{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T00:47:09Z","timestamp":1774658829292,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171352"],"award-info":[{"award-number":["62171352"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302387"],"award-info":[{"award-number":["62302387"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tits.2024.3461855","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T17:50:26Z","timestamp":1727373026000},"page":"21528-21544","source":"Crossref","is-referenced-by-count":5,"title":["Collaborative Vehicular Threat Sharing: A Long-Term Contract-Based Incentive Mechanism With Privacy Preservation"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6407-2378","authenticated-orcid":false,"given":"Chao","family":"He","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x00C3;an, China"}]},{"given":"Yuntao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0671-0153","authenticated-orcid":false,"given":"Juan","family":"Hu","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Radar Signal Processing, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5215-7443","authenticated-orcid":false,"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8424-8542","authenticated-orcid":false,"given":"Yuanguo","family":"Bi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6518-3130","authenticated-orcid":false,"given":"Zhou","family":"Su","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3270749"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3083927"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100809"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3299554"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625518"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.002.2200015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3329683"},{"key":"ref8","article-title":"ChatGPT and other large language models for cybersecurity of smart grid applications","author":"Zaboli","year":"2023","journal-title":"arXiv:2311.05462"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3641289"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2023.3300321"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51630-6_6"},{"key":"ref12","article-title":"Large language models for forecasting and anomaly detection: A systematic literature review","author":"Su","year":"2024","journal-title":"arXiv:2402.10350"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3372809"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EASCT59475.2023.10393509"},{"key":"ref15","article-title":"Large language models in cybersecurity: State-of-the-art","author":"Motlagh","year":"2024","journal-title":"arXiv:2402.00891"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2024.3402366"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48891.2023.10161317"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318942"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.260"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3210117"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Fall60731.2023.10333514"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2425798"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3003673"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3237636"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3935-5_40"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40861-8_22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MED59994.2023.10185669"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3071513"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060393"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2834232"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078913"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2997023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050163"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2865951"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033806"},{"key":"ref37","article-title":"Enabling privacy-preserving cyber threat detection with federated learning","author":"Bi","year":"2024","journal-title":"arXiv:2404.05130"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103827"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001215"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2021.105196"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3052963"},{"key":"ref44","article-title":"Qwen technical report","volume-title":"arXiv:2309.16609","author":"Bai","year":"2023"},{"key":"ref45","volume-title":"CSE-CIC-IDS2018","year":"2024"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/10769775\/10696923.pdf?arnumber=10696923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:29:43Z","timestamp":1732771783000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10696923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":45,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tits.2024.3461855","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}