{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:03:48Z","timestamp":1778256228978,"version":"3.51.4"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation through Grant","doi-asserted-by":"publisher","award":["CNS-1850533"],"award-info":[{"award-number":["CNS-1850533"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation through Grant","doi-asserted-by":"publisher","award":["CNS-1930041"],"award-info":[{"award-number":["CNS-1930041"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation through Grant","doi-asserted-by":"publisher","award":["CNS-1929771"],"award-info":[{"award-number":["CNS-1929771"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation through Grant","doi-asserted-by":"publisher","award":["CNS-2145493"],"award-info":[{"award-number":["CNS-2145493"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006285","name":"United States Department of Transportation (USDOT) University Transportation Center","doi-asserted-by":"publisher","award":["69A3552047138"],"award-info":[{"award-number":["69A3552047138"]}],"id":[{"id":"10.13039\/100006285","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/tits.2023.3269029","type":"journal-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T18:50:22Z","timestamp":1682535022000},"page":"9462-9475","source":"Crossref","is-referenced-by-count":56,"title":["Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3479-8463","authenticated-orcid":false,"given":"Zhen","family":"Yang","sequence":"first","affiliation":[{"name":"Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Jun","family":"Ying","sequence":"additional","affiliation":[{"name":"Lyles School of Civil Engineering, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7944-4445","authenticated-orcid":false,"given":"Junjie","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California at Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5656-3222","authenticated-orcid":false,"given":"Yiheng","family":"Feng","sequence":"additional","affiliation":[{"name":"Lyles School of Civil Engineering, Purdue University, West Lafayette, IN, USA"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California at Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9844-2055","authenticated-orcid":false,"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3685-9920","authenticated-orcid":false,"given":"Henry X.","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA"}]}],"member":"263","reference":[{"key":"ref13","year":"2023","journal-title":"Tesla Model S and Model 3 Prove Vulnerable to GPS Spoofing Attacks Research from Regulus Cyber Shows"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145888"},{"key":"ref12","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","author":"humphreys","year":"2008","journal-title":"Proc 21st Int Tech Meeting Satell Division Inst Navigat (ION GNSS)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-011-0404-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"ref37","article-title":"Intelligent traffic control in a connected vehicle environment","author":"feng","year":"2015"},{"key":"ref14","first-page":"995","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR","volume":"11","author":"petit","year":"2015","journal-title":"Black Hat Eur"},{"key":"ref36","first-page":"49","article-title":"Design and implementation of intersection movement assistant applications using V2V communications","author":"seo","year":"2013","journal-title":"Proc 5th Int Conf Ubiquitous Future Netw (ICUFN)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113816"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1177\/03611981221092402"},{"key":"ref11","first-page":"931","article-title":"Drift with devil: Security of multi-sensor fusion based localization in high-level autonomous driving under GPS spoofing","author":"shen","year":"2020","journal-title":"Proc 29th USENIX Secur Symp (USENIX Security)"},{"key":"ref33","author":"gopalakrishna","year":"2020","journal-title":"Connected vehicle pilot deployment program phase 1 concept of operations (ConOps) ICF\/WYDOT [phase 2 update]"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref32","author":"bezzina","year":"2014","journal-title":"Safety Pilot Model Deployment Test Conductor Team Report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-017-9338-1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2327587"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425381"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1177\/03611981221077263"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503946"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103196"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070450"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480244"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2011.6117119"},{"key":"ref45","article-title":"One-class classification: A survey","author":"perera","year":"2021","journal-title":"arXiv 2101 03064"},{"key":"ref23","article-title":"Verifying mobility data under privacy considerations in car-to-X communication","author":"stubing","year":"2010","journal-title":"Proc 17th ITS World Congr ITS Jpn ITS AmericaERTICO"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2017.8317883"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-011-0038-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.80"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-020-0663-z"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/21.97458","article-title":"A survey of decision tree classifier methodology","volume":"21","author":"landgrebe","year":"1991","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500658"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CANDARW.2018.00092"},{"key":"ref43","article-title":"YOLOv3: An incremental improvement","author":"redmon","year":"2018","journal-title":"arXiv 1804 02767"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2020.2990149"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.09.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3197817"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/0278364919843996"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0278364910382802"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2008.4570059"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085297"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4271\/12-02-03-0012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/0361198119845363"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s150923286"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2018.8585340"},{"key":"ref40","first-page":"1433","article-title":"Maximum entropy inverse reinforcement learning","author":"ziebart","year":"2008","journal-title":"Proc AAAI"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6979\/10235283\/10109166-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/10235283\/10109166.pdf?arnumber=10109166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T18:11:40Z","timestamp":1695060700000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10109166\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":45,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tits.2023.3269029","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}