{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T21:51:36Z","timestamp":1771883496760,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"University of Technology Sydney, Insurance Australia Group"},{"name":"iMOVE Cooperative Research Centre","award":["5-028"],"award-info":[{"award-number":["5-028"]}]},{"name":"Cooperative Research Centres program, an Australian Government initiative"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tits.2025.3532455","type":"journal-article","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T19:22:47Z","timestamp":1738264967000},"page":"3223-3236","source":"Crossref","is-referenced-by-count":2,"title":["CAN-Trace Attack: Exploit CAN Messages to Uncover Driving Trajectories"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0133-4737","authenticated-orcid":false,"given":"Xiaojie","family":"Lin","sequence":"first","affiliation":[{"name":"Global Big Data Technologies Centre, University of Technology Sydney, Ultimo, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4167-2797","authenticated-orcid":false,"given":"Baihe","family":"Ma","sequence":"additional","affiliation":[{"name":"Global Big Data Technologies Centre, University of Technology Sydney, Ultimo, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9439-6437","authenticated-orcid":false,"given":"Xu","family":"Wang","sequence":"additional","affiliation":[{"name":"Global Big Data Technologies Centre, University of Technology Sydney, Ultimo, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6111-1607","authenticated-orcid":false,"given":"Guangsheng","family":"Yu","sequence":"additional","affiliation":[{"name":"Global Big Data Technologies Centre, University of Technology Sydney, Ultimo, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1603-9375","authenticated-orcid":false,"given":"Ying","family":"He","sequence":"additional","affiliation":[{"name":"Global Big Data Technologies Centre, University of Technology Sydney, Ultimo, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4933-594X","authenticated-orcid":false,"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Global Big Data Technologies Centre, University of Technology Sydney, Ultimo, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7001-6305","authenticated-orcid":false,"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[{"name":"Global Big Data Technologies Centre, University of Technology Sydney, Ultimo, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2875021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2009.4850318"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2020.2999885"},{"key":"ref5","article-title":"Location privacy threats and protections in 6G vehicular networks: A comprehensive review","author":"Ma","year":"2023","journal-title":"arXiv:2305.04503"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2506579"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3179501"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.1988.195464"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.93"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2941354"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-016-0442-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMEE.2011.6199202"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/12.587843"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3097401"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-010-0186-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-015-0471-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2910591"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2010.937031"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICITE.2016.7581329"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2826000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2800123"},{"key":"ref22","first-page":"1","article-title":"Introduction to the Controller Area Network (CAN)","volume-title":"Appl.","author":"Corrigan","year":"2002"},{"key":"ref23","volume-title":"A Comprehensible Guide to Controller Area Network","author":"Voss","year":"2008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/0-8176-4404-0_32"},{"key":"ref25","article-title":"Hacking cars in the style of Stuxnet","volume-title":"Lab. Cryptogr. Syst. Secur. (CrySyS Lab)","author":"Szijj","year":"2015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2015.1"},{"key":"ref27","article-title":"On board diagnostics: Risks and vulnerabilities of the connected vehicle","volume-title":"CERT Coordination Center, Softw. Eng. Inst., Carnegie Mellon Univ.","author":"Klinedinst","year":"2016"},{"key":"ref28","first-page":"949","article-title":"Plug-N-Pwned: Comprehensive vulnerability analysis of OBD-II dongles as a new over-the-air attack surface in automotive IoT","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Wen"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD54268.2022.9776214"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3248064"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647811"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3550486"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3383881"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582828"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2007.05.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746677"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi10070454"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.038"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2240116.2240120"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2821650.2821665"},{"key":"ref42","first-page":"21","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","volume-title":"Proc. 19th USENIX Secur. Symp.","author":"Rouf"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-2468-4_10"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069376"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653776"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2016.7847724"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8793604"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IROS51168.2021.9635862"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3155166"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3637059"},{"key":"ref53","article-title":"Revolutionizing intelligent transportation systems with cellular vehicle-to-everything (C-V2X) technology: Current trends, use cases, emerging technologies, standardization bodies, industry analytics and future directions","volume":"43","author":"Rammohan","year":"2023","journal-title":"Veh. Commun."},{"key":"ref54","volume-title":"Addressing New Challenges in Automotive Cybersecurity","author":"Watney","year":"2022"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2020.105837"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/10909032\/10858595.pdf?arnumber=10858595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T05:53:59Z","timestamp":1741067639000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":56,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tits.2025.3532455","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}