{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:09:58Z","timestamp":1763345398440,"version":"3.45.0"},"reference-count":143,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066306","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T09:10:48Z","timestamp":1753693848000},"page":"181-219","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Survey of Deep Learning for Authentication in Vehicular Communication"],"prefix":"10.32604","volume":"85","author":[{"given":"Tarak","family":"Nandy","sequence":"first","affiliation":[]},{"given":"Sananda","family":"Bhattacharyya","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"journal-title":"Early estimate of motor vehicle traffic fatalities for the first half (January\u2013June) of 2023 [Internet]","key":"ref1"},{"journal-title":"Connected cars worldwide\u2014statistics & facts Statista [Internet]","year":"2023 [cited 2025 Jun 19]","author":"Placek","key":"ref2"},{"key":"ref3","unstructured":"Security U. Upstream\u2019s 2025 global automotive and smart mobility cybersecurity report. [Internet]; 2024 [cited 2025 Jun 18]. Available from: https:\/\/upstream.auto\/reports\/global-automotive-cybersecurity-report."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"8919","DOI":"10.1109\/TITS.2023.3275741","article-title":"Edge intelligence in intelligent transportation systems: a survey","volume":"24","author":"Gong","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"225","DOI":"10.3390\/su13010225","article-title":"Campus shuttle bus route optimization using machine learning predictive analysis: a case study","volume":"13","author":"Noor","year":"2021","journal-title":"Sustainability"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"6309","DOI":"10.1109\/TITS.2023.3343434","article-title":"Intelligent transportation systems using roadside infrastructure: a literature survey","volume":"25","author":"Cre\u00df","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref7","series-title":"Proceedings of the 2020 IEEE 8th R10 Humanitarian Technology Conference (R10-HTC)","article-title":"A multiple-criteria decision analysis clustering and cluster head selection algorithm in vehicular network","author":"Nandy","year":"2020 Dec 1\u20133"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","article-title":"Dedicated short-range communications (DSRC) standards in the United States","volume":"99","author":"Kenney","year":"2011","journal-title":"Proc IEEE"},{"key":"ref9","unstructured":"Google. Google Trends [Internet]; 2025 [cited 2025 Jun 20]. Available from: https:\/\/trends.google.com."},{"key":"ref10","first-page":"45","article-title":"Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey","volume":"16","author":"Ali","year":"2019","journal-title":"Veh Commun"},{"key":"ref11","first-page":"39","article-title":"A survey of authentication techniques in vehicular ad-hoc networks","volume":"13","author":"Farooq","year":"2020","journal-title":"IEEE Intell Transp Syst Mag"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"7927","DOI":"10.3390\/s21237927","article-title":"Blockchain-based authentication in internet of vehicles: a survey","volume":"21","author":"Abbas","year":"2021","journal-title":"Sensors"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2422","DOI":"10.1109\/JSEN.2020.3021731","article-title":"Survey of authentication and privacy schemes in vehicular ad hoc networks","volume":"21","author":"Al-Shareeda","year":"2021","journal-title":"IEEE Sens J"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"31309","DOI":"10.1109\/ACCESS.2021.3060046","article-title":"A comprehensive review of authentication schemes in vehicular ad-hoc network","volume":"9","author":"Azam","year":"2021","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4316","DOI":"10.1109\/TITS.2020.3032227","article-title":"Deep Learning for safe autonomous driving: current challenges and future directions","volume":"22","author":"Muhammad","year":"2021","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s11277-021-09118-3","article-title":"Secure Authentication schemes for vehicular Adhoc networks: a survey","volume":"123","author":"Jenefa","year":"2022","journal-title":"Wirel Pers Commun"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"13573","DOI":"10.1109\/TITS.2023.3297527","article-title":"A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks","volume":"24","author":"Dong","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2682","DOI":"10.3390\/s23052682","article-title":"A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems","volume":"23","author":"Sripathi Venkata Naga","year":"2023","journal-title":"Sensors"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2024.02.024","article-title":"A survey on privacy-preserving authentication protocols for secure vehicular communication","volume":"219","author":"Sutradhar","year":"2024","journal-title":"Comput