{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T20:07:04Z","timestamp":1775938024313,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tits.2022.3200906","type":"journal-article","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T19:38:22Z","timestamp":1661974702000},"page":"22884-22894","source":"Crossref","is-referenced-by-count":41,"title":["A Dynamic Deep Reinforcement Learning-Bayesian Framework for Anomaly Detection"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9573-264X","authenticated-orcid":false,"given":"Jeremy","family":"Watts","sequence":"first","affiliation":[{"name":"Department of Industrial and Systems Engineering, The University of Tennessee Knoxville, Knoxville, TN, USA"}]},{"given":"Franco","family":"Van Wyk","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Stellenbosch University, Stellenbosch, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1196-1611","authenticated-orcid":false,"given":"Shahrbanoo","family":"Rezaei","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, The University of Tennessee Knoxville, Knoxville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6478-7282","authenticated-orcid":false,"given":"Yiyang","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6526-3317","authenticated-orcid":false,"given":"Neda","family":"Masoud","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, The University of Tennessee Knoxville, Knoxville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6818-2048","authenticated-orcid":false,"given":"Anahita","family":"Khojandi","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, The University of Tennessee Knoxville, Knoxville, TN, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301268"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952585"},{"key":"ref33","first-page":"26","article-title":"Lecture 6.5-RmsProp: Divide the gradient by a running average of its recent magnitude","volume":"4","author":"tieleman","year":"2012","journal-title":"COURSERA Neural Netw Mach Learn"},{"key":"ref32","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref30","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"Proc 3rd Int Conf Learn Represent"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2907692"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2003.1272997"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/372651"},{"key":"ref34","first-page":"171","author":"bezzina","year":"2015","journal-title":"Safety Pilot Model Deployment Test Conductor Team Report"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2906038"},{"key":"ref11","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2808414.2808423"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref15","author":"moavenzadeh","year":"2018","journal-title":"Reshaping Urban Mobility with Autonomous Vehicles Lessons from the City of Boston"},{"key":"ref16","author":"harris","year":"2015","journal-title":"Researcher hacks self-driving car sensors $60 lidar spoofing device generates fake cars pedestrians and walls"},{"key":"ref17","first-page":"582","article-title":"Support vector method for novelty detection","volume":"12","author":"sch\u00f6lkopf","year":"1999","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.006"},{"key":"ref4","author":"singh","year":"2015","journal-title":"Critical Reasons for Crashes Investigated in the National Motor Vehicle Crash Causation Survey"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7965928"},{"key":"ref3","year":"2019","journal-title":"Preliminary Statement of Policy Concerning Automated Vehicles"},{"key":"ref27","article-title":"Continuous control with deep reinforcement learning","author":"lillicrap","year":"2015","journal-title":"arXiv 1509 02971"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12130"},{"key":"ref8","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.2022.1176"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2600504"},{"key":"ref9","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref1","author":"ni","year":"2015","journal-title":"Traffic Flow Theory Characteristics Experimental Methods and Numerical Techniques"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254306"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.07.941"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1145\/1014052.1014102","article-title":"Eigenspace-based anomaly detection in computer systems","author":"id\u00e9","year":"2004","journal-title":"Proc 7th ACM SIGKDD Int Conf Knowledge Discovery and Data Mining (KDD)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.watres.2013.01.017"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9972869\/09872133.pdf?arnumber=9872133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T14:28:31Z","timestamp":1676644111000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9872133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":39,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tits.2022.3200906","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}