{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:10:49Z","timestamp":1775837449036,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MOST","award":["108-2221-E-005-021-MY3"],"award-info":[{"award-number":["108-2221-E-005-021-MY3"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506509","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"53-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A Deep Learning-Based Integrated Algorithm for Misbehavior Detection System in VANETs"],"prefix":"10.1145","author":[{"given":"Hsiao-Yuan","family":"Hsu","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan"}]},{"given":"Nai-Hsin","family":"Cheng","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan"}]},{"given":"Chun-Wei","family":"Tsai","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"World Health Organization \"Global status report on road safety 2018.\" [Online]. Available: https:\/\/www.who.int\/publications\/i\/item\/9789241565684  World Health Organization \"Global status report on road safety 2018.\" [Online]. Available: https:\/\/www.who.int\/publications\/i\/item\/9789241565684"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2839561"},{"key":"e_1_3_2_1_3_1","unstructured":"V2X Core Technical Committee \"V2x communications message set dictionary \" 2020. [Online]. Available: https:\/\/www.sae.org\/standards\/content\/j2735_202007\/  V2X Core Technical Committee \"V2x communications message set dictionary \" 2020. [Online]. Available: https:\/\/www.sae.org\/standards\/content\/j2735_202007\/"},{"key":"e_1_3_2_1_4_1","first-page":"1985","article-title":"A survey on VANET intrusion detection systems","volume":"5","author":"Erritali M.","year":"2013","unstructured":"M. Erritali , B. E. Ouahidi , and Mohamed , \" A survey on VANET intrusion detection systems ,\" International Journal of Engineering and Technology , vol. 5 , pp. 1985 -- 1989 , 2013 . M. Erritali, B. E. Ouahidi, and Mohamed, \"A survey on VANET intrusion detection systems,\" International Journal of Engineering and Technology, vol. 5, pp. 1985--1989, 2013.","journal-title":"International Journal of Engineering and Technology"},{"key":"e_1_3_2_1_5_1","first-page":"288","volume-title":"IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security","author":"Zeng Y.","year":"2019","unstructured":"Y. Zeng , M. Qiu , D. Zhu , Z. Xue , J. Xiong , and M. Liu , \" DeepVCM: A deep learning based intrusion detection method in VANET,\" in Proceedings of the IEEE International Conference on Big Data Security on Cloud (BigDataSecurity) , IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security , 2019 , pp. 288 -- 293 . Y. Zeng, M. Qiu, D. Zhu, Z. Xue, J. Xiong, and M. Liu, \"DeepVCM: A deep learning based intrusion detection method in VANET,\" in Proceedings of the IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, 2019, pp. 288--293."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Y. Zeng M. Qiu J. Niu Y. Long J. Xiong and M. Liu \"V-PSC: A perturbation-based causative attack against dl classifiers' supply chain in VANET \" in Proceedings of the IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing 2019 pp. 86--91.  Y. Zeng M. Qiu J. Niu Y. Long J. Xiong and M. Liu \"V-PSC: A perturbation-based causative attack against dl classifiers' supply chain in VANET \" in Proceedings of the IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing 2019 pp. 86--91.","DOI":"10.1109\/CSE\/EUC.2019.00026"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Hybrid neural network framework for detection of cyber attacks at smart infrastructures","author":"Krundyshev V.","year":"2019","unstructured":"V. Krundyshev and M. Kalinin , \" Hybrid neural network framework for detection of cyber attacks at smart infrastructures ,\" in Proceedings of the ACM International Conference on Security of Information and Networks , 2019 , pp. 1 -- 7 . V. Krundyshev and M. Kalinin, \"Hybrid neural network framework for detection of cyber attacks at smart infrastructures,\" in Proceedings of the ACM International Conference on Security of Information and Networks, 2019, pp. 1--7.","journal-title":"Proceedings of the ACM International Conference on Security of Information and Networks"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854842"},{"key":"e_1_3_2_1_9_1","first-page":"564","article-title":"Integrating plausibility checks and machine learning for misbehavior detection in VANET","author":"So S.","year":"2018","unstructured":"S. So , P. Sharma , and J. Petit , \" Integrating plausibility checks and machine learning for misbehavior detection in VANET ,\" in Proceedings of the IEEE International Conference on Machine Learning and Applications , 2018 , pp. 564 -- 571 . S. So, P. Sharma, and J. Petit, \"Integrating plausibility checks and machine learning for misbehavior detection in VANET,\" in Proceedings of the IEEE International Conference on Machine Learning and Applications, 2018, pp. 564--571.","journal-title":"Proceedings of the IEEE International Conference on Machine Learning and Applications"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3035035"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Misbehavior detection using machine learning in vehicular communication networks","author":"Gyawali S.","year":"2019","unstructured":"S. Gyawali and Y. Qian , \" Misbehavior detection using machine learning in vehicular communication networks ,\" in Proceedings of the IEEE International Conference on Communications , 2019 , pp. 1 -- 6 . S. Gyawali and Y. Qian, \"Misbehavior detection using machine learning in vehicular communication networks,\" in Proceedings of the IEEE International Conference on Communications, 2019, pp. 1--6.","journal-title":"Proceedings of the IEEE International Conference on Communications"},{"key":"e_1_3_2_1_12_1","first-page":"94","volume-title":"A new combination of machine learning algorithms using stacking approach for misbehavior detection in VANETs","author":"Sonker A.","year":"2020","unstructured":"A. Sonker and R. Gupta , \" A new combination of machine learning algorithms using stacking approach for misbehavior detection in VANETs ,\" vol. 20 , pp. 94 -- 100 , 2020 . A. Sonker and R. Gupta, \"A new combination of machine learning algorithms using stacking approach for misbehavior detection in VANETs,\" vol. 20, pp. 94--100, 2020."