Commun"},{"key":"ref20","first-page":"100784","article-title":"How secure are our roads? An in-depth review of authentication in vehicular communications","volume":"47","author":"Shawky","year":"2024","journal-title":"Veh Commun"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1818079","DOI":"10.1155\/2024\/1818079","article-title":"Ensuring security and privacy in VANET: a comprehensive survey of authentication approaches","volume":"2024","author":"Soujanya","year":"2024","journal-title":"J Comput Netw Commun"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"518","DOI":"10.3390\/wevj15110518","article-title":"A study to investigate the role and challenges associated with the use of deep learning in autonomous vehicles","volume":"15","author":"Aljehane","year":"2024","journal-title":"World Electr Veh J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5879","DOI":"10.3390\/su16145879","article-title":"The application of machine learning and deep learning in intelligent transportation: a scientometric analysis and qualitative review of research trends","volume":"16","author":"Zhang","year":"2024","journal-title":"Sustainability"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3390\/wevj16010014","article-title":"Enhancing cybersecurity and privacy protection for cloud computing-assisted vehicular network of autonomous electric vehicles: applications of machine learning","volume":"16","author":"Yang","year":"2025","journal-title":"World Electr Veh J"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"e367","DOI":"10.1002\/spy2.367","article-title":"Autonomous vehicle security: current survey and future research challenges","volume":"7","author":"Pali","year":"2024","journal-title":"Secur Priv"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"100809","DOI":"10.1016\/j.iot.2023.100809","article-title":"Security issues in Internet of Vehicles (IoV): a comprehensive survey","volume":"22","author":"Taslimasa","year":"2023","journal-title":"Internet Things"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"6748","DOI":"10.1109\/TITS.2023.3264453","article-title":"Survey of air, sea, and road vehicles research for motion control security","volume":"24","author":"P\u00f6llny","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"136706","DOI":"10.1109\/ACCESS.2023.3338156","article-title":"A survey on cyber-physical security of autonomous vehicles using a context awareness method","volume":"11","author":"Zaboli","year":"2023","journal-title":"IEEE Access"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"6240","DOI":"10.1109\/TITS.2021.3085297","article-title":"A survey on cyber-security of Connected and Autonomous Vehicles (CAVs)","volume":"23","author":"Sun","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"112121","DOI":"10.1016\/j.automatica.2025.112121","article-title":"Robust value iteration for optimal control of discrete-time linear systems","volume":"174","author":"Lai","year":"2025","journal-title":"Automatica"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"78290","DOI":"10.1109\/ACCESS.2025.3562785","article-title":"An adaptive vehicle location prediction using machine learning: a case study of campus shuttle bus","volume":"13","author":"Nandy","year":"2025","journal-title":"IEEE Access"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"25068","DOI":"10.1109\/JIOT.2022.3195320","article-title":"Deep-ensemble-learning-based GPS spoofing detection for cellular-connected UAVs","volume":"9","author":"Dang","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref33","first-page":"100864","article-title":"A data sharing scheme based on blockchain for privacy protection certification of Internet of Vehicles","volume":"51","author":"Shang","year":"2025","journal-title":"Veh Commun"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10586-024-04772-1","article-title":"A secure lightweight authentication model with interference aware routing and attack detection approach in VANET","volume":"28","author":"Kaur","year":"2025","journal-title":"Clust Comput"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3390\/e26070590","article-title":"A conditional privacy-preserving identity-authentication scheme for federated learning in the Internet of Vehicles","volume":"26","author":"Xu","year":"2024","journal-title":"Entropy"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"2107","DOI":"10.1007\/s00170-024-14959-w","article-title":"Human-centered cyber-physical systems in manufacturing industry: a systematic search and review","volume":"136","author":"Colombathanthri","year":"2025","journal-title":"Int J Adv Manuf Technol"},{"key":"ref37","series-title":"Proceedings of the the 3rd International Conference on Information Science and Systems","article-title":"An enhanced two-factor authentication protocol for V2V communication in VANETs","author":"Nandy","year":"2020 Mar 