{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T00:32:04Z","timestamp":1778891524554,"version":"3.51.4"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62173012"],"award-info":[{"award-number":["62173012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U20A20155"],"award-info":[{"award-number":["U20A20155"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61822101"],"award-info":[{"award-number":["61822101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61802196"],"award-info":[{"award-number":["61802196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2017YFB0102502"],"award-info":[{"award-number":["2017YFB0102502"]}]},{"name":"Beijing Municipal Natural Science Foundation","award":["L191001"],"award-info":[{"award-number":["L191001"]}]},{"name":"Newton Advanced Fellowship","award":["62061130221"],"award-info":[{"award-number":["62061130221"]}]},{"name":"Engineering Research Center of Digital Forensics Ministry of Education"},{"name":"Young Elite Scientists Sponsorship Program by the Hunan Provincial Department of Education","award":["18B142"],"award-info":[{"award-number":["18B142"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tits.2021.3128634","type":"journal-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T20:36:39Z","timestamp":1639600599000},"page":"1-13","source":"Crossref","is-referenced-by-count":47,"title":["In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5931-8310","authenticated-orcid":false,"given":"Xuting","family":"Duan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huiwen","family":"Yan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7796-5650","authenticated-orcid":false,"given":"Daxin","family":"Tian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianshan","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0634-4843","authenticated-orcid":false,"given":"Jian","family":"Su","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9301-8765","authenticated-orcid":false,"given":"Wei","family":"Hao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2925025"},{"key":"ref2","first-page":"877","article-title":"Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th Secur. Symp.","author":"Sun"},{"key":"ref3","first-page":"931","article-title":"Drift with devil: Security of multi-sensor fusion based localization in high-level autonomous driving under GPS spoofing","volume-title":"Proc. 29th Secur. Symp.","author":"Shen"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900188"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3050503"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/0-8176-4404-0_32"},{"key":"ref8","first-page":"379","article-title":"Communication scheduling for CAN bus autonomous underwater vehicles","volume-title":"Proc. Int. Conf. Mechatronics Autom.","author":"Liu"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2843324"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9841498"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319180"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2017.7991088"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/20166305020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2913627"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5120\/10153-4987"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3015916"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2001.966806"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2017.7934878"},{"issue":"17","key":"ref20","first-page":"135","article-title":"The design of the control system in the power dumbwaiter based on CAN bus","volume":"29","author":"Lu","year":"2010","journal-title":"Value Eng."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799210"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2018.8618564"},{"key":"ref23","first-page":"66","article-title":"Sniffing\/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy","volume-title":"Proc. Workshop Embedded Syst. Secur.","author":"Hoppe"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5650245"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.024"},{"key":"ref27","first-page":"1","article-title":"A flexible approach to embedded network multicast authentication","volume-title":"Proc. 2nd Workshop Embedded Syst. Secur.","author":"Szilagy"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270342"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21500\/20112084.844"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.79"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.09.083"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22741-8_5"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417863"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E92.B.1981"},{"issue":"3","key":"ref35","first-page":"118","article-title":"Intrusion detection systems using decision trees and support vector machines","volume":"11","author":"Peddabachigari","year":"2004","journal-title":"Int. J. Appl. Sci. Computat."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982544"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref39","first-page":"1175","volume-title":"The Art of Computer Programming: Sorting and Searching","volume":"3","author":"Knuth","year":"1974"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/9781119752059"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-012-5303-x"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835929"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.49"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1989.10488524"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/S0001-2998(78)80014-2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/4358928\/09652038.pdf?arnumber=9652038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:36:02Z","timestamp":1704846962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9652038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/tits.2021.3128634","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}