{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T15:49:35Z","timestamp":1772898575293,"version":"3.50.1"},"reference-count":189,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hong Kong Research Grants Council (RGC) Theme-Based Research Scheme (TRS) Project","award":["T43-513\/23-N"],"award-info":[{"award-number":["T43-513\/23-N"]}]},{"name":"HKPolyU","award":["1-ZVG0"],"award-info":[{"award-number":["1-ZVG0"]}]},{"name":"HKPolyU","award":["U-ZGGG"],"award-info":[{"award-number":["U-ZGGG"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tits.2025.3567940","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T17:46:32Z","timestamp":1747417592000},"page":"10979-11009","source":"Crossref","is-referenced-by-count":8,"title":["Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5792-5491","authenticated-orcid":false,"given":"Yangyang","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1952-885X","authenticated-orcid":false,"given":"Lei","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6757-8112","authenticated-orcid":false,"given":"Sishan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Intelligent Connected Vehicle, Hubei University of Automotive Technology, Shiyan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3102-7498","authenticated-orcid":false,"given":"Kaifa","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2380-1447","authenticated-orcid":false,"given":"Pengfei","family":"Jing","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0934-5035","authenticated-orcid":false,"given":"Xiaobo","family":"Ma","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"given":"Yajuan","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Engineering, Shantou University, Shantou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3637-9652","authenticated-orcid":false,"given":"Haiying","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Intelligent Connected Vehicle, Hubei University of Automotive Technology, Shiyan, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Automotive Cybersecurity Market Research Report 2023 | Growth Rate and Forecast Till 2031","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2008.0810"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2320605"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"ref5","first-page":"1","article-title":"How to steal cars a practical attack on keeloq","volume-title":"Proc. EUROCRYPT","author":"Biham"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"issue":"260","key":"ref7","first-page":"15","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller","year":"2013","journal-title":"Def Con"},{"key":"ref8","first-page":"91","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref9","first-page":"21","article-title":"Hackers remotely kill a jeep on the highway-with me in it","volume":"7","author":"Greenberg","year":"2015","journal-title":"Wired"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00122"},{"key":"ref11","volume-title":"Hackers Discover a Way To Hack Into Your Car\u2019s Remote Control App","author":"Lee","year":"2011"},{"key":"ref12","volume-title":"Connected Car Vulnerabilities Affect the Can Standard","year":"2017"},{"key":"ref13","first-page":"15","article-title":"Fast and vulnerable: A story of telematic failures","volume-title":"Proc. 9th USENIX Workshop Offensive Technol. (WOOT)","author":"Foster"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2017.7934878"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MTITS.2017.8005670"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CANDARW.2018.00057"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983285"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.317"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3375706.3380552"},{"key":"ref20","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","volume-title":"Proc. USENIX Secur.","author":"Cho"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"ref22","first-page":"949","article-title":"Plug-N-pwned: Comprehensive vulnerability analysis of OBD-II dongles as a new over-the-air attack surface in automotive IoT","volume-title":"Proc. 29th USENIX Conf. Secur. Symp.","author":"Wen"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2977353"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23107"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240550"},{"key":"ref26","article-title":"State-of-the-Art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities","author":"Avatefipour","year":"2018","journal-title":"arXiv:1802.01725"},{"key":"ref27","first-page":"1","article-title":"Towards viable intrusion detection methods for the automotive controller area network","volume-title":"Proc. 2nd ACM Comput. Sci. Cars Symp.","author":"Tomlinson"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2899062"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11071072"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3570954"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3431233"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2965"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4271\/2020-01-0721"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2019.8906465"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23013"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.4271\/2004-28-0029"},{"issue":"2014","key":"ref40","first-page":"1","article-title":"A survey of remote automotive attack surfaces","volume":"2014","author":"Miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref41","volume-title":"Most Specification","year":"2008"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_75891"},{"key":"ref43","volume-title":"LIN Specification Package, Revision 2.0","year":"2003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704153"},{"key":"ref45","first-page":"72","article-title":"Can specification version 2.0","volume":"300240","author":"Bosch","year":"1991","journal-title":"Rober Bousch GmbH, Postfach"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1286317"},{"key":"ref47","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. 20th USENIX Secur. Symp.","volume":"4","author":"Checkoway"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2023761"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3236593"},{"key":"ref51","volume-title":"Automotive Ethernet: A Crossroads for the Connected Car","author":"Lewis","year":"2018"},{"key":"ref52","volume-title":"Solutions for Automotive Ethernet","year":"2024"},{"key":"ref53","volume-title":"A Remote Attack on the Bosch Drivelog Connector Dongle","year":"2017"},{"key":"ref54","article-title":"Ethical hacking of IoT devices: OBD-II dongles","author":"Christensen","year":"2019"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24231"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417879"},{"key":"ref57","volume-title":"Relay attack prevention for passive entry passive start (PEPS) vehicle security systems","author":"Oman","year":"2015"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690734"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3362034"},{"key":"ref60","article-title":"CASAD: CAN-aware stealthy-attack detection for in-vehicle networks","author":"Nowdehi","year":"2019","journal-title":"arXiv:1909.08407"},{"key":"ref61","volume-title":"Microchip MCP2515 Datasheet","year":"2019"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref63","first-page":"1","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Francillon"},{"key":"ref64","first-page":"1","article-title":"Lock it and still lose it-on the (in) security of automotive remote keyless entry systems","volume-title":"Proc. 25th USENIX Secur. Symp. USENIX","author":"Garcia"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2017.8053441"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2018.10010488"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359834"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref71","volume-title":"Controller Area Network (CAN) Overview","year":"2019"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560618"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309178"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"ref77","volume-title":"Road Vehicles\u2013unified Diagnostic