{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T05:57:58Z","timestamp":1775800678280,"version":"3.50.1"},"reference-count":347,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Center for Communication Systems and Sensing, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia"},{"name":"Ongoing Research Funding Program, King Saud University, Riyadh, Saudi Arabia","award":["ORF-Ctr-2026-4"],"award-info":[{"award-number":["ORF-Ctr-2026-4"]}]},{"name":"Research, Development and Innovation Authority (RDIA) Chair Professor Position in Wireless Communications","award":["CUP2601"],"award-info":[{"award-number":["CUP2601"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ojcoms.2026.3679935","type":"journal-article","created":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T19:53:33Z","timestamp":1775159613000},"page":"3379-3418","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning to Secure Wheels: A Survey of Misbehavior Detection for the Next-Generation of Connected and Autonomous Vehicles"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2469-1181","authenticated-orcid":false,"given":"Aadil Hussain","family":"Lone","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5012-1562","authenticated-orcid":false,"given":"Ali Arshad","family":"Nasir","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-0533","authenticated-orcid":false,"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance, DSR, King Saud University (KSU), Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8947-993X","authenticated-orcid":false,"given":"Ali A.","family":"Al-Shaikhi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7897-1275","authenticated-orcid":false,"given":"Mohamed","family":"Mohandes","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2028-3621","authenticated-orcid":false,"given":"Mahmoud M.","family":"Salim","sequence":"additional","affiliation":[{"name":"Center for Communication Systems and Sensing, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5439-7475","authenticated-orcid":false,"given":"Daniel B.","family":"Da Costa","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3035582"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9564783"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-01976-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2948302"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100281"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3060046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107443"},{"key":"ref8","volume-title":"Intelligent Transport Systems (ITS); Security; Trust and Privacy Management; Release 2","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3079379"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900662"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3127267"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2811185"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1064-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"issue":"2","key":"ref15","first-page":"22","article-title":"A review on data falsification-based attacks in cooperative intelligent transportation systems","volume":"14","author":"Almalki","year":"2020","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT48472.2019.8970942"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769454"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500383"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085297"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3129079"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.04.014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2933899"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601158"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.01.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2984878"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4236\/jtts.2021.112018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647514"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369513"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2021.3138354"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2996620"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095480"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43605-6_7"},{"key":"ref34","volume-title":"Road Vehicles\u2014Functional Safety","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.4271\/j3216_202005"},{"key":"ref36","volume-title":"Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service","year":"2014"},{"key":"ref37","volume-title":"Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service","year":"2018"},{"key":"ref38","volume-title":"Service Requirements for V2X Services","year":"2020"},{"key":"ref39","volume-title":"Architecture Enhancements for 5G System (5GS) To Support Vehicle-to-Everything (V2X) Services","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102351"},{"key":"ref41","volume-title":"Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 1: Requirements","year":"2014"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIM48759.2020.9299042"},{"key":"ref43","volume-title":"Cellular-V2X Technology Overview","year":"2019"},{"key":"ref44","volume-title":"ITS Stack","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601144"},{"key":"ref46","volume-title":"Network Functions Virtualisation (NFV); Architectural Framework","year":"2014"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3120723"},{"key":"ref48","volume-title":"Multi-access Edge Computing (MEC); Framework and Reference Architecture","year":"2022"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800x.615"},{"key":"ref50","volume-title":"Toward Fully Connected Vehicles: Edge Computing for Advanced Automotive Communications","year":"2017"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/9781119652434.ch13"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102546"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771522"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2025.3601032"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCO59262.2023.10397929"},{"key":"ref57","article-title":"Security of connected and automated vehicles","author":"Chowdhury","year":"2020","journal-title":"arXiv:2012.13464"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/su141912409"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/s24175523"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3591335.3591351"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/s23084086"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842470"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200140"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100282"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644392"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703355"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900220"},{"key":"ref68","article-title":"Attacker model for connected and automated vehicles","volume-title":"Proc. ACM Comput. Sci. Cars Symp. (CSCS)","author":"Monteuuis"},{"issue":"8","key":"ref69","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of a self-driving