{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T04:54:01Z","timestamp":1778734441677,"version":"3.51.4"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1664257"],"award-info":[{"award-number":["U1664257"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1864201"],"award-info":[{"award-number":["U1864201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Vehicle Power Specific Research Project of Fundamental Product Innovation Program","award":["JCCPCX201704"],"award-info":[{"award-number":["JCCPCX201704"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/jiot.2020.2966672","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T21:26:22Z","timestamp":1579037182000},"page":"3693-3705","source":"Crossref","is-referenced-by-count":95,"title":["Deception Attack Detection and Estimation for a Local Vehicle in Vehicle Platooning Based on a Modified UFIR Estimator"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6186-6321","authenticated-orcid":false,"given":"Zhiyang","family":"Ju","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2501-712X","authenticated-orcid":false,"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8495-0246","authenticated-orcid":false,"given":"Ying","family":"Tan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","author":"rajamani","year":"2011","journal-title":"Vehicle Dynamics and Control"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2015.0205"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TUFFC.2006.1632677"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(01)00242-4"},{"key":"ref31","first-page":"271","article-title":"fir filter design via semidefinite programming and spectral factorization","volume":"1","author":"wu","year":"1996","journal-title":"35th IEEE Conference on Decision and Control CDC-96"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(89)90027-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(00)00063-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2129516"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2013-113"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2013.6629538"},{"key":"ref11","first-page":"3344","article-title":"Security analysis for cyber-physical systems against stealthy deception attacks","author":"kwon","year":"2013","journal-title":"Proc Amer Control Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.412"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.099"},{"key":"ref16","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref17","first-page":"1","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"petit","year":"2015","journal-title":"Proc Black Hat Europe"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2009.2026285"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2016.05.034"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2018.04.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2010.5625054"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1201\/9780203756126"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2016.2594588"},{"key":"ref8","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"yan","year":"0"},{"key":"ref7","first-page":"1","article-title":"Overview of platooning systems","author":"bergenhem","year":"2012","journal-title":"Proc 19th ITS World Congr"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2327587"},{"key":"ref9","first-page":"1","author":"humphreys","year":"2012","journal-title":"Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2749459"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735984"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2018.8433814"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2833811"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1987.1104658"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2045422"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2604759"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2725482"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9091956\/08959234.pdf?arnumber=8959234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:26:51Z","timestamp":1651080411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8959234\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.2966672","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]}}}