{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:09:08Z","timestamp":1763536148378,"version":"3.37.3"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008812","name":"Next Generation Technologies Fund Program in partnership with the Defence Science and Technology Group, Department of Defence, Australia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008812","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000943","name":"Commonwealth Scientific and Industrial Research Organisation (CSIRO) Data61 Ph.D. Scholarship Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000943","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2023.3320610","type":"journal-article","created":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T17:41:17Z","timestamp":1695922877000},"page":"163-177","source":"Crossref","is-referenced-by-count":5,"title":["To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0534-2440","authenticated-orcid":false,"given":"Guoxin","family":"Sun","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Melbourne, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7434-3239","authenticated-orcid":false,"given":"Tansu","family":"Alpcan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Melbourne, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2947-6980","authenticated-orcid":false,"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[{"name":"Department of Computing and Information Systems, University of Melbourne, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6353-8359","authenticated-orcid":false,"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Epping, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975048"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275641"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2760865"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SEsCPS.2019.00014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983392"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86514-6_5"},{"key":"ref8","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref9","article-title":"Fast is better than free: Revisiting adversarial training","author":"Wong","year":"2020","journal-title":"arXiv:2001.03994"},{"key":"ref10","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref11","first-page":"1","article-title":"You only propagate once: Accelerating adversarial training via maximal principle","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Zhang"},{"volume-title":"Open-Source Mobile Robot Simulation Software","year":"2023","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-158-9_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.2968606"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2021.3122144"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3144599"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26409-2_17"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2986319"},{"key":"ref20","article-title":"Countering adversarial images using input transformations","author":"Guo","year":"2017","journal-title":"arXiv:1711.00117"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00017"},{"key":"ref22","first-page":"1363","article-title":"Adversarial preprocessing: Understanding and preventing image-scaling attacks in machine learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Quiring"},{"key":"ref23","first-page":"443","article-title":"Seeing is not believing: Camouflage attacks on image scaling algorithms","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Xiao"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021913"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924130"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3031378"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2012.6338644"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2254597"},{"key":"ref30","first-page":"861","article-title":"Chapter 16\u2014Game theory and distributed control","volume-title":"Handbook of Game Theory With Economic Applications","volume":"4","author":"Marden","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6674218"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2016.1144227"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/ECC51009.2020.9143774"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2014.04.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/050627538"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.312"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2907381"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9683543"},{"volume-title":"Vehicle Dynamics and Control","year":"2011","author":"Rajamani","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2014.7013309"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2402153"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431538"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2302816"},{"key":"ref44","volume-title":"Linear System Theory and Design","volume":"301","author":"Chen","year":"1984"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2002.1025325"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523658"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3169500"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0017-8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.03.001"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778"},{"key":"ref53","article-title":"OpenSpiel: A framework for reinforcement learning in games","author":"Lanctot","year":"2019","journal-title":"arXiv:1908.09453"},{"volume-title":"Gambit: Software Tools for Game Theory, Version 16.0.2","year":"2022","author":"McKelvey","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569938"},{"volume-title":"Stopping Distances: Speed and Braking","year":"2023","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/VNC51378.2020.9318396"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10266364.pdf?arnumber=10266364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:40:03Z","timestamp":1710405603000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10266364\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3320610","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}