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2990984"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2021.3058292"},{"key":"e_1_3_2_1_15_1","first-page":"787","article-title":"Edge computing and deep learning enabled secure multi-tier network for internet of vehicles","author":"Grover H.","year":"2021","unstructured":"H. Grover , T. Alladi , V. Chamola , D. Singh , and K.-K. R. Choo , \" Edge computing and deep learning enabled secure multi-tier network for internet of vehicles ,\" IEEE Internet of Things Journal , pp. 14 787 - 714 796, 2021 . H. Grover, T. Alladi, V. Chamola, D. Singh, and K.-K. R. Choo, \"Edge computing and deep learning enabled secure multi-tier network for internet of vehicles,\" IEEE Internet of Things Journal, pp. 14 787-14 796, 2021.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Deep neural networks for securing iot enabled vehicular ad-hoc networks","author":"Alladi T.","year":"2021","unstructured":"T. Alladi , A. Agrawal , B. Gera , V. Chamola , B. Sikdar , and M. Guizani , \" Deep neural networks for securing iot enabled vehicular ad-hoc networks ,\" in Proceedings of the IEEE International Conference on Communications , 2021 , pp. 1 -- 6 . T. Alladi, A. Agrawal, B. Gera, V. Chamola, B. Sikdar, and M. Guizani, \"Deep neural networks for securing iot enabled vehicular ad-hoc networks,\" in Proceedings of the IEEE International Conference on Communications, 2021, pp. 1--6.","journal-title":"Proceedings of the IEEE International Conference on Communications"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000428"},{"key":"e_1_3_2_1_18_1","unstructured":"DSRC Technical Committee \"Dedicated short range communication systems engineering process guidance for sae j2945\/x documents and common design concepts\u2122 \" 2017. [Online]. Available: https:\/\/www.sae.org\/standards\/content\/j2945_201712\/  DSRC Technical Committee \"Dedicated short range communication systems engineering process guidance for sae j2945\/x documents and common design concepts\u2122 \" 2017. [Online]. Available: https:\/\/www.sae.org\/standards\/content\/j2945_201712\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3049520"},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Synthetic datasets generation for intrusion detection in VANET","author":"Belenko V.","year":"2018","unstructured":"V. Belenko , V. Krundyshev , and M. Kalinin , \" Synthetic datasets generation for intrusion detection in VANET ,\" in Proceedings of the ACM International Conference on Security of Information and Networks , 2018 , pp. 1 -- 6 . V. Belenko, V. Krundyshev, and M. Kalinin, \"Synthetic datasets generation for intrusion detection in VANET,\" in Proceedings of the ACM International Conference on Security of Information and Networks, 2018, pp. 1--6.","journal-title":"Proceedings of the ACM International Conference on Security of Information and Networks"},{"key":"e_1_3_2_1_21_1","first-page":"06701","article-title":"VeReMi: A dataset for comparable evaluation of misbehavior detection in VANETs","volume":"1804","author":"van der Heijden R. W.","year":"2018","unstructured":"R. W. van der Heijden , T. Lukaseder , and F. Kargl , \" VeReMi: A dataset for comparable evaluation of misbehavior detection in VANETs ,\" Computing Research Repository , vol. abs\/ 1804 . 06701 , 2018 . R. W. van der Heijden, T. Lukaseder, and F. Kargl, \"VeReMi: A dataset for comparable evaluation of misbehavior detection in VANETs,\" Computing Research Repository, vol. abs\/1804.06701, 2018.","journal-title":"Computing Research Repository"},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"VeReMi extension: A dataset for comparable evaluation of misbehavior detection in VANETs","author":"Kamel J.","year":"2020","unstructured":"J. Kamel , M. Wolf , R. W. van der Hei , A. Kaiser , P. Urien , and F. Kargl , \" VeReMi extension: A dataset for comparable evaluation of misbehavior detection in VANETs ,\" in Proceedings of the IEEE International Conference on Communications , 2020 , pp. 1 -- 6 . J. Kamel, M. Wolf, R. W. van der Hei, A. Kaiser, P. Urien, and F. Kargl, \"VeReMi extension: A dataset for comparable evaluation of misbehavior detection in VANETs,\" in Proceedings of the IEEE International Conference on Communications, 2020, pp. 1--6.","journal-title":"Proceedings of the IEEE International Conference on Communications"},{"key":"e_1_3_2_1_23_1","first-page":"87","volume-title":"Eds.","author":"Kluyver T.","year":"2016","unstructured":"T. Kluyver , B. Ragan-Kelley , F. P\u00e9rez , B. Granger , M. Bussonnier , J. Frederic , K. Kelley , J. Hamrick , J. Grout , S. Corlay , P. Ivanov , D. Avila , S. Abdalla , and C. Willing , \" Jupyter notebooks - A publishing format for reproducible computational workflows,\" in Positioning and Power in Academic Publishing: Players, Agents and Agendas, F. Loizides and B. Schmidt , Eds. , 2016 , pp. 87 -- 90 . T. Kluyver, B. Ragan-Kelley, F. P\u00e9rez, B. Granger, M. Bussonnier, J. Frederic, K. Kelley, J. Hamrick, J. Grout, S. Corlay, P. Ivanov, D. Avila, S. Abdalla, and C. Willing, \"Jupyter notebooks - A publishing format for reproducible computational workflows,\" in Positioning and Power in Academic Publishing: Players, Agents and Agendas, F. Loizides and B. Schmidt, Eds., 2016, pp. 87--90."}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","location":"Jinan China","acronym":"ACM ICEA '21","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:47Z","timestamp":1750188647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":23,"alternative-id":["10.1145\/3491396.3506509","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506509","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}