19\u201322"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1902","DOI":"10.1109\/TMC.2023.3243772","article-title":"MTSFBet: a hand-gesture-recognition-based identity authentication approach for passive keyless entry against relay attack","volume":"23","author":"Zhang","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"4467","DOI":"10.1109\/TMC.2023.3290834","article-title":"Memory-augmented autoencoder based continuous authentication on smartphones with conditional transformer gans","volume":"23","author":"Li","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s12198-024-00272-w","article-title":"Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security","volume":"17","author":"Borra","year":"2024","journal-title":"J Transp Secur"},{"key":"ref41","first-page":"193","article-title":"Edge based lightweight authentication architecture using deep learning for vehicular networks","volume":"23","author":"Park","year":"2022","journal-title":"J Internet Technol"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"101945","DOI":"10.1016\/j.jksuci.2024.101945","article-title":"A review of security attacks and intrusion detection in the vehicular networks","volume":"36","author":"Nandy","year":"2024","journal-title":"J King Saud Univ\u2014Comput Inf Sci"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"14460","DOI":"10.1109\/TITS.2024.3394130","article-title":"Energy-efficient cooperative secure communications in mmwave vehicular networks using deep recurrent reinforcement learning","volume":"25","author":"Ju","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/OJVT.2024.3422253","article-title":"Deep learning in the fast lane: a survey on advanced intrusion detection systems for intelligent vehicle networks","volume":"5","author":"Almehdhar","year":"2024","journal-title":"IEEE Open J Veh Technol"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.comcom.2021.06.013","article-title":"An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network","volume":"177","author":"Nandy","year":"2021","journal-title":"Comput Commun"},{"key":"ref46","first-page":"103927","article-title":"Towards an intelligent and automatic irrigation system based on internet of things with authentication feature in VANET","volume":"88","author":"Zhang","year":"2025","journal-title":"J Inf Secur Appl"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"3578","DOI":"10.3390\/s20123578","article-title":"A vision-based machine learning method for barrier access control using vehicle license plate authentication","volume":"20","author":"Islam","year":"2020","journal-title":"Sensors"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TII.2019.2946626","article-title":"Automobile driver fingerprinting: a new machine learning based authentication scheme","volume":"16","author":"Xun","year":"2020","journal-title":"IEEE Trans Ind Inform"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.3390\/electronics13081577","article-title":"Intelligent security authentication for connected and autonomous vehicles: attacks and defenses","volume":"13","author":"Qiu","year":"2024","journal-title":"Electronics"},{"key":"ref50","first-page":"100708","article-title":"Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles","volume":"45","author":"Umar","year":"2024","journal-title":"Veh Commun"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.epsr.2021.107207","article-title":"Data source authentication of synchrophasor measurement devices based on 1D-CNN and GRU","volume":"196","author":"Liu","year":"2021","journal-title":"Electr Power Syst Res"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"9779670","DOI":"10.1155\/2022\/9779670","article-title":"A lightweight authentication with dynamic batch-based group key management using LSTM in VANET","volume":"2022","author":"Shen","year":"2022","journal-title":"Secur Commun Netw"},{"key":"ref53","first-page":"21","article-title":"Transformer-based subject-sensitive hashing for integrity authentication of high-resolution remote sensing (HRRS) images","volume":"13","author":"Ding","year":"2023","journal-title":"Appl Sci"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.2991\/ijcis.d.200721.001","article-title":"Novel optimization based hybrid self-organizing map classifiers for iris image recognition","volume":"13","author":"Winston","year":"2020","journal-title":"Int J Comput Intell Syst"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"12682","DOI":"10.1109\/TVT.2024.3383449","article-title":"GPIDS: GAN assisted contextual pattern-aware intrusion detection system for IVN","volume":"73","author":"Qin","year":"2024","journal-title":"IEEE Trans Veh Technol"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"111367","DOI":"10.1016\/j.asoc.2024.111367","article-title":"Privacy-preserving dual interactive wasserstein generative adversarial network for cloud-based road condition monitoring in VANETs","volume":"154","author":"Narayanan","year":"2024","journal-title":"Appl