vehicle","volume":"24","author":"Yan","year":"2016","journal-title":"Def. Con"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref71","volume-title":"Writing Secure Code","author":"Howard","year":"2002"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-18-8071-1_P398-cd"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104352"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/s24165108"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3390\/s22176679"},{"key":"ref76","volume-title":"Road Vehicles \u2014 Functional Safety \u2014 Part 9: Automotive Safety Integrity Level (ASIL)-oriented and Safety-oriented Analyses","year":"2018"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556651"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.12.006"},{"key":"ref83","first-page":"15","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller","year":"2013","journal-title":"Def. Con"},{"key":"ref84","article-title":"An introduction to the CANard toolkit","volume-title":"Proc. Black Hat USA","author":"Evenchick"},{"key":"ref85","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. 20th USENIX Secur. Symp.","author":"Checkoway"},{"key":"ref86","first-page":"21","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","volume-title":"Proc. USENIX Secur. Symp.","volume":"10","author":"Rouf"},{"key":"ref87","first-page":"19","article-title":"One car, two frames: Attacks on hitag-2 remote keyless entry systems revisited","volume-title":"Proc. USENIX Workshop Offens. Technol. (WOOT)","author":"Benadjila"},{"key":"ref88","first-page":"929","article-title":"Lock it and still lose it\u2014On the insecurity of automotive remote keyless entry systems","volume-title":"Proc. USENIX Secur. Symp.","author":"Garcia"},{"key":"ref89","article-title":"Over-the-air: How we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars","volume-title":"Proc. Black Hat USA","author":"Nie"},{"key":"ref90","first-page":"1","article-title":"Free-fall: Hacking Tesla from wireless to CAN bus","volume-title":"Proc. Black Hat USA","author":"Nie"},{"key":"ref91","first-page":"1527","article-title":"All your GPS are belong to us: Towards stealthy manipulation of road navigation systems","volume-title":"Proc. 27th USENIX Security Symp. (USENIX Security)","author":"Zeng"},{"key":"ref92","article-title":"Remote exploitation of an unaltered passenger vehicle","volume-title":"Proc. Black Hat USA","volume":"91","author":"Miller"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2017.8065169"},{"key":"ref94","year":"2018","journal-title":"IEEE Standard for MAC Security"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"ref96","volume-title":"Road Vehicles\u2014 Cybersecurity Engineering","year":"2021"},{"key":"ref97","volume-title":"Cybersecurity and Cybersecurity Management System","year":"2021"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.008"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369569"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.18178\/jtle.6.1.11-16"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2000078"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0029"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319180"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.07.002"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2239301"},{"key":"ref107","first-page":"1","article-title":"CaCAN: Centralized authentication system in CAN (controller area network)","volume-title":"Proc. Int. Conf. Embedded Secur. Cars (ESCAR)","author":"Kurachi"},{"key":"ref108","first-page":"207","article-title":"Hardware module-based message authentication in intra-vehicle networks","volume-title":"Proc. ACM\/IEEE 8th Int. Conf. Cyber-Phys. Syst. (ICCPS)","author":"Wang"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2961765"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49806-5_2"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3090397"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3220779"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/b978-1-78242-211-2.00009-x"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3141\/2625-06"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3337791"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.3390\/info10040148"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000179"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"ref123","article-title":"A survey on AI\/ML-driven intrusion and misbehavior detection in networked autonomous systems: Techniques, challenges and opportunities","author":"Ajibuwa","year":"2023","journal-title":"arXiv:2305.05040"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270417"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Asia53811.2021.9641946"},{"key":"ref127","volume-title":"Intelligent Transport Systems (ITS); Security; Misbehaviour Detection Services","year":"2020"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102269"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250353"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484759"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1561\/9781638283034"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1097\/01.hj.0000843244.47169.01"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2022.9761121"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSIS61070.2024.10594423"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3136706"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2017.7886565"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001264"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-75016-8_13"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.020936"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875678"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564966"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761300"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.03.001"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094172"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925783"},{"key":"ref147","first-page":"1","article-title":"Classifying malicious nodes in VANETs using support vector machines with modified fading memory","volume-title":"Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)","author":"Sharanya"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/VNC48660.2019.9062831"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_13"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/CAVS.2019.8887778"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2015.10"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.008"},{"key":"ref153","first-page":"641","article-title":"Misbehaviour detection in C-ITS using deep learning