{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:47:42Z","timestamp":1773924462832,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61701406"],"award-info":[{"award-number":["61701406"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61701413"],"award-info":[{"award-number":["61701413"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971084"],"award-info":[{"award-number":["61971084"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["BX20180261"],"award-info":[{"award-number":["BX20180261"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018T110210"],"award-info":[{"award-number":["2018T110210"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Applied Basic Research Programs of Qingdao City","award":["18-2-2-36-jch"],"award-info":[{"award-number":["18-2-2-36-jch"]}]},{"name":"Shenzhen Technology Project","award":["JSGG20170413171746130"],"award-info":[{"award-number":["JSGG20170413171746130"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["cstc2019jcyj-msxmX0208"],"award-info":[{"award-number":["cstc2019jcyj-msxmX0208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2020,10,1]]},"DOI":"10.1109\/tnse.2020.2990984","type":"journal-article","created":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T20:11:25Z","timestamp":1588018285000},"page":"2219-2230","source":"Crossref","is-referenced-by-count":147,"title":["Data-Driven Intrusion Detection for Intelligent Internet of Vehicles: A Deep Convolutional Neural Network-Based Method"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8813-7738","authenticated-orcid":false,"given":"Laisen","family":"Nie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7870-5524","authenticated-orcid":false,"given":"Zhaolong","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Xiaojie","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4952-699X","authenticated-orcid":false,"given":"Xiping","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3131-3275","authenticated-orcid":false,"given":"Jun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yongkang","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"ref38","article-title":"Research of intrusion detection system based on neural networks","year":"0","journal-title":"2011 IEEE 3rd Int Conf Commun Softw and Netw"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.01.023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2815435"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2808319"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2843296"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2008.929453"},{"key":"ref36","article-title":"A probabilistic representation of deep learning","year":"0"},{"key":"ref35","article-title":"On the Dirichlet prior and Bayesian regularization","author":"steck","year":"0","journal-title":"NeurIPS"},{"key":"ref34","article-title":"Deep learning requires rethinking generalization","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2593051"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2597125"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2812851"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480244"},{"key":"ref13","article-title":"Deep reinforcement learning based resource management for multi-access edge computing in vehicular networks","year":"0","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2786343"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2366120"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2879967"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701065"},{"key":"ref18","article-title":"A fusion framework based on sparse gaussian-wigner prediction for vehicle localization using GDOP of GPS satellites","year":"0","journal-title":"IEEE Trans Intell Transportation Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934468"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2698457"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3623","DOI":"10.1109\/TITS.2018.2878253","article-title":"Stop-and-wait: Discover aggregation effect based on private car trajectory data","volume":"20","author":"wang","year":"2019","journal-title":"IEEE Trans Intell Transportation Syst"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2557808"},{"key":"ref3","article-title":"Data-driven edge intelligence for robust network anomaly detection","year":"0","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2858240"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2787997"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2880238"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2018.000041"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2855683"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600263"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2737826"},{"key":"ref1","article-title":"Toward accurate vehicle state estimation under non-gaussian noises","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref20","article-title":"DDoS attacks at the application layer: Challenges and research perspectives for safeguarding Web applications","year":"0","journal-title":"IEEE Commun Surveys Tutorials"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2789466"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2799545"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2600370"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2923156"},{"key":"ref26","article-title":"Deep learning approach for network intrusion detection in software defined networking","year":"0","journal-title":"2016 Int Conf Wireless Netw and Mobile Commun (WINCOM)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2490802"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/9311468\/09079682.pdf?arnumber=9079682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:24:34Z","timestamp":1651080274000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9079682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":40,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2020.2990984","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,1]]}}}