Soft Comput"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3390\/info16010021","article-title":"EPRNG: effective pseudo-random number generator on the internet of vehicles using deep convolution generative adversarial network","volume":"16","author":"Fei","year":"2025","journal-title":"Information"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"e208","DOI":"10.1002\/spy2.208","article-title":"DS2AN: deep stacked sparse autoencoder for secure and fast authentication in HetNets","volume":"5","author":"Hemavathi","year":"2022","journal-title":"Secur Priv"},{"key":"ref59","series-title":"Proceedings of the Conference on Real-Time Image Processing and Deep Learning","article-title":"Reconstruct fingerprint images using deep learning and sparse autoencoder algorithms","author":"Saponara","year":"2021 Apr 12\u201316"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"15633","DOI":"10.1109\/JIOT.2023.3347603","article-title":"Physical layer authentication for industrial control based on convolutional denoising autoencoder","volume":"11","author":"Chen","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"204","DOI":"10.3390\/info15040204","article-title":"IUAutoTimeSVD++: a hybrid temporal recommender system integrating item and user features using a contractive autoencoder","volume":"15","author":"Azri","year":"2024","journal-title":"Information"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"2528","DOI":"10.1109\/JIOT.2022.3213593","article-title":"Physical-layer authentication based on hierarchical variational autoencoder for industrial internet of things","volume":"10","author":"Meng","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"2029","DOI":"10.1364\/OL.518952","article-title":"Variational autoencoder-assisted unsupervised hardware fingerprint authentication in a fiber network","volume":"49","author":"Qiu","year":"2024","journal-title":"Opt Lett"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"27635","DOI":"10.1109\/JIOT.2024.3399549","article-title":"AEGANAuth: autoencoder gan-based continuous authentication with conditional variational autoencoder generative adversarial network","volume":"11","author":"Li","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s11227-024-06490-2","article-title":"CNN-based continuous authentication for digital therapeutics using variational autoencoder","volume":"81","author":"Wang","year":"2025","journal-title":"J Supercomput"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"e0313708","DOI":"10.1371\/journal.pone.0313708","article-title":"A hybrid Bi-LSTM and RBM approach for advanced underwater object detection","volume":"19","author":"Manimurugan","year":"2024","journal-title":"PLoS One"},{"key":"ref67","first-page":"35","article-title":"An efficient attention-based hybridized deep learning network with deep RBM features for customer behavior prediction in digital marketing","volume":"4","author":"Sakthi","year":"2024","journal-title":"Kybernetes"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"23147","DOI":"10.1007\/s11227-024-06322-3","article-title":"SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption","volume":"80","author":"Rani","year":"2024","journal-title":"J Supercomput"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"7842287","DOI":"10.1155\/2022\/7842287","article-title":"A Trust aware authentication scheme for wireless sensor networks optimized by salp swarm optimization and deep belief networks","volume":"2022","author":"Althubiti","year":"2022","journal-title":"Math Probl Eng"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"31420","DOI":"10.1109\/ACCESS.2021.3060420","article-title":"An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network","volume":"9","author":"Yahuza","year":"2021","journal-title":"IEEE Access"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"e2243","DOI":"10.1002\/nem.2243","article-title":"Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing","volume":"33","author":"Samriya","year":"2023","journal-title":"Int J Netw Manage"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"12031","DOI":"10.1109\/TVT.2023.3264504","article-title":"A Markov decision process solution for energy-saving network selection and computation offloading in vehicular networks","volume":"72","author":"Shinde","year":"2023","journal-title":"IEEE Trans Veh Technol"},{"key":"ref73","series-title":"Proceedings of the IEEE 99th Vehicular Technology Conference (VTC-Spring)","article-title":"Few-shot specific emitter identification via neural architecture search and deep transfer learning","author":"Shi","year":"2024 Jun 24\u201327"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.ins.2021.11.066","article-title":"Cancelable ECG biometric based on combination of deep transfer learning with DNA and amino acid approaches for human authentication","volume":"585","author":"Sakr","year":"2022","journal-title":"Inf