approach","volume-title":"Proc. Int. Conf. Intell. Syst. Des. Appl.","author":"Singh"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00060"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2906038"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3750-9_6"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAE.2016.7810164"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05755-8_41"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/MSN50589.2020.00082"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE48956.2021.9352123"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ISCTT51595.2020.00083"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3303271"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.14722\/vehiclesec.2024.23043"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ComNet47917.2020.9306073"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3495031"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-024-10551-1"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13101962"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2018.5177"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.3390\/s23208355"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47887-6_53"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600263"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2985050"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2937097"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_68"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"ref178","first-page":"19","article-title":"Ontology-based anomaly detection for cellular vehicular communications","volume-title":"Proc. Eur. Congr. Embedded Real-Time Softw. Syst. (ERTS)","author":"Ricard"},{"key":"ref179","article-title":"Design and mitigation of vehicular botnets in vehicular ad hoc networks","author":"Garip","year":"2019"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718815845"},{"key":"ref181","article-title":"Detection of injection attacks on in-vehicle network using data analytics","author":"Dhulipala","year":"2018"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2970295"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2987841"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102622"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON47517.2019.8993045"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2831082"},{"key":"ref188","article-title":"Improving reconstruction autoencoder out-of-distribution detection with Mahalanobis distance","author":"Denouden","year":"2018","journal-title":"arXiv:1812.02765"},{"key":"ref189","article-title":"Intrusion detection on the automotive CAN bus","author":"Schappin","year":"2017"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004444"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417777"},{"issue":"1","key":"ref192","first-page":"2529","article-title":"Robust kernel density estimation","volume":"13","author":"Kim","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"ref193","article-title":"Development of a real-time roadway debris hazard spotting tool using connected vehicle data to enhance roadway safety and system efficiency","author":"Concas","year":"2019"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/vnc48660.2019.9062814"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917306"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9030110"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3169907"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3344226"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3429522"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3233592"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/VNC61989.2024.10575985"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348445"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-024-09641-0"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3109276"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2992630"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2024-Spring62846.2024.10683044"},{"key":"ref208","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref209","article-title":"Federated learning in vehicular networks","author":"Elbir","year":"2020","journal-title":"arXiv:2006.01412"},{"key":"ref210","article-title":"A survey towards federated semisupervised learning","author":"Jin","year":"2020","journal-title":"arXiv:2002.11545"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3092015"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00871-x"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4054171"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000430"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA45728.2021.9613271"},{"key":"ref216","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst. (MLSys)","author":"Tian"},{"key":"ref217","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","volume-title":"Proc. NIPS","author":"Wang"},{"key":"ref218","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref219","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838780"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2930521"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2977378"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102899"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC62392.2025.11274954"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.3390\/s21144736"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.130"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164770"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.3390\/s22155621"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.11.010"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975084"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.3390\/sym14020310"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2022.100446"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.2987430"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02565-7"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100186"},{"key":"ref238","article-title":"A neural-network based anomaly detection system and a safety protocol to protect vehicular network","author":"Franceschini","year":"2024","journal-title":"arXiv:2411.07013"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.133"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_3"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835979"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2013.01.007"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"ref244","first-page":"1","article-title":"CARLA: An open urban driving simulator","volume-title":"Proc. 1st Annu. Conf. Robot Learn.","volume":"78","author":"Dosovitskiy"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892860"},{"key":"ref246","volume-title":"MATLAB, Version 9.7.0.1190202 (R2019b)","year":"2018"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.04.012"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23014"},{"key":"ref249","first-page":"37","article-title":"Vanetza: Boosting research on inter-vehicle communication","volume-title":"Proc. GI\/ITG KuVS Fachgespr\u00e4ch Inter-Vehicle Commun. (FG-IVC)","author":"Riebl"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref251","volume-title":"CTUns Network Simulator","year":"2025"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.1998.685281"},{"key":"ref253","volume-title":"RDS1000 Simulator","year":"2025"},{"key":"ref254","volume-title":"VeReMi Data Set","year":"2025"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"ref256","volume-title":"VeReMi Extended Data