{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T15:54:00Z","timestamp":1774626840312,"version":"3.50.1"},"reference-count":251,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tbdata.2022.3227336","type":"journal-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T20:40:35Z","timestamp":1670445635000},"page":"388-414","source":"Crossref","is-referenced-by-count":31,"title":["Data Privacy Threat Modelling for Autonomous Systems: A Survey From the GDPR's Perspective"],"prefix":"10.1109","volume":"9","author":[{"given":"Naila","family":"Azam","sequence":"first","affiliation":[{"name":"School of Computing Science, University of Glasgow, Glasgow, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7821-1279","authenticated-orcid":false,"given":"Lito","family":"Michala","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow, Glasgow, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2071-0264","authenticated-orcid":false,"given":"Shuja","family":"Ansari","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3981-889X","authenticated-orcid":false,"given":"Nguyen Binh","family":"Truong","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow, Glasgow, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8415"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948287"},{"key":"ref3","article-title":"Towards a rigorous science of interpretable machine learning","author":"Doshi-Velez","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816676645"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5827"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3375762"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.119"},{"key":"ref9","volume-title":"The security development lifecycle: SDL: A process for developing demonstrably more secure software","author":"Michael","year":"2006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3212210"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42048-2_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3276744"},{"key":"ref13","article-title":"Incompatible: The GDPR in the age of big data","volume":"47","author":"Zarsky","year":"2016","journal-title":"Seton Hall L. Rev."},{"key":"ref14","article-title":"Threat modeling explained: A process for anticipating cyber attacks","volume-title":"Tersedia pada","author":"Fruhlinger","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.010"},{"key":"ref16","volume-title":"Requirements Engineering Processes and Techniques","author":"Kotonya","year":"1998"},{"key":"ref17","volume-title":"Software Security Engineering","author":"Allen","year":"2008"},{"issue":"4","key":"ref18","first-page":"37","article-title":"Modeling design process","volume":"11","author":"Takeda","year":"1990","journal-title":"AI Mag."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAW.2011.12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJVAS.2018.096154"},{"key":"ref21","volume-title":"Threat Modeling: Designing for Security","author":"Shostack","year":"2014"},{"issue":"4","key":"ref22","first-page":"124","article-title":"Threat modeling using attack trees","volume":"23","author":"Saini","year":"2008","journal-title":"J. Comput. Sci. Colleges"},{"key":"ref23","article-title":"Real world threat modeling using the PASTA methodology","author":"UcedaVelez","year":"2012","journal-title":"OWASP App Sec EU"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-013-0195-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/pds.2021.517"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s21144816"},{"key":"ref28","article-title":"Baldwin","author":"Howell","year":"2021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00941-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00047"},{"key":"ref33","article-title":"LINDDUN privacy threat modeling: A tutorial","author":"Wuyts","journal-title":"CW Rep."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3375762"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.05.075"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083214"},{"key":"ref37","article-title":"Evaluation of threat modeling methodologies","author":"Shull","year":"2016"},{"key":"ref38","article-title":"Threat modeling for cyber-physical system-of-systems: Methods evaluation","author":"Shevchenko","year":"2018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/9781118988374"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.85"},{"key":"ref41","article-title":"A hybrid threat modeling method","author":"Mead","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.21236\/ADA443493"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167285"},{"issue":"12","key":"ref44","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobbs J."},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378941"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2016.7575045"},{"key":"ref47","article-title":"Trike V. 1 methodology document [draft]","author":"Saitta","year":"2005"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref49","article-title":"A complete guide to the common vulnerability scoring system version 2.0","volume":"1","author":"Mell","year":"2007","journal-title":"Published FIRST-Forum Incident Response Secur. Teams"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.588"},{"key":"ref51","article-title":"A hybrid threat modeling method","author":"Mead","year":"2018"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8053-6_3"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.21236\/ADA634134"},{"key":"ref54","volume-title":"Managing Information Security Risks: The OCTAVE Approach","author":"Alberts","year":"2003"},{"key":"ref55","article-title":"Threat modeling: A summary of available methods","author":"Shevchenko","year":"2018"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/9781119174882"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1516533.1516538"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083082"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2007.20"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.39"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1331309"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.154"},{"issue":"2006","key":"ref63","first-page":"1","article-title":"An architectural blueprint for autonomic computing","volume":"31","author":"Computing","year":"2006","journal-title":"IBM White Paper"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.154"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2275-y"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-3380-5.ch025"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1002\/9781119711629.ch14"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-03136-0"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103411"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120426"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-4718-2.ch010"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IHTC.2017.8058187"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-0641-5_15"},{"key":"ref74","first-page":"1245","article-title":"Privacy