Services (UDS)\u2014Part 1: Specification and Requirements","year":"2013"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"ref79","volume-title":"A fuzz testing methodology for cyber-security assurance of the automotive CAN bus","author":"Fowler","year":"2019"},{"issue":"11","key":"ref80","first-page":"4349","article-title":"A survey on machine learning techniques for intrusion detection systems","volume":"2","author":"Singh","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1049\/cce:19990405"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.145"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00012"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2895957"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"ref89","volume-title":"Physical-fingerprinting of electronic control unit (ECU) based on machine learning algorithm for in-vehicle network communication protocol \u2018CAN-BUS","author":"Avatefipour","year":"2017"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812149"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24025"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985326"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1002\/9780470511770"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.2991\/citcs.2012.161"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2016.7952095"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00069"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309179"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2961344"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924294"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012428"},{"key":"ref106","first-page":"1","article-title":"Entropy, relative entropy and mutual information","volume":"2","author":"Cover","year":"1991","journal-title":"Elements Inf. Theory"},{"issue":"1","key":"ref107","first-page":"279","article-title":"Information theory and statistics","volume":"1","author":"Cover","year":"1991","journal-title":"Elem. Inform. Theory"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865169"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1177011077"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00193"},{"key":"ref114","first-page":"802","article-title":"Convolutional LSTM network: A machine learning approach for precipitation nowcasting","volume-title":"Proc. 28th Int. Conf. Neural Inf. Process. Syst. (NIPS)","volume":"1","author":"Xingjian"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012749"},{"key":"ref116","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung","year":"2014","journal-title":"arXiv:1412.3555"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309174"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309180"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025685"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975893"},{"key":"ref123","first-page":"1","article-title":"Anomaly detection in recordings from in-vehicle networks","volume-title":"Proc. Big data Appl.","volume":"23","author":"Theissler"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74176-5_25"},{"key":"ref125","article-title":"Embedded hybrid anomaly detection for automotive CAN communication","volume-title":"Proc. 9th Eur. Congr. Embedded Real Time Softw. Syst. (ERTS)","author":"Weber"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799210"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3208223"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2907269"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982544"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138843"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1654"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/3689930.3695212"},{"key":"ref133","article-title":"Detection of injection attacks in in-vehicle networks","volume-title":"Proc. Electr. Comput. Eng. Conf. Papers, Posters Presentations","author":"ben Othmane"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS48664.2019.8987605"},{"key":"ref135","first-page":"1","article-title":"SAID: state-aware defense against injection attacks on in-vehicle network","volume-title":"Proc. USENIX Secur. Symp. (USENIX Security)","author":"Xue"},{"issue":"3","key":"ref136","first-page":"61","article-title":"The chi square test: An introduction","volume":"4","author":"Ugoni","year":"1995","journal-title":"COMSIG Rev."},{"key":"ref137","volume":"184","author":"Bollob\u00e1s","year":"2013","journal-title":"Modern Graph Theory"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.2113\/gsrocky.24.special_paper_3.317"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3282110"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2500853.2500857"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2005.05.008"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.2307\/2699986"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1556155"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/CyberneticsCom.2013.6865779"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-4154-3_4"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-169-1"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2846232"},{"key":"ref150","volume-title":"Road Vehicles-diagnostics on Controller Area Networks (CAN)-requirements for Emissions-related Systems","year":"2005"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1063\/1.4822376"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth283"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref155","volume-title":"X-431 Pad","year":"2019"},{"key":"ref156","article-title":"You Can\u2019t see me: Physical removal attacks on LiDAR-based autonomous vehicles driving frameworks","author":"Cao","year":"2022","journal-title":"arXiv:2210.09482"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179458"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/832"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107174"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9797928"},{"key":"ref161","first-page":"1921","article-title":"SAID: State-aware defense against injection attacks on in-vehicle network","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Xue"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3283995"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45371-8_3"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00018"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3151712"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3182481"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158055"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1504\/ijvics.2020.110994"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT54557.2022.9917816"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.3390\/app10186236"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3198755"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2022.3187674"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108146"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782159"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900516"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500823"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223658"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.130"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034621"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034015"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082160"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00632-4"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3017882"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00058"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100585"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1145\/3503914"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTTECH54121.2022.00025"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/11063346\/11006289.pdf?arnumber=11006289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:14:34Z","timestamp":1751519674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11006289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":189,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tits.2025.3567940","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}