Sci"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"109652","DOI":"10.1016\/j.ijepes.2023.109652","article-title":"An improved dynamic programming algorithm for security-constrained unit commitment under spatial-temporal decomposition framework","volume":"155","author":"Chen","year":"2024","journal-title":"Int J Electr Power Energy Syst"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"42","DOI":"10.23919\/PCMP.2023.000140","article-title":"Transfer-based approximate dynamic programming for rolling security-constrained unit commitment with uncertainties","volume":"9","author":"Zhu","year":"2024","journal-title":"Prot Control Mod Power Syst"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"2707","DOI":"10.1109\/TSMC.2025.3525473","article-title":"Visionary policy iteration for continuous control","volume":"55","author":"Dong","year":"2025","journal-title":"IEEE Trans Syst Man Cybern-Syst"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"7239","DOI":"10.1109\/TAC.2024.3396107","article-title":"Deep neural network approximations for the stable manifolds of the Hamilton-Jacobi-Bellman equations","volume":"69","author":"Chen","year":"2024","journal-title":"IEEE Trans Autom Control"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"7608","DOI":"10.1109\/TCSS.2024.3441543","article-title":"Region-farm crop planning through double deep q-learning toward sustainable agriculture","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"669","DOI":"10.3390\/electronics13030669","article-title":"Secure healthcare model using multi-step deep q learning network in internet of things","volume":"13","author":"Roy","year":"2024","journal-title":"Electronics"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"110134","DOI":"10.1016\/j.comnet.2023.110134","article-title":"Unlocking QoS potential: integrating IoT services and Monte Carlo control for heterogeneous IoT device management in gateways","volume":"238","author":"Chakour","year":"2024","journal-title":"Comput Netw"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"1912","DOI":"10.3390\/heritage4030108","article-title":"Monte Carlo simulations of ED-XRF Spectra as an authentication tool for nuragic bronzes","volume":"4","author":"Nocco","year":"2021","journal-title":"Heritage"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"17437","DOI":"10.1109\/JIOT.2024.3357110","article-title":"Combining Lyapunov optimization with actor-critic networks for privacy-aware IIoT computation offloading","volume":"11","author":"Wu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"101938","DOI":"10.1016\/j.phycom.2022.101938","article-title":"A novel deep deterministic policy gradient model applied to intelligent transportation system security problems in 5G and 6G network scenarios","volume":"56","author":"Ribeiro","year":"2023","journal-title":"Phys Commun"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"3247","DOI":"10.1109\/LWC.2024.3464858","article-title":"Deep deterministic policy gradient-based physical layer authentication scheme under unknown attacking environment","volume":"13","author":"Jiu","year":"2024","journal-title":"IEEE Wirel Commun Lett"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"23447","DOI":"10.1109\/TITS.2022.3213018","article-title":"A hybrid deep learning algorithm for the license plate detection and recognition in vehicle-to-vehicle communications","volume":"23","author":"Pan","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"466","DOI":"10.3390\/info14080466","article-title":"An automated precise authentication of vehicles for enhancing the visual security protocols","volume":"14","author":"Roy","year":"2023","journal-title":"Information"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.jksuci.2023.01.014","article-title":"A comprehensive review on ensemble deep learning: opportunities and challenges","volume":"35","author":"Mohammed","year":"2023","journal-title":"J King Saud Univ\u2014Comput Inf Sci"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"5403","DOI":"10.1109\/TVT.2020.2977829","article-title":"FBIA: a fog-based identity authentication scheme for privacy preservation in Internet of vehicles","volume":"69","author":"Song","year":"2020","journal-title":"IEEE Trans Veh Technol"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"2362","DOI":"10.1109\/TASE.2023.3270764","article-title":"A novel deep ensemble learning to enhance user authentication in autonomous vehicles","volume":"21","author":"Du","year":"2024","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"161227","DOI":"10.1109\/ACCESS.2024.3486811","article-title":"A robust authentication and trust detection with privacy preservation of data for fog computing in VANET using adaptive deep neural network","volume":"12","author":"Jia","year":"2024","journal-title":"IEEE Access"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1007\/s40747-021-00593-6","article-title":"Intelligent