{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:15:43Z","timestamp":1772122543776,"version":"3.50.1"},"reference-count":116,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Intell. Transport. Syst. Mag."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/mits.2024.3427655","type":"journal-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T17:38:15Z","timestamp":1722879495000},"page":"37-55","source":"Crossref","is-referenced-by-count":8,"title":["A Survey of Artificial Intelligence-Related Cybersecurity Risks and Countermeasures in Mobility-as-a-Service"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4138-0268","authenticated-orcid":false,"given":"Kai-Fung","family":"Chu","sequence":"first","affiliation":[{"name":"Department of Engineering, University of Cambridge, Cambridge, U.K."}]},{"given":"Haiyue","family":"Yuan","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security for Society and School of Computing, University of Kent, Canterbury, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3765-6217","authenticated-orcid":false,"given":"Jinsheng","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Aerospace, Transport and Manufacturing, Cranfield University, Milton Keynes, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3524-3953","authenticated-orcid":false,"given":"Weisi","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Aerospace, Transport and Manufacturing, Cranfield University, Milton Keynes, U.K."}]},{"given":"Nazmiye","family":"Balta-Ozkan","sequence":"additional","affiliation":[{"name":"School of Water, Energy, and Environment, Cranfield University, Milton Keynes, U.K."}]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security for Society and School of Computing, University of Kent, Canterbury, U.K."}]}],"member":"263","reference":[{"issue":"2","key":"ref1","first-page":"2","article-title":"Mobility as a service  The new transport model?","volume":"12","author":"Hietanen","year":"2014","journal-title":"Intell. Transport Mag."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2019.2924971"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.05.028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3067044"},{"key":"ref5","volume-title":"Net zero by 2050  analysis: A roadmap for the global energy sector","year":"2021"},{"issue":"1","key":"ref6","first-page":"112","article-title":"The rise of mobility as a service","volume":"20","author":"Goodall","year":"2017","journal-title":"Deloitte Rev."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2015.04.009"},{"key":"ref8","first-page":"425","article-title":"Mobility as a service in smart cities","volume-title":"Proc. 9th Int. Conf. Entrepreneurship, Innov. Regional Develop., Responsible Entrepreneurship Vis., Develop. Ethics","author":"Nemtanu","year":"2016"},{"issue":"7","key":"ref9","first-page":"1207","article-title":"Internet of things based smart transportation systems","volume":"2","author":"Sherly","year":"2015","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cstp.2022.09.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.006"},{"key":"ref12","first-page":"3517","article-title":"Certified defenses for data poisoning attacks","volume":"30","author":"Steinhardt","year":"2017","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/su14148962"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2020.103036"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-021-00230-w"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.commtr.2022.100056"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085297"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.commtr.2022.100078"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1112\/S0025579300000784"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1287\/opre.17.3.395"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2920674"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSSC.1968.300136"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1090\/dimacs\/074\/03"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.1110.0401"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/351827.384254"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1227161.1227166"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2003.12.019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49487-6_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2018.04.018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973198.15"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2016.01.007"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/su12176737"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04128-0_53"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201641"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(97)00376-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3141\/2032-04"},{"key":"ref38","first-page":"32","article-title":"Finding multi-criteria optimal paths in multi-modal public transportation networks using the transit algorithm","volume-title":"Proc. 19th Intell. Transport Syst. World Congress","author":"Antsfeld","year":"2012"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2876570"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2020.08.002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3105230"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2023.104030"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539798337716"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45749-6_15"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68880-8_5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2019.04.009"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(84)90077-8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2008.915650"},{"key":"ref49","first-page":"123","article-title":"Result diversity for multi-modal route planning","volume-title":"Proc. 13th Workshop Algorithmic Approaches Transp. Modelling, Optim., Syst.","author":"Bast","year":"2013"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103360"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08733-4"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.tranpol.2023.10.013"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2019.09.026"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/is.2018.8710457"},{"key":"ref55","volume-title":"IoT, intelligent transport systems and MaaS (mobility as a service)","author":"Costantini","year":"2019"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2018.1553096"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2017.05.055"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2021.3064834"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities6010027"},{"key":"ref60","volume-title":"Autonomous E-mobility as a service-Final report","author":"Pitera"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1177\/0361198121992074"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.rtbm.2018.10.005"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2612828"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3013759"},{"key":"ref65","first-page":"1","article-title":"Insider threats in emerging Mobility-as-a-Service scenarios","volume-title":"Proc. 50th Annu. Hawaii Int. Conf. Syst. Sci.","author":"Callegati","year":"2017"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00101"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8847027"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/su12166368"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3358695.3361844"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/OJITS.2021.3106863"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/su13084233"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0059-y"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.tranpol.2023.02.007"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10422279"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3317358"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5457"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19772-7_31"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00018"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService58306.2023.00032"},{"key":"ref84","article-title":"Universal and transferable adversarial attacks on aligned language models","author":"Zou","year":"2023"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00129"},{"key":"ref88","article-title":"Distilling the knowledge in a neural network","author":"Hinton","year":"2015"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10422567"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3379283"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.02.079"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62416-7_19"},{"key":"ref95","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref97","article-title":"On detecting adversarial perturbations","author":"Metzen","year":"2017"},{"key":"ref98","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","author":"Samangouei","year":"2018"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2016.7603232"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2016.41"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.49"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"ref105","first-page":"1","article-title":"Do not let privacy overbill utility: Gradient embedding perturbation for private learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Yu","year":"2021"},{"key":"ref106","first-page":"1433","article-title":"Mitigating membership inference attacks by self-distillation through a novel ensemble architecture","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Tang","year":"2022"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/spw.2019.00020"},{"key":"ref108","article-title":"Prediction poisoning: Towards defenses against DNN model stealing attacks","author":"Orekondy","year":"2020"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2019.00044"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00085"},{"key":"ref111","first-page":"1","article-title":"Protecting DNNs from theft using an ensemble of diverse models","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kariyappa","year":"2021"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.rtbm.2024.101162"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.3390\/wevj11010007"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.121750"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2023.103309"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.rtbm.2023.101043"}],"container-title":["IEEE Intelligent Transportation Systems Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5117645\/10745915\/10623343.pdf?arnumber=10623343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:14:22Z","timestamp":1732666462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10623343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":116,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mits.2024.3427655","relation":{},"ISSN":["1939-1390","1941-1197"],"issn-type":[{"value":"1939-1390","type":"print"},{"value":"1941-1197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}