21:46Z","timestamp":1544646106000},"page":"307-312","source":"Crossref","is-referenced-by-count":102,"title":["Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems"],"prefix":"10.1109","author":[{"given":"Aidin","family":"Ferdowsi","sequence":"first","affiliation":[]},{"given":"Ursula","family":"Challita","sequence":"additional","affiliation":[]},{"given":"Walid","family":"Saad","sequence":"additional","affiliation":[]},{"given":"Narayan B.","family":"Mandayam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1860058.1860067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228654"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.03.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2320605"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.58"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1369-8478(00)00005-X"},{"key":"ref17","author":"dorf","year":"2011","journal-title":"Modern Control Systems"},{"key":"ref18","author":"han","year":"2012","journal-title":"Game Theory in Wireless and Communication Networks Theory Models and Applications"},{"key":"ref19","author":"ferdowsi","year":"2018","journal-title":"Robust deep reinforcement learning for security and safety in autonomous vehicle systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"ref3","author":"zeng","year":"2018","journal-title":"Joint communication and control for wireless autonomous vehicular platoon systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3063386.3063765"},{"key":"ref5","author":"ferdowsi","year":"2017","journal-title":"Colonel Blotto game for secure state estimation in interdependent critical infrastructure"},{"key":"ref8","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle can","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2531652"},{"key":"ref1","author":"ferdowsi","year":"2017","journal-title":"Deep learning for reliable mobile edge analytics in intelligent transportation systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2012.6175670"},{"key":"ref20","author":"ba?ar","year":"1998","journal-title":"Dynamic Noncooperative Game Theory"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2878025"},{"key":"ref21","author":"heinrich","year":"2016","journal-title":"Deep reinforcement learning from self-play in imperfect-information games"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref23","author":"chen","year":"2017","journal-title":"Machine learning for wireless networks with artificial intelligence A tutorial on neural networks"}],"event":{"name":"2018 21st International Conference on Intelligent Transportation Systems (ITSC)","location":"Maui, HI","start":{"date-parts":[[2018,11,4]]},"end":{"date-parts":[[2018,11,7]]}},"container-title":["2018 21st International Conference on Intelligent Transportation Systems (ITSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8543039\/8569013\/08569635.pdf?arnumber=8569635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T21:21:37Z","timestamp":1598217697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8569635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/itsc.2018.8569635","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}