and artificial agents, or, is google reading my email?","volume-title":"Proc. Int. Joint Conf. Artif. Intell.","author":"Chopra"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888913000180"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00005"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113816"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1080\/01691864.2022.2029720"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.24071\/ijasst.v3i2.2790"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2749459"},{"key":"ref82","article-title":"Are autonomous drones perceived as trustworthy? The effects of fire department resemblance and transparent information on trust in a drone","author":"Meil\u00e4nder","year":"2021"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.3390\/jmse9060645"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2838730"},{"key":"ref85","article-title":"Jaguar files face and gait recognition system patent for vehicle entry","year":"2016"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"ref87","volume-title":"Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy","author":"O\u2019neil","year":"2016"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5304-9_8"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.3390\/app11167248"},{"key":"ref90","article-title":"Is it morally acceptable for a system to lie to persuade me?","volume-title":"Proc. AAAI Conf. Artif. Intell. Workshops: AI and Ethics","author":"Guerini"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994489"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2106495"},{"key":"ref94","first-page":"1","article-title":"Adapting threat modeling methods for the automotive industry","volume-title":"Proc. 15th ESCAR Conf.","author":"Karahasanovic"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3337791"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.008"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0733-2_21"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103611"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.3390\/s21144816"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3083927"},{"issue":"01","key":"ref101","first-page":"239","article-title":"Smart home environment future challenges and issues-a survey","volume":"3","author":"Hamdan","year":"2021","journal-title":"J. Electron."},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409178"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/s21144816"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8053-6_3"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"issue":"2","key":"ref107","first-page":"513","article-title":"Study of security requirement of smart home hub through threat modeling analysis and common criteria","volume":"28","author":"Park","year":"2018","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3375762"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0170"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0530-8"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1177\/1548512916628335"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00445-y"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066778"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9564757"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECS52883.2021.00118"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3129484"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/WAIN52551.2021.00025"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.01.005"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363966"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27763-9"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/PEITS.2008.124"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33246-4_18"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/robotics10010010"},{"key":"ref127","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3124599"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_32"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1443"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2022121"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2019.8791552"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.4018\/ijdtis.2010010104"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3000797"},{"key":"ref141","article-title":"Categorizing RFID privacy threats with STRIDE","volume-title":"Proc. ACMs Symp. Usable Privacy Secur. Held CMU","author":"Thompson"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1002\/9781119594307"},{"key":"ref143","article-title":"General data protection regulation (GDPR) in european union: From proposal to implementation","author":"Budryt\u0117","year":"2021"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2014.913874"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1080\/1097198x.2019.1569186"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948287"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3332\/ecancer.2017.709"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2021.1339"},{"issue":"1","key":"ref150","first-page":"221","article-title":"European union data privacy law reform: General data protection regulation, privacy shield, and the right to delisting","volume":"72","author":"Voss","year":"2016","journal-title":"Bus. Lawyer"},{"key":"ref151","article-title":"Data protection in an increasingly globalized world","volume":"94","author":"Palmieri","year":"2019","journal-title":"Indiana Law J."},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101469"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006455"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2018.8605979"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3192721"},{"key":"ref156","first-page":"7","article-title":"The control by and rights of the data subject under the GDPR","volume":"22","author":"Wolters","year":"2018","journal-title":"J. Internet Law"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1914598117"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3624010"},{"key":"ref161","article-title":"Legality and data protection law: The forgotten purpose of purpose limitation","volume-title":"The Eclipse of Legality Principle in the European Union","author":"Brouwer","year":"2011"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.54648\/COLA2020006"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.4108\/eai.20-11-2021.2314205"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470101"},{"key":"ref168","article-title":"Big data analytics: Privacy protection using Semantic Web technologies","volume-title":"Proc. NSF Workshop Big Data Secur. Privacy","author":"Farkas"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501750"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596033"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP.2018.8620728"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0694-9_5"},{"key":"ref174","article-title":"Internet