{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:07:25Z","timestamp":1770739645004,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Joint Funds of the Zhejiang Provincial Natural Science Foundation of China","award":["LLSSZ25F030002"],"award-info":[{"award-number":["LLSSZ25F030002"]}]},{"DOI":"10.13039\/501100001809","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LDT23F01011F01"],"award-info":[{"award-number":["LDT23F01011F01"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LQ21F030013"],"award-info":[{"award-number":["LQ21F030013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u201cPioneer\u201d and \u201cLeading Goose\u201d Research and Development Program of Zhejiang","award":["2023C01038"],"award-info":[{"award-number":["2023C01038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,15]]},"DOI":"10.1109\/jiot.2025.3636573","type":"journal-article","created":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T18:29:54Z","timestamp":1764095394000},"page":"6669-6682","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Resilient Control for Vehicle Platoons Under Hybrid Cyberattacks, Actuator Saturation, and Parameter Uncertainties"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4795-9118","authenticated-orcid":false,"given":"Xiyan","family":"Chen","sequence":"first","affiliation":[{"name":"School of Automation, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8779-1719","authenticated-orcid":false,"given":"Chunjie","family":"Zhai","sequence":"additional","affiliation":[{"name":"School of Automation, Hangzhou Dianzi University, Hangzhou, China"}]},{"given":"Chuqiao","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1277-4663","authenticated-orcid":false,"given":"Yuliang","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Automation, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8609-9456","authenticated-orcid":false,"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Automation, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1204-0512","authenticated-orcid":false,"given":"Chenggang","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Automation, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9145-8364","authenticated-orcid":false,"given":"Yahong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Lishui University, Lishui, China"}]}],"member":"263","reference":[{"issue":"6","key":"ref1","doi-asserted-by":"crossref","first-page":"200","DOI":"10.3390\/fi15060200","article-title":"Securing wireless sensor networks using machine learning and blockchain: A review","volume":"15","author":"Ismail","year":"2023","journal-title":"Future Internet"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1016\/j.ins.2021.10.032","article-title":"Event triggered control of connected vehicles under multiple cyber attacks","volume":"582","author":"Xu","year":"2022","journal-title":"Inf. Sci."},{"issue":"9","key":"ref3","doi-asserted-by":"crossref","first-page":"5211","DOI":"10.3390\/su14095211","article-title":"An overview of vehicular cybersecurity for intelligent connected vehicles","volume":"14","author":"Guan","year":"2022","journal-title":"Sustainability"},{"key":"ref4","article-title":"The dark side of the Internet of Vehicles: A survey of the state of IoV and its security vulnerabilities","author":"Christensen","year":"2022","journal-title":"arXiv:2211.05775"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3231618"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147977"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3215966"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3197192"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.procs.2021.05.025","article-title":"Network intrusion detection system using deep learning","volume":"185","author":"Ashiku","year":"2021","journal-title":"Proc. Comput. Sci."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2024.3422253"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066620"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3090361"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3158624"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVCI56766.2022.9964612"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3151880"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC62350.2024.10587922"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00105-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2024.3496755"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2024.3434726"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3250398"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3338235"},{"issue":"15","key":"ref22","doi-asserted-by":"crossref","first-page":"6735","DOI":"10.3390\/app14156735","article-title":"Time-delay following model for connected and automated vehicles considering multiple vehicle safety potential fields","volume":"14","author":"Wang","year":"2024","journal-title":"Appl. Sci."},{"issue":"5","key":"ref23","doi-asserted-by":"crossref","first-page":"919","DOI":"10.3390\/electronics13050919","article-title":"An effective ensemble learning-based real-time intrusion detection scheme for an in-vehicle network","volume":"13","author":"Alalwany","year":"2024","journal-title":"Electronics"},{"issue":"21","key":"ref24","doi-asserted-by":"crossref","first-page":"4495","DOI":"10.3390\/electronics12214495","article-title":"Addressing actuator saturation during fault compensation in model-based underwater vehicle control","volume":"12","author":"Macatangay","year":"2023","journal-title":"Electronics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-023-0135-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-021-1109-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15785-2_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-024-00008-8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983468"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3087940"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3222324"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s38311-022-0793-z"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95498-7_37"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03748-2_38"},{"issue":"7","key":"ref35","doi-asserted-by":"crossref","first-page":"2805","DOI":"10.3390\/app14072805","article-title":"Windowed Hamming distance-based intrusion detection for the CAN bus","volume":"14","author":"Fang","year":"2024","journal-title":"Appl. Sci."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12085-6_4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3347889"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-2011-11232-2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/ecc.2019.8796064"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2962601"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11372629\/11267486.pdf?arnumber=11267486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:08:19Z","timestamp":1770671299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11267486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,15]]},"references-count":40,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3636573","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,15]]}}}