{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T18:14:45Z","timestamp":1769278485559,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,8]]},"DOI":"10.1109\/itsc55140.2022.9922128","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:40:13Z","timestamp":1667526013000},"page":"3632-3637","source":"Crossref","is-referenced-by-count":24,"title":["Detecting Stealthy Cyberattacks on Automated Vehicles via Generative Adversarial Networks"],"prefix":"10.1109","author":[{"given":"Tianyi","family":"Li","sequence":"first","affiliation":[{"name":"University of Minnesota,Department of Civil, Environmental, and Geo- Engineering,MN"}]},{"given":"Mingfeng","family":"Shang","sequence":"additional","affiliation":[{"name":"University of Minnesota,Department of Civil, Environmental, and Geo- Engineering,MN"}]},{"given":"Shian","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Minnesota,Department of Civil, Environmental, and Geo- Engineering,MN"}]},{"given":"Matthew","family":"Filippelli","sequence":"additional","affiliation":[{"name":"University of Minnesota,Department of Civil, Environmental, and Geo- Engineering,MN"}]},{"given":"Raphael","family":"Stern","sequence":"additional","affiliation":[{"name":"University of Minnesota,Department of Civil, Environmental, and Geo- Engineering,MN"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995897"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3094552"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2015.12.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.3029452"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2015.04.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102924"},{"issue":"1","key":"ref7","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"Baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2019.01.014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2020.105837"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2018.09.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993254"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3114024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2020.105861"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6873273"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2934481"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2906038"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app10217833"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3101502"},{"key":"ref21","article-title":"Detection of false data injection attack in connected and automated vehicles via cloudbased sandboxing","author":"Zhao","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9564462"},{"key":"ref23","article-title":"Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection","author":"Gunter","year":"2021","journal-title":"arXiv"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DI-CPS56137.2022.00012"},{"key":"ref25","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref26","first-page":"2342","article-title":"An empirical exploration of recurrent network architectures","volume-title":"International Conference on Machine Learning. PMLR","author":"Jozefowicz","year":"2015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/03611981211059769"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308512"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.62.1805"},{"key":"ref33","article-title":"Calibrating microscopic model for commercially available autonomous driving systems: a multi-objective approach","volume-title":"Transportation Research Board Annual Meeting","author":"de Souza","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3000682"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The elements of statistical learning: data mining, inference, and prediction","volume":"2","author":"Hastie","year":"2009"}],"event":{"name":"2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC)","location":"Macau, China","start":{"date-parts":[[2022,10,8]]},"end":{"date-parts":[[2022,10,12]]}},"container-title":["2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9921415\/9921739\/09922128.pdf?arnumber=9922128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:08:18Z","timestamp":1706076498000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9922128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/itsc55140.2022.9922128","relation":{},"subject":[],"published":{"date-parts":[[2022,10,8]]}}}