{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:42:35Z","timestamp":1767984155902,"version":"3.49.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ministry of National Key Research and Development Project","award":["2020AAA0108101"],"award-info":[{"award-number":["2020AAA0108101"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62125101"],"award-info":[{"award-number":["62125101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Key Research and Development Project","award":["2019B010153003"],"award-info":[{"award-number":["2019B010153003"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2103256"],"award-info":[{"award-number":["CNS-2103256"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ECCS-2128593"],"award-info":[{"award-number":["ECCS-2128593"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1109\/twc.2022.3214499","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:08:29Z","timestamp":1667513309000},"page":"2833-2846","source":"Crossref","is-referenced-by-count":8,"title":["Confidence Evaluation for Machine Learning Schemes in Vehicular Sensor Networks"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9898-5543","authenticated-orcid":false,"given":"Xinhu","family":"Zheng","sequence":"first","affiliation":[{"name":"Intelligent Transportation Thrust, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"given":"Sijiang","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, Peking University, Beijing, China"}]},{"given":"Yuru","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1015-2481","authenticated-orcid":false,"given":"Dongliang","family":"Duan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Wyoming, Laramie, WY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0231-6837","authenticated-orcid":false,"given":"Liuqing","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5943-0326","authenticated-orcid":false,"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TW.2013.072313.121397"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735780"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref5","article-title":"Detecting adversarial samples from artifacts","author":"Feinman","year":"2017","journal-title":"arXiv:1703.00410"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569814"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045502"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref9","first-page":"1","article-title":"Practical variational inference for neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"24","author":"Graves"},{"key":"ref10","article-title":"Towards deep neural network architectures robust to adversarial examples","author":"Gu","year":"2014","journal-title":"arXiv:1412.5068"},{"key":"ref11","first-page":"1321","article-title":"On calibration of modern neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Guo"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref13","article-title":"Formal guarantees on the robustness of a classifier against adversarial manipulation","author":"Hein","year":"2017","journal-title":"arXiv:1705.08475"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/168304.168306"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref16","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017","journal-title":"arXiv:1704.04861"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.351"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05946-3"},{"key":"ref19","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ioffe"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.080280"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2178836"},{"key":"ref25","article-title":"Training confidence-calibrated classifiers for detecting out-of-distribution samples","author":"Lee","year":"2017","journal-title":"arXiv:1711.09325"},{"key":"ref26","first-page":"1","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Lee"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/10485250903194003"},{"key":"ref28","article-title":"Network in network","author":"Lin","year":"2013","journal-title":"arXiv:1312.4400"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.l007\/978-3-319-46448-0_2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639089"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1992.4.3.448"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref34","article-title":"Variational Bayesian inference with stochastic search","author":"Paisley","year":"2012","journal-title":"arXiv:1206.6430"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2662022"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref38","first-page":"1278","article-title":"Stochastic backpropagation and approximate inference in deep generative models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Rezende"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2587582"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1201\/9781315140919"},{"key":"ref41","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.888330"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref44","first-page":"384","article-title":"Learning a parametric embedding by preserving local structure","volume-title":"Artificial Intelligence and Statistics","author":"Van Der Maaten","year":"2009"},{"issue":"11","key":"ref45","first-page":"1","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1201\/b14876"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2020.102907"},{"key":"ref48","article-title":"Evaluating the robustness of neural networks: An extreme value theory approach","author":"Weng","year":"2018","journal-title":"arXiv:1801.10578"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/7693\/10098671\/9926978-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/10098671\/09926978.pdf?arnumber=9926978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T23:03:46Z","timestamp":1705964626000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9926978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":48,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/twc.2022.3214499","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}