{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:50:25Z","timestamp":1772905825801,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372310"],"award-info":[{"award-number":["62372310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Liaoning Province Applied Basic Research Program","award":["2023JH2\/101300194"],"award-info":[{"award-number":["2023JH2\/101300194"]}]},{"DOI":"10.13039\/501100018617","name":"Liaoning Revitalization Talents Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018617","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Researchers Supporting Program, King Saud University, Riyadh, Saudi Arabia","award":["RSP2024R102"],"award-info":[{"award-number":["RSP2024R102"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Green Commun. Netw."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tgcn.2024.3400403","type":"journal-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T17:41:30Z","timestamp":1715622090000},"page":"1466-1478","source":"Crossref","is-referenced-by-count":41,"title":["Generative Abnormal Data Detection for Enhancing Cellular Vehicle-to-Everything-Based Road Safety"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5829-6850","authenticated-orcid":false,"given":"Liang","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Computer Science, Shenyang Aerospace University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8757-3736","authenticated-orcid":false,"given":"Xu","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shenyang Aerospace University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1069-3993","authenticated-orcid":false,"given":"Ammar","family":"Hawbani","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shenyang Aerospace University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4338-7252","authenticated-orcid":false,"given":"Lexi","family":"Xu","sequence":"additional","affiliation":[{"name":"Research Institute, China United Network Communications Corporation, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5735-2507","authenticated-orcid":false,"given":"Keping","family":"Yu","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Engineering, Hosei University, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0537-4522","authenticated-orcid":false,"given":"Zhi","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer and Network Engineering, The University of Electro-Communications, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6111-8617","authenticated-orcid":false,"given":"Osama","family":"Alfarraj","sequence":"additional","affiliation":[{"name":"Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3305380"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3129348"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1051\/matecconf\/20153004003","article-title":"Sensor fault detection and diagnosis for autonomous vehicles","volume-title":"Proc. MATEC Web Conf.","author":"Realpe"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1155\/2017\/1763934","article-title":"Intelligent vehicle embedded sensors fault detection and isolation using analytical redundancy and nonlinear transformations","volume":"2017","author":"Pous","year":"2017","journal-title":"J. Control Sci. Eng."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2880332"},{"issue":"1","key":"ref6","first-page":"212","article-title":"Data verification and misbehavior detection in vehicular ad-hoc networks","volume":"35","author":"Fuad","year":"2015","journal-title":"IEEE Netw."},{"key":"ref7","article-title":"Physical-layer authentication based on adaptive Kalman filter for V2X communication","volume":"26","author":"Wang","year":"2020","journal-title":"Veh. Commun."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271355"},{"key":"ref9","first-page":"421","article-title":"A survey of anomaly detection for connected vehicle cybersecurity and safety","volume-title":"Proc. IEEE Intell. Veh. Symp. (IV)","author":"Rajbahadur"},{"key":"ref10","first-page":"1117","article-title":"A misbehavior authority system for Sybil attack detection in C-ITS","volume-title":"Proc. IEEE 10th Annu. Ubiquitous Comput., Electron. Mobile Commun. Conf. (UEMCON)","author":"Kamel"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s12243-021-00871-x","article-title":"Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing","volume":"77","author":"Boualouache","year":"2022","journal-title":"Ann. Telecommun."},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115524","article-title":"A bidirectional LSTM deep learning approach for intrusion detection","volume":"185","author":"Imrana","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.neucom.2018.06.078","article-title":"A survey on deep learning based bearing fault diagnosis","volume":"335","author":"Hoang","year":"2019","journal-title":"Neurocomputing"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.patrec.2018.02.010","article-title":"Deep learning for sensor-based activity recognition: A survey","volume":"119","author":"Wang","year":"2019","journal-title":"Pattern Recognit. Lett."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC57133.2023.10066984"},{"key":"ref16","first-page":"703","article-title":"MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks","volume-title":"Proc. Int. Conf. Artif. Neural Netw.","author":"Li"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/OJVT.2021.3138354","article-title":"Machine learning based misbehaviour detection in VANET using consecutive BSM approach","volume":"3","author":"Sharma","year":"2022","journal-title":"IEEE Open J. Veh. Technol."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"3934","DOI":"10.3390\/s20143934","article-title":"Hierarchical anomaly detection model for in-vehicle networks using machine learning algorithms","volume":"20","author":"Park","year":"2020","journal-title":"Sensors"},{"issue":"6","key":"ref19","doi-asserted-by":"crossref","first-page":"4991","DOI":"10.1109\/JIOT.2020.3035035","article-title":"A machine-learning-based data-centric misbehavior detection model for Internet of Vehicles","volume":"8","author":"Sharma","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"ref20","doi-asserted-by":"crossref","first-page":"8871","DOI":"10.1109\/TVT.2020.2996620","article-title":"Machine learning and reputation based misbehavior detection in vehicular communication networks","volume":"69","author":"Gyawali","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref21","first-page":"1","article-title":"Privacy preserving misbehavior detection in IoV using federated machine learning","volume-title":"Proc. IEEE 18th Annu. Consum. Commun. Netw. Conf. (CCNC)","author":"Uprety"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3188304"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3377408","article-title":"Anomaly detection based on RBM-LSTM neural network for CPS in advanced driver assistance system","volume":"4","author":"Wu","year":"2020","journal-title":"ACM Trans. Cyber Phys. Syst."},{"issue":"3","key":"ref24","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1109\/TITS.2019.2906038","article-title":"Real-time sensor anomaly detection and identification in automated vehicles","volume":"21","author":"Van Wyk","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref25","first-page":"359","article-title":"Misbehaviour prediction for autonomous driving systems","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng. (ICSE)","author":"Stocco"},{"key":"ref26","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2016","journal-title":"arXiv:1409.0473"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1053"},{"key":"ref28","first-page":"3","article-title":"Autoencoders, minimum description length and Helmholtz free energy","volume-title":"Proc. 6th NIPS","author":"Hinton"},{"key":"ref29","first-page":"733","article-title":"Learning temporal regularity in video sequences","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Hasan"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA53684.2021.00089"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6114"},{"key":"ref32","first-page":"1","article-title":"Generative adversarial nets","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Goodfellow"},{"key":"ref33","article-title":"Wasserstein GAN","author":"Arjovsky","year":"2017","journal-title":"arXiv:1701.07875"},{"key":"ref34","first-page":"1","article-title":"Improved training of Wasserstein GANs","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Gulrajani"},{"issue":"4","key":"ref35","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2008.80","article-title":"OpenStreetMap: User-generated street maps","volume":"7","author":"Haklay","year":"2008","journal-title":"IEEE Pervasive Comput."},{"issue":"3","key":"ref36","first-page":"1","article-title":"Recent development and applications of SUMO\u2014Simulation of urban mobility","volume":"5","author":"Krajzewicz","year":"2012","journal-title":"Int. J. Adv. Syst. Meas."}],"container-title":["IEEE Transactions on Green Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7511293\/10758365\/10530206.pdf?arnumber=10530206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T20:11:05Z","timestamp":1736885465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10530206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":36,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tgcn.2024.3400403","relation":{},"ISSN":["2473-2400"],"issn-type":[{"value":"2473-2400","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}