{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:22:20Z","timestamp":1762953740148,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["109-2811-E-194-501","108-2221-E-194-022-MY3","108-2221-E-194-019-MY3"],"award-info":[{"award-number":["109-2811-E-194-501","108-2221-E-194-022-MY3","108-2221-E-194-019-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Advanced Institute of Manufacturing with High-tech Innovations"},{"name":"Ministry of Education (MOE) in Taiwan"},{"name":"TNU-University of Information and Communication Technology"},{"name":"Taiwan Information Security Center at National Sun Yat-sen University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/tvt.2020.2975822","type":"journal-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T04:14:15Z","timestamp":1582604055000},"page":"9417-9430","source":"Crossref","is-referenced-by-count":52,"title":["Enhancing Misbehavior Detection in 5G Vehicle-to-Vehicle Communications"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3472-0108","authenticated-orcid":false,"given":"Van-Linh","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8294-5857","authenticated-orcid":false,"given":"Po-Ching","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7996-4184","authenticated-orcid":false,"given":"Ren-Hung","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2003.1243440"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.23919\/ICIF.2018.8454982"},{"year":"2020","key":"ref33","article-title":"Unscented kalman filter in autonomous driving"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2317803"},{"key":"ref31","first-page":"1","article-title":"Final 5G V2X radio design","year":"2019","journal-title":"5th Gener Commun Autom Res Innov"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2504328"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/7.640267"},{"key":"ref36","first-page":"23","article-title":"Comparison and evaluation of advanced motion models for vehicle tracking","author":"schubert","year":"0","journal-title":"Proc 11th Inter Conf Info Fusion"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-016-0589-2"},{"key":"ref34","first-page":"1","article-title":"Bayesian filtering: From Kalman filters to particle filters, and beyond","author":"chen","year":"2003","journal-title":"Statist J Theor Appl Statist"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2262176"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2123096"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2907692"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323406"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228654"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2927979"},{"article-title":"Detecting misbehavior in vehicle-to-vehicle communications","year":"2018","author":"naserian","key":"ref15"},{"key":"ref16","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR","author":"petit","year":"2015","journal-title":"Black Hat Eur"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375934"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800533"},{"key":"ref19","first-page":"1","article-title":"Report on channel modelling and positioning for 5G V2X","year":"2018","journal-title":"5th Gener Commun Autom Res Innov"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1700087"},{"journal-title":"ITS communications security architecture and security management","year":"2018","key":"ref27"},{"year":"2020","key":"ref3","article-title":"Advanced driver asssistance systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2898898"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2797529"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.02.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2658662"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110308"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2795381"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2808444"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2785788"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869360"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2655498"},{"journal-title":"Study on Enhancement of 3GPP Support for 5G V2X Services","year":"2018","key":"ref24"},{"key":"ref41","first-page":"318","article-title":"Veremi: A dataset for comparable evaluation of misbehavior detection in vanets","author":"heijden","year":"0","journal-title":"Proc 14th Int Conf SecureComm Secur Privacy Commun Netw"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647812"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2840136"},{"year":"2019","key":"ref43","article-title":"SAE.J3016.Updates"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/9222588\/09007476.pdf?arnumber=9007476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:44:28Z","timestamp":1651067068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9007476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":43,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2020.2975822","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"type":"print","value":"0018-9545"},{"type":"electronic","value":"1939-9359"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}