of things security, device authentication and access control: A review","author":"Ali","year":"2019"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2022.2034374"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.12.003"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1080\/20508840.2019.1664543"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1080\/17579961.2018.1527479"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73751-5_1"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47605-6_2"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/bs.atpp.2020.02.005"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.4337\/9781783471294"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14156-1_21"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44267-5_81"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716679679"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23528-4_20"},{"key":"ref187","article-title":"Policing police robots","volume":"64","author":"Joh","year":"2016","journal-title":"UCLA Law Rev. Discourse"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8122757"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aan6080"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3122865"},{"key":"ref191","article-title":"High definition lidar system","author":"Hall","year":"2011"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2005.1423386"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.trf.2020.06.021"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1017\/S0033291720000835"},{"key":"ref195","article-title":"Whos responsible when an autonomous car crashes?","author":"McFarland","year":"2020"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983149"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/s12008-014-0227-2"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869360"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2859765"},{"key":"ref200","article-title":"Vehicle-to-vehicle communications: Readiness of V2V technology for application","author":"Harding","year":"2014"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2016.03.008"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2011.6083084"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref204","article-title":"Definitions for terms related to driving automation systems for on-road motor vehicles","volume":"3016","author":"Sae","year":"2016","journal-title":"SAE Standard J."},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23035"},{"issue":"1","key":"ref208","article-title":"Car hacking: Accessing and exploiting the can bus protocol","volume":"2019","author":"Payne","year":"2019","journal-title":"J. Cybersecurity Educ., Res. Pract."},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3029723"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/ATEE.2017.7905041"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.4451224"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.011.2100004"},{"issue":"8","key":"ref216","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan","year":"2016","journal-title":"DEF CON"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2937-2_25"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.008"},{"issue":"1","key":"ref219","first-page":"79","article-title":"A systematic approach for attack analysis and mitigation in V2V networks","volume":"7","author":"Bhargava","year":"2016","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.12691\/jcsa-7-1-5"},{"key":"ref221","first-page":"357","article-title":"Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles","volume-title":"Proc. 13th Symp. Usable Privacy Secur.","author":"Bloom"},{"key":"ref222","first-page":"931","article-title":"Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing","author":"Shen","year":"2020"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.5.25"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2012.V4.627"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2013.5508"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2894767"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1145\/3450329.3478315"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100013"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1145\/2639968.2640059"},{"key":"ref230","article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","volume":"34","author":"Pfitzmann","year":"2010"},{"key":"ref231","article-title":"Cryptography and evidence","author":"Roe"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-122"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0304-9"},{"key":"ref234","article-title":"Privacy in the age of autonomous systems","author":"Khan","year":"2020"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT51146.2020.9312024"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/719294"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/AI4I46381.2019.00016"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00152"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3025993"},{"key":"ref240","first-page":"1","article-title":"Cross-layer privacy enhancement and non-repudiation in vehicular communication","volume-title":"Proc. Commun. Distrib. Syst.-15 ITG\/GI Symp.","author":"Armknecht"},{"key":"ref241","article-title":"A methodology to validate compliance to the GDPR","author":"Ekdahl","year":"2019"},{"key":"ref242","article-title":"Towards an accountability framework for AI: Ethical and legal considerations","author":"Boch"},{"issue":"1","key":"ref243","first-page":"15","article-title":"Data protection and self-driving cars: The consent to the processing of personal data in compliance with GDPR","volume":"24","author":"Gaeta","year":"2019","journal-title":"Commun. Law"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00076"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.23919\/EETA.2019.8804515"},{"key":"ref246","article-title":"In-vehicle data recording, storage and access management in autonomous vehicles","author":"Veitas","year":"2018"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.14311\/mecdc.2020.01.01"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2018.8490433"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.5194\/isprs-archives-XLVI-4-W5-2021-349-2021"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025462"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173191"},{"key":"ref252","first-page":"113","article-title":"Guidelines for GDPR compliant consent and data management model in ict businesses","volume-title":"Proc. Central Eur. Conf. Inf. Intell. Syst.","author":"Peras"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/10068313\/09973285.pdf?arnumber=9973285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:46:04Z","timestamp":1706766364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9973285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":251,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2022.3227336","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}