user identity authentication in vehicle security system based on wireless signals","volume":"8","author":"Zhang","year":"2022","journal-title":"Complex Intell Syst"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"3022","DOI":"10.3390\/smartcities7050118","article-title":"Enhancing smart city connectivity: a multi-metric CNN-LSTM beamforming based approach to optimize dynamic source routing in 6G networks for MANETs and VANETs","volume":"7","author":"Inzillo","year":"2024","journal-title":"Smart Cities"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"14580","DOI":"10.1109\/TVT.2024.3413849","article-title":"HybridSecNet: in-vehicle security on controller area networks through a hybrid two-step LSTM-CNN model","volume":"73","author":"Chougule","year":"2024","journal-title":"IEEE Trans Veh Technol"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"136","DOI":"10.62762\/TSCC.2024.626147","article-title":"Vehicular network security through optimized deep learning model with feature selection techniques","volume":"1","author":"Khan","year":"2024","journal-title":"IECE Trans Sens Commun Control"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"2065","DOI":"10.1007\/s12083-024-01672-4","article-title":"An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques","volume":"17","author":"Minu","year":"2024","journal-title":"Peer-to-Peer Netw Appl"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"6727","DOI":"10.3390\/s23156727","article-title":"Innovative hybrid approach for masked face recognition using pretrained mask detection and segmentation, robust PCA, and KNN classifier","volume":"23","author":"Eman","year":"2023","journal-title":"Sensors"},{"journal-title":"Radio frequency measurements for selected manufacturing and industrial environments [Dataset]","year":"2016","author":"Candell","key":"ref98"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"100723","DOI":"10.1016\/j.iot.2023.100723","article-title":"An authentication approach in SDN-VANET architecture with Rider-Sea Lion optimized neural network for intrusion detection","volume":"22","author":"Pulligilla","year":"2023","journal-title":"Internet Things"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"906","DOI":"10.3103\/S014641161808014X","article-title":"Hierarchical software-defined security management for large-scale dynamic Networks","volume":"52","author":"Kalinin","year":"2018","journal-title":"Autom Control Comput Sci"},{"key":"ref101","series-title":"Proceedings of the 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)","article-title":"Collaborative data anonymization for privacy-preserving vehicular Ad-hoc Network","author":"Nandy","year":"2020 Dec 20\u201321"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"151054","DOI":"10.1109\/ACCESS.2019.2947723","article-title":"Review on security of internet of things authentication mechanism","volume":"7","author":"Nandy","year":"2019","journal-title":"IEEE Access"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"16218","DOI":"10.1109\/ACCESS.2024.3357490","article-title":"Real-time tracking and authentication protocol for anonymous operating vehicles in vehicle-infrastructure collaborative systems","volume":"12","author":"Yuan","year":"2024","journal-title":"IEEE Access"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"5152","DOI":"10.1109\/TVT.2022.3225204","article-title":"DPB-MA: low-latency message authentication scheme based on distributed verification and priority in vehicular Ad Hoc network","volume":"72","author":"Xu","year":"2023","journal-title":"IEEE Trans Veh Technol"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"4974","DOI":"10.3390\/electronics13244974","article-title":"Electrocardiogram-based driver authentication using autocorrelation and convolutional neural network techniques","volume":"13","author":"Ku","year":"2024","journal-title":"Electronics"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3390\/fi17010027","article-title":"Impact of weather factors on unmanned aerial vehicles\u2019 wireless communications","volume":"17","author":"Mishra","year":"2025","journal-title":"Future Internet"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1109\/TIFS.2025.3527814","article-title":"DroneAudioID: a lightweight acoustic fingerprint-based drone authentication system for secure drone delivery","volume":"20","author":"Zhang","year":"2025","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"ref108","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/TDSC.2024.3392470","article-title":"An efficient fuzzy certificateless signature-based authentication scheme using anonymous biometric identities for vanets","volume":"22","author":"Wang","year":"2025","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"7021","DOI":"10.1109\/TITS.2025.3525538","article-title":"Soft actor-critic deep reinforcement