{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:03:06Z","timestamp":1776441786994,"version":"3.51.2"},"reference-count":139,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/jproc.2019.2954595","type":"journal-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T20:58:55Z","timestamp":1575665935000},"page":"292-307","source":"Crossref","is-referenced-by-count":566,"title":["Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches"],"prefix":"10.1109","volume":"108","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2414-4802","authenticated-orcid":false,"given":"Fengxiao","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5290-6520","authenticated-orcid":false,"given":"Yuichi","family":"Kawamoto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8769-302X","authenticated-orcid":false,"given":"Nei","family":"Kato","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9920-4956","authenticated-orcid":false,"given":"Jiajia","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.54.16942"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.146"},{"key":"ref30","first-page":"2635","article-title":"Detecting and tracing DDoS attacks in the traffic analysis using auto regressive model","volume":"e87 d","author":"uchiyama","year":"2004","journal-title":"IEICE Trans Inf Syst"},{"key":"ref37","first-page":"1","article-title":"Security architectures in V2V and V2I communication","author":"van der heijden","year":"2010","journal-title":"Proc 20th Student Conf IT"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref35","first-page":"1","article-title":"Challenges in securing vehicular networks","author":"parno","year":"2005","journal-title":"Workshop on Hot Topics in Networks (HotNets-IV)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IIKI.2015.33"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2001.995315"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2279111"},{"key":"ref29","first-page":"825","article-title":"SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks","volume":"2","author":"he","year":"2004","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440591"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2015.39"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-011-0552-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2274201"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2702388"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422427"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/98.575990"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IMOC.2009.5427579"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.885720"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2015.7341144"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073883"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2329272"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683775"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2365813"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2010.5688723"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(90)90122-F"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2005.860196"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110308"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2888904"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2514\/6.2004-6321"},{"key":"ref6","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921162"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9112-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.156"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2849577"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2884767"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2010049"},{"key":"ref45","first-page":"338","article-title":"Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method","volume":"5","author":"kurosawa","year":"2007","journal-title":"Int J Netw Secur"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.831028"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/78.875477"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.32"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046961"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711068"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775103"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131120"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2229998"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2017.8168151"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043124"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29280-4_70"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2782726"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.100412.00017"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2408369"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/VETEC.1995.504981"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2014.08.001"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910272"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1328-8_14"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043968"},{"key":"ref132","first-page":"101","article-title":"A novel distributed intrusion detection system for vehicular ad hoc networks","volume":"6","author":"maglaras","year":"2015","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/25.790549"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700098"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2636186"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2314104"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918069"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2029693"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2622180"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2016.7833571"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8233654"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445920"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2016.7833571"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2850226"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485876"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2792019"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2848294"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6969789"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2759728"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108458"},{"key":"ref95","first-page":"1","article-title":"Predicting transmission success with machine-learning and support vector machine in VANETs","author":"sangare","year":"2018","journal-title":"Proc 7th IFIP\/IEEE Int Conf Perform Eval Modeling Wired Wireless Netw (PEMWN)"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2011.0227"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2875431"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2546555"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2481464"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843217"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2005.846390"},{"key":"ref91","first-page":"1041","article-title":"Study on network traffic prediction techniques","volume":"2","author":"feng","year":"2005","journal-title":"Proc Int Conf Wireless Commun Netw Mobile Comput"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-012-0457-9"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866435"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700244"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2789466"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391019"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1177\/0278364909342118"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2014.7011907"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600317WC"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982799"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1800365"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2709742"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5490974"},{"key":"ref11","year":"2015","journal-title":"Study on LTE Support for Vehicle to Everything (V2X) Services"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/49.753731"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/26.701317"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2757490"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2019.2933352"},{"key":"ref118","first-page":"1","article-title":"Artificial neural networks for misuse detection","volume":"26","author":"cannady","year":"1998","journal-title":"Proc Nat Inf Syst Secur Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838574"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601150"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292679"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2760281"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2018.8503086"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647254"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910272"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.110112.00125"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701227"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2929935"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1996.493355"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7513858"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3132340.3132355"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254036"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.213"},{"key":"ref89","first-page":"865","article-title":"Traffic flow prediction with big data: A deep learning approach","volume":"16","author":"lv","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0112"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.12.006"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2842246"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2647624"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2897134"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2311123"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/8967317\/08926369.pdf?arnumber=8926369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:40:23Z","timestamp":1651066823000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8926369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":139,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2019.2954595","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}