{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:14Z","timestamp":1750309514684,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T00:00:00Z","timestamp":1719100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation grants CPS","award":["1645578"],"award-info":[{"award-number":["1645578"]}]},{"name":"Semiconductor Research Corporation (SRC)","award":["project 3154"],"award-info":[{"award-number":["project 3154"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,23]]},"DOI":"10.1145\/3649329.3658491","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:27:22Z","timestamp":1731007642000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Conclave - Secure and Robust Cooperative Perception for Connected Autonomous Vehicle Using Authenticated Consensus and Trust Scoring"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4722-9032","authenticated-orcid":false,"given":"Edward","family":"Andert","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6936-3285","authenticated-orcid":false,"given":"Francis","family":"Mendoza","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6706-4197","authenticated-orcid":false,"given":"Hans Walter","family":"Behrens","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1075-897X","authenticated-orcid":false,"given":"Aviral","family":"Shrivastava","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"volume-title":"2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC). IEEE, 1--8.","author":"Edward","key":"e_1_3_2_1_1_1","unstructured":"Edward Andert et al. 2022. Accurate Cooperative Sensor Fusion by Parameterized Covariance Generation for Sensing and Localization Pipelines in CAVs. In 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC). IEEE, 1--8."},{"volume-title":"ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1--6.","author":"Walter Hans","key":"e_1_3_2_1_2_1","unstructured":"Hans Walter Behrens et al. 2020. Pando: Efficient Byzantine-Tolerant Distributed Sensor Fusion using Forest Ensembles. In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1--6."},{"volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 163--192","author":"Mihir","key":"e_1_3_2_1_3_1","unstructured":"Mihir Bellare et al. 1997. A new paradigm for collision-free hashing: Incrementality at reduced cost. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 163--192."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.04.024"},{"key":"e_1_3_2_1_5_1","unstructured":"Matthew Cavorsi et al. 2022. Exploiting trust for resilient hypothesis testing with malicious robots. arXiv preprint arXiv:2209.12285 (2022)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102242"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.04.007"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029512"},{"key":"e_1_3_2_1_9_1","first-page":"5","article-title":"Lest We Remember","volume":"52","author":"J. Alex Halderman","year":"2009","unstructured":"J. Alex Halderman et al. 2009. Lest We Remember: Cold-Boot Attacks on Encryption Keys. Commun. ACM 52, 5 (May 2009), 91--98.","journal-title":"Cold-Boot Attacks on Encryption Keys. Commun. ACM"},{"key":"e_1_3_2_1_10_1","first-page":"162","article-title":"Distributed finite-time safety consensus control of vehicle platoon with senor and actuator failures","volume":"72","author":"Jinheng Han","year":"2022","unstructured":"Jinheng Han et al. 2022. Distributed finite-time safety consensus control of vehicle platoon with senor and actuator failures. IEEE Transactions on Vehicular Technology 72, 1 (2022), 162--175.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108558"},{"volume-title":"2019 IEEE 27th International Conference on Network Protocols (ICNP). IEEE, 1--6.","author":"Jianhua","key":"e_1_3_2_1_12_1","unstructured":"Jianhua He et al. 2019. Cooperative connected autonomous vehicles (CAV): research, applications and challenges. In 2019 IEEE 27th International Conference on Network Protocols (ICNP). IEEE, 1--6."},{"volume-title":"2020 IEEE Intelligent Vehicles Symposium (IV). IEEE, 341--347","author":"Braden","key":"e_1_3_2_1_13_1","unstructured":"Braden Hurl et al. 2020. Trupercept: Trust modelling for autonomous vehicle cooperative perception from synthetic data. In 2020 IEEE Intelligent Vehicles Symposium (IV). IEEE, 341--347."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407903"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22)","author":"Chen","year":"1977","unstructured":"Chen Liu et al. 2022. Frequency Throttling Side-Channel Attack. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22). Association for Computing Machinery, New York, NY, USA, 1977--1991."},{"key":"e_1_3_2_1_16_1","first-page":"760","article-title":"A survey on recent advances in vehicular network security, trust, and privacy","volume":"20","author":"Zhaojun Lu","year":"2018","unstructured":"Zhaojun Lu et al. 2018. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems 20, 2 (2018), 760--776.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"volume-title":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). IEEE, 1--5.","author":"Harsh","key":"e_1_3_2_1_17_1","unstructured":"Harsh Mankodiya et al. 2021. XAI-AV: Explainable artificial intelligence for trust management in autonomous vehicles. In 2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). IEEE, 1--5."},{"key":"e_1_3_2_1_18_1","unstructured":"Tarak Nandy et al. 2021. A Secure Privacy-Preserving and Lightweight Authentication Scheme for VANETs. IEEE Sensors Journal (2021) 1--1."},{"volume-title":"The security of vehicular adhoc networks. In 2011 third international conference on computational intelligence, communication systems and networks","author":"Sabahi Farzad","key":"e_1_3_2_1_19_1","unstructured":"Farzad Sabahi. 2011. The security of vehicular adhoc networks. In 2011 third international conference on computational intelligence, communication systems and networks. IEEE, 338--342."},{"volume-title":"Distributed Computing: 22nd International Symposium, DISC 2008, Arcachon, France, September 22-24, 2008. Proceedings 22","author":"Jiun Yee","key":"e_1_3_2_1_20_1","unstructured":"Yee Jiun Song et al. 2008. Bosco: One-step byzantine asynchronous consensus. In Distributed Computing: 22nd International Symposium, DISC 2008, Arcachon, France, September 22-24, 2008. Proceedings 22. Springer, 438--450."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2161294"},{"key":"e_1_3_2_1_22_1","unstructured":"Weizheng Wang et al. 2021. Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet of Things Journal (2021) 1--1."}],"event":{"name":"DAC '24: 61st ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"San Francisco CA USA","acronym":"DAC '24"},"container-title":["Proceedings of the 61st ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3658491","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3658491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:01Z","timestamp":1750295881000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3658491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,23]]},"references-count":22,"alternative-id":["10.1145\/3649329.3658491","10.1145\/3649329"],"URL":"https:\/\/doi.org\/10.1145\/3649329.3658491","relation":{},"subject":[],"published":{"date-parts":[[2024,6,23]]},"assertion":[{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}