Set","year":"2025"},{"key":"ref257","volume-title":"Framework for Misbehaviour Detection (F2MD)","year":"2025"},{"key":"ref258","volume-title":"DARPA Intrusion Detection Evaluation Dataset 1999","year":"2025"},{"key":"ref259","volume-title":"DARPA Intrusion Detection Evaluation Dataset 2000","year":"2025"},{"key":"ref260","volume-title":"The CAIDA UCSD \u2018DDoS Attack 2007\u2019 Dataset","year":"2025"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"ref262","volume-title":"The AWID2 Dataset","year":"2025"},{"key":"ref263","volume-title":"KDD Cup 1999","year":"2025"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref265","volume-title":"NSL-KDD Dataset","year":"2025"},{"key":"ref266","article-title":"Description of Kyoto university benchmark data","author":"Song","year":"2026"},{"key":"ref267","volume-title":"Traffic Data From Kyoto University\u2019s Honeypots","year":"2025"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref269","volume-title":"The UNSW-NB15 Dataset","year":"2025"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref272","volume-title":"Intrusion Detection Evaluation Dataset (CIC-IDS2017)","year":"2025"},{"key":"ref273","article-title":"CRAWDAD Dataset Thlab\/Sigcomm2009","author":"Pietilainen","year":"2025"},{"key":"ref274","volume-title":"NGSIM Trajectory Datasets","year":"2025"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.04.007"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3071362"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872122"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.047"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766739"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989870"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8868355"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2954595"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C51114.2020.00045"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3001340"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073806"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964707"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.11.002"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2250-7_2"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3236448"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1145\/3596598"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100586"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10098-1"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050038"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2021.3058292"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000428"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500823"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.3390\/info12110455"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3113807"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1145\/3491396.3506509"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1049\/itr2.12139"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091411"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/SEEDA-CECNSM.2019.8908528"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068463"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297475"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644127"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854567"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107930"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3333342"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3516819"},{"key":"ref313","volume-title":"Intelligent Transport Systems (ITS); Vehicular Communications; Collective Perception Service; Release 2","year":"2023"},{"key":"ref314","volume-title":"Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Cooperative Awareness Basic Service","year":"2019"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.014.2300492"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3327111"},{"key":"ref317","article-title":"Spatio-temporal graph neural networks: A survey","author":"Al Sahili","year":"2023","journal-title":"arXiv:2301.10569"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109198"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_36"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2025.3600903"},{"key":"ref321","article-title":"MistralBSM: Leveraging mistral-7B for vehicular networks misbehavior detection","author":"Hamhoum","year":"2024","journal-title":"arXiv:2407.18462"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC58415.2024.10919629"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104016"},{"key":"ref324","volume-title":"Intelligent Transport Systems (ITS); Collective Perception Service; Collective Perception Message (CPM)","year":"2023"},{"key":"ref325","volume-title":"Intelligent Transport Systems (ITS); Vehicular Communications; Analysis of the Collective Perception Service (CPS)","year":"2019"},{"key":"ref326","article-title":"Artery: OMNeT ++ V2X simulation framework for ETSI ITS-G5","author":"Riebl","year":"2025"},{"key":"ref327","volume-title":"Vanetza: Open-source ETSI C-ITS Protocol Stack","year":"2025"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.4271\/12-05-03-0020"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100597"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101127"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2025.3600903"},{"key":"ref332","first-page":"7387","article-title":"From threat to trust: Exploiting attention mechanisms for attacks and defenses in cooperative perception","volume-title":"Proc. USENIX Secur.","author":"Wang"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-87775-9_16"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2975815"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9564757"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2022.02.046"},{"key":"ref337","article-title":"Achieving V2X interoperability and security: SCMS overview","author":"Kreeb","year":"2019"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2006.01.013"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2024.3457374"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3442861"},{"key":"ref341","article-title":"Quantum adaptive self-attention for quantum transformer models","author":"Chen","year":"2025","journal-title":"arXiv:2504.05336"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2025.107123"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3434974"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.22331\/q-2024-02-22-1265"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00409"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-93072-8"},{"key":"ref347","article-title":"Knowledge distillation: A survey","author":"Gou","year":"2020","journal-title":"arXiv:2006.05525"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/11343983\/11471676.pdf?arnumber=11471676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T05:06:16Z","timestamp":1775797576000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":347,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2026.3679935","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}