{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:10:21Z","timestamp":1774541421884,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802252"],"award-info":[{"award-number":["61802252"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019335","name":"Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security","doi-asserted-by":"publisher","award":["AGK2019005"],"award-info":[{"award-number":["AGK2019005"]}],"id":[{"id":"10.13039\/501100019335","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tvt.2023.3306345","type":"journal-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T17:18:10Z","timestamp":1692379090000},"page":"200-215","source":"Crossref","is-referenced-by-count":19,"title":["Multi-Sensors Space and Time Dimension Based Intrusion Detection System in Automated Vehicles"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4488-8673","authenticated-orcid":false,"given":"Liyuan","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7767-0553","authenticated-orcid":false,"given":"Xiaomei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3770-3554","authenticated-orcid":false,"given":"Dongmei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3287-9032","authenticated-orcid":false,"given":"Huibin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"ref2","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. USENIX Secur. Symp.","author":"Checkoway","year":"2011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"issue":"2015","key":"ref4","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and liDAR","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Europe"},{"key":"ref5","article-title":"A survey of remote automotive attack surfaces","volume":"2014","author":"Miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.507"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.149-172"},{"key":"ref8","first-page":"1","article-title":"CANAuth-A simple, backward compatible broadcast authentication protocol for CAN bus","volume-title":"Proc. ECRYPT Workshop Lightweight Cryptography","author":"Herrewege","year":"2011"},{"key":"ref9","first-page":"207","article-title":"Hardware module-based message authentication in intra-vehicle networks","volume-title":"Proc. 8th Int. Conf. Cyber- Phys. Syst.","author":"Wang","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref11","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Cho","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2907692"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2840819"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MetroCAD51599.2021.00014"},{"key":"ref16","first-page":"215","article-title":"Inter-message correlation for intrusion detection in controller area networks","volume-title":"Proc. 17th ESCAR Europe Conf.","author":"Sagong","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1654"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865169"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032935"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138843"},{"key":"ref22","article-title":"Anomaly-based detection of malicious activity in in-vehicle networks","author":"Taylor","year":"2017"},{"key":"ref23","first-page":"21","article-title":"Context-aware intrusion detection in automotive control systems","volume-title":"Proc. 5th ESCAR USA Conf.","author":"Wasicek","year":"2017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27293-1_9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980523"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3038991"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2906038"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3106940"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s21134592"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.03.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957520"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2022.101940"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3060751"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.11.003"},{"key":"ref37","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. 25th Int. Conf. Neural Inf. Process. Syst.","author":"Krizhevsky","year":"2013"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537907"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.05.128"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ebiom.2021.103550"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3113675"},{"key":"ref42","volume-title":"Developments in Car Hacking","author":"Currie","year":"2015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1148\/radiol.2273011499"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(99)00047-7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1224062"},{"key":"ref47","article-title":"Open sourcing 223 GB of driving data","year":"2018"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2016.7535434"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2020.3014124"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/10400535\/10224320.pdf?arnumber=10224320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:56:43Z","timestamp":1705543003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10224320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":49,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2023.3306345","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}