{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:20Z","timestamp":1775228720095,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"2021 Autonomous Driving Development Innovation Project of the Ministry of Science and ICT"},{"name":"Development of technology for security and ultrahigh- speed integrity of the next-generation internal network of autonomous vehicles","award":["2021-0-01348"],"award-info":[{"award-number":["2021-0-01348"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tvt.2023.3327275","type":"journal-article","created":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T17:52:02Z","timestamp":1698169922000},"page":"3230-3246","source":"Crossref","is-referenced-by-count":48,"title":["X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5638-2851","authenticated-orcid":false,"given":"Seonghoon","family":"Jeong","sequence":"first","affiliation":[{"name":"Institute of Cybersecurity and Privacy, Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6817-5339","authenticated-orcid":false,"given":"Sangho","family":"Lee","sequence":"additional","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8070-3907","authenticated-orcid":false,"given":"Hwejae","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0760-8807","authenticated-orcid":false,"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Korea University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref3","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume-title":"Proc. Black Hat USA 2015","author":"Miller","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3618-9"},{"key":"ref6","article-title":"Jailbreaking subaru StarLink","author":"Gayou","year":"2018"},{"key":"ref7","article-title":"Tesla car hacked at Pwn2Own contest","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSE\/EUC.2019.00094"},{"key":"ref9","article-title":"Mercedes-Benz MBUX security research report","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029307"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101857"},{"key":"ref14","first-page":"21","article-title":"Context-aware intrusion detection in automotive control systems","volume-title":"Proc. 5th ESCAR USA","author":"Wasicek","year":"2017"},{"key":"ref15","article-title":"CANShield: Signal-based intrusion detection for controller area networks","author":"Shahriar","year":"2022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3092354"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221383"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363190"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690781"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI46756.2018.00061"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69835-9_71"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"ref23","article-title":"OpenDBC","year":"2017"},{"key":"ref24","article-title":"Addressing the lack of comparability & testing in CAN intrusion detection research: A comprehensive guide to CAN IDS data & introduction of the ROAD dataset","author":"Verma","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00069"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2961344"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309179"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3038991"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3268500"},{"key":"ref33","article-title":"OBD-II PIDs (Wikipedia)","year":"2006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995934"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240550"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980523"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3051026"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100520"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/10472306\/10294210.pdf?arnumber=10294210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T12:03:39Z","timestamp":1711454619000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10294210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2023.3327275","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}