learning for train timetable collaborative optimization of large-scale urban rail transit network under dynamic demand","volume":"26","author":"Wen","year":"2025","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"09544070241297552","DOI":"10.1177\/09544070241297552","article-title":"Lightweight real-time vehicle collision warning based on deep learning multi-scale feature fusion","volume":"13","author":"Qiu","year":"2024","journal-title":"J Automob Eng"},{"key":"ref111","doi-asserted-by":"crossref","first-page":"38","DOI":"10.3390\/electronics14010038","article-title":"Optimization of video surveillance system deployment based on space syntax and deep reinforcement learning","volume":"14","author":"Li","year":"2025","journal-title":"Electronics"},{"journal-title":"IEEE 1609.2-2022 IEEE standard for wireless access in vehicular environments\u2014security services for application and management messages","year":"2023","key":"ref112"},{"key":"ref113","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1007\/s10579-024-09773-5","article-title":"From LIMA to DeepLIMA: following a new path of interoperability","volume":"58","author":"Bocharov","year":"2024","journal-title":"Lang Resour Eval"},{"key":"ref114","first-page":"1","article-title":"A rainbow in deep network black boxes","volume":"25","author":"Guth","year":"2024","journal-title":"J Mach Learn Res"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"2321","DOI":"10.18280\/ts.400601","article-title":"Deep learning-driven regulation of vehicle speed limits in response to weather conditions","volume":"40","author":"Efe","year":"2023","journal-title":"Trait Du Signal"},{"key":"ref116","doi-asserted-by":"crossref","first-page":"119829","DOI":"10.1016\/j.engstruct.2025.119829","article-title":"Automatic detection of subsurface defects in concrete structures using state-of-the-art deep learning-based object detectors on the infrared dataset","volume":"329","author":"Ta","year":"2025","journal-title":"Eng Struct"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"e13754","DOI":"10.1111\/exsy.13754","article-title":"BENN: balanced ensemble neural network for handling class imbalance in big data","volume":"42","author":"Ramesh","year":"2025","journal-title":"Expert Syst"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"9497","DOI":"10.1109\/TII.2024.3383521","article-title":"Non-intrusive load monitoring based on an efficient deep learning model with local feature extraction","volume":"20","author":"Zhou","year":"2024","journal-title":"IEEE Trans Ind Inform"},{"key":"ref119","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3703454","article-title":"Open-ethical AI: advancements in open-source human-centric neural language models","volume":"57","author":"Sicari","year":"2025","journal-title":"Acm Comput Surv"},{"key":"ref120","doi-asserted-by":"crossref","first-page":"24561","DOI":"10.1109\/ACCESS.2023.3253484","article-title":"A comprehensive survey of context-aware continuous implicit authentication in online learning environments","volume":"11","author":"Ryu","year":"2023","journal-title":"IEEE Access"},{"key":"ref121","series-title":"Proceedings of the IEEE Vehicle Power and Propulsion Conference (VPPC)","article-title":"Battery diagnosis: a lifelong learning framework for electric vehicles","author":"Zhao","year":"2022 Nov 1\u20134"},{"key":"ref122","first-page":"816","article-title":"Optimizing dynamic keystroke pattern recognition with hybrid deep learning technique and multiple soft biometric factors","volume":"19","author":"Shanmugavalli","year":"2024","journal-title":"Int J Comput Commun Control"},{"key":"ref123","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.iot.2024.101310","article-title":"Enhancing a fog-oriented IoT authentication and encryption platform through deep learning-based attack detection","volume":"27","author":"dos Santos","year":"2024","journal-title":"Internet Things"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/TCE.2023.3320157","article-title":"Blockchain-based authentication and explainable ai for securing consumer IoT applications","volume":"70","author":"Kumar","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"20998","DOI":"10.1109\/JSEN.2021.3097172","article-title":"A secure, privacy-preserving, and lightweight authentication scheme for VANETs","volume":"21","author":"Nandy","year":"2021","journal-title":"IEEE Sens J"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"9433","DOI":"10.1109\/TIFS.2024.3445730","article-title":"On the security of privacy-enhanced authentication protocol for federated learning in VANETs","volume":"19","author":"Zhang","year":"2024","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1109\/TIFS.2023.3324747","article-title":"FedComm: a privacy-enhanced and efficient authentication protocol for federated learning in vehicular Ad-Hoc networks","volume":"19","author":"Yuan","year":"2024","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"ref128","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1109\/TIFS.2022.3160361","article-title":"MMAuth: a continuous authentication framework on smartphones using multiple modalities","volume":"17","author":"Shen","year":"2022","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"11","DOI":"10.3390\/app13074216","article-title":"Personalized context-aware authentication protocols in IoT","volume":"13","author":"Bulat","year":"2023","journal-title":"Appl Sci"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TSC.2023.3348497","article-title":"Privacy enhanced authentication for online learning healthcare systems","volume":"17","author":"Liu","year":"2024","journal-title":"IEEE Trans Serv Comput"},{"key":"ref131","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/OJCS.2024.3513895","article-title":"Revolutionizing user authentication exploiting explainable AI and CTGAN-based keystroke dynamics","volume":"6","author":"Raouf","year":"2025","journal-title":"IEEE Open J Comput Soc"},{"key":"ref132","doi-asserted-by":"crossref","first-page":"14171","DOI":"10.1109\/TMC.2024.3450919","article-title":"SipDeep: swallowing-based transparent authentication via bone-conducted in-ear acoustics","volume":"23","author":"Ahmed","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"4773","DOI":"10.1109\/TITS.2023.3341358","article-title":"Performance analysis of blockchain-enabled security and privacy algorithms in connected and autonomous vehicles: a comprehensive review","volume":"25","author":"Khan","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref134","doi-asserted-by":"crossref","first-page":"15002","DOI":"10.1109\/TITS.2024.3394438","article-title":"Blockchain assisted intra-twin and inter-twin scheme for vehicular digital twin system","volume":"25","author":"Gautam","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"15839","DOI":"10.1109\/JSEN.2020.3022536","article-title":"Ultra-lightweight mutual authentication in the vehicle based on smart contract blockchain: case of MITM attack","volume":"21","author":"Razmjouei","year":"2021","journal-title":"IEEE Sens J"},{"key":"ref136","doi-asserted-by":"crossref","first-page":"107520","DOI":"10.1016\/j.future.2024.107520","article-title":"ZeroVCS: an efficient authentication protocol without trusted authority for zero-trust vehicular communication systems","volume":"163","author":"Roy","year":"2025","journal-title":"Future Gener Comput Syst"},{"key":"ref137","doi-asserted-by":"crossref","first-page":"104018","DOI":"10.1016\/j.cose.2024.104018","article-title":"Towards zero trust security in connected vehicles: a comprehensive survey","volume":"145","author":"Annabi","year":"2024","journal-title":"Comput Secur"},{"key":"ref138","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TIFS.2024.3523198","article-title":"Efficient revocable cross-domain anonymous authentication scheme for IIoT","volume":"20","author":"Zeng","year":"2025","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"ref139","series-title":"Proceedings of the IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS)","article-title":"A low-overhead puf based hardware security technique to prevent scan chain attacks for industry-standard DFT architecture","author":"Chittoriya","year":"2022 Aug 7\u201310"},{"key":"ref140","doi-asserted-by":"crossref","first-page":"121764","DOI":"10.1016\/j.eswa.2023.121764","article-title":"Detect software vulnerabilities with weight biases via graph neural networks","volume":"238","author":"Liu","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"1957","DOI":"10.35833\/MPCE.2023.000850","article-title":"Byzantine-resilient economical operation strategy based on federated deep reinforcement learning for multiple electric vehicle charging stations considering data Privacy","volume":"12","author":"Feng","year":"2024","journal-title":"J Mod Power Syst Clean Energy"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"6810","DOI":"10.1109\/TNSM.2024.3445972","article-title":"QSKA: a quantum secured privacy-preserving mutual authentication scheme for energy internet-based vehicle-to-grid communication","volume":"21","author":"Prateek","year":"2024","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"2665","DOI":"10.1109\/TDSC.2021.3068213","article-title":"Covert channel-based transmitter authentication in controller area networks","volume":"19","author":"Ying","year":"2022","journal-title":"IEEE Trans Dependable Secur Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_66306\/TSP_CMC_66306.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:05:43Z","timestamp":1763345143000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":143,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066306","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-04","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}