{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T04:12:02Z","timestamp":1740111122870,"version":"3.37.3"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1016\/j.comnet.2024.110677","type":"journal-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T18:04:56Z","timestamp":1722449096000},"page":"110677","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles"],"prefix":"10.1016","volume":"252","author":[{"given":"Mianjie","family":"Li","sequence":"first","affiliation":[]},{"given":"Qihan","family":"Pei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4925-6085","authenticated-orcid":false,"given":"Chun","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Shen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"7","key":"10.1016\/j.comnet.2024.110677_bib0001","doi-asserted-by":"crossref","first-page":"6266","DOI":"10.1109\/JIOT.2019.2962914","article-title":"Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems","volume":"7","author":"Li","year":"2020","journal-title":"IEEe Internet. Things. J."},{"issue":"8","key":"10.1016\/j.comnet.2024.110677_bib0002","doi-asserted-by":"crossref","first-page":"5810","DOI":"10.1109\/TII.2020.3038761","article-title":"A novel web attack detection system for internet of things via ensemble classification","volume":"17","author":"Luo","year":"2021","journal-title":"IEEe Trans. Industr. Inform."},{"issue":"8","key":"10.1016\/j.comnet.2024.110677_bib0003","doi-asserted-by":"crossref","first-page":"5028","DOI":"10.1109\/TITS.2020.2970610","article-title":"LocJury: an IBN-based location privacy preserving scheme for IoCV","volume":"22","author":"Wang","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"10.1016\/j.comnet.2024.110677_bib0004","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s11263-013-0620-5","article-title":"Selective search for object recognition","volume":"104","author":"Uijlings","year":"2013","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.comnet.2024.110677_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIM.2021.3078538","article-title":"Drone-based ceramic insulators condition monitoring","volume":"70","author":"Waleed","year":"2021","journal-title":"IEEe Trans. Instrum. Meas."},{"issue":"9","key":"10.1016\/j.comnet.2024.110677_bib0006","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","article-title":"Spatial pyramid pooling in deep convolutional networks for visual recognition","volume":"37","author":"He","year":"2015","journal-title":"IEEe Trans. Pattern. Anal. Mach. Intell."},{"key":"10.1016\/j.comnet.2024.110677_bib0007","doi-asserted-by":"crossref","unstructured":"J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, \"You only look once: unified, real-time object detection,\" in Computer Vision & Pattern Recognition, 2016.","DOI":"10.1109\/CVPR.2016.91"},{"key":"10.1016\/j.comnet.2024.110677_bib0008","series-title":"Proceedings of the European Conference on Computer Vision","first-page":"21","article-title":"Ssd: single shot multibox detector","author":"Liu","year":"2016"},{"key":"10.1016\/j.comnet.2024.110677_bib0009","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision And Pattern Recognition","first-page":"10781","article-title":"Efficientdet: scalable and efficient object detection","author":"Tan","year":"2020"},{"issue":"14","key":"10.1016\/j.comnet.2024.110677_bib0010","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.1111\/mice.12881","article-title":"Tiny-Crack-Net: a multiscale feature fusion network with attention mechanisms for segmentation of tiny cracks","volume":"37","author":"Chu","year":"2022","journal-title":"Computer-Aided Civil Infrastruct. Eng."},{"issue":"1","key":"10.1016\/j.comnet.2024.110677_bib0011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0212-5","article-title":"Intelligent video surveillance: a review through deep learning techniques for crowd analysis","volume":"6","author":"Sreenu","year":"2019","journal-title":"J. Big. Data"},{"issue":"2","key":"10.1016\/j.comnet.2024.110677_bib0012","first-page":"1104","article-title":"Detection of information hiding at physical layer in wireless communications","volume":"19","author":"Xie","year":"2022","journal-title":"IEEe Trans. Dependable Secure Comput."},{"issue":"5","key":"10.1016\/j.comnet.2024.110677_bib0013","doi-asserted-by":"crossref","first-page":"3042","DOI":"10.1109\/TCOMM.2020.2969867","article-title":"Physical-layer security with optical generalized space shift keying","volume":"68","author":"Panayirci","year":"2020","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"10.1016\/j.comnet.2024.110677_bib0014","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/JSAC.2017.2774429","article-title":"Physical-layer security in multiuser visible light communication networks","volume":"36","author":"Yin","year":"2018","journal-title":"IEEE J. Sel. Commun."},{"key":"10.1016\/j.comnet.2024.110677_bib0015","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.sigpro.2019.04.017","article-title":"Audio watermarking algorithm against synchronization attacks using global characteristics and adaptive frame division","volume":"162","author":"Jiang","year":"2019","journal-title":"Signal. Processing."},{"issue":"5","key":"10.1016\/j.comnet.2024.110677_bib0016","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1109\/TIFS.2018.2871748","article-title":"Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks","volume":"14","author":"Liu","year":"2019","journal-title":"IEEE Trans. Inf. For. Secur."},{"issue":"8","key":"10.1016\/j.comnet.2024.110677_bib0017","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/TASLP.2015.2430818","article-title":"Audio watermarking based on Fibonacci numbers","volume":"23","author":"Fallahpour","year":"2015","journal-title":"IEEE Trans. Audio Speech. Lang. Process."},{"issue":"10","key":"10.1016\/j.comnet.2024.110677_bib0018","doi-asserted-by":"crossref","first-page":"2631","DOI":"10.1109\/TMM.2018.2812599","article-title":"SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking","volume":"20","author":"Su","year":"2018","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"10.1016\/j.comnet.2024.110677_bib0019","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","article-title":"A distributed deep learning system for web attack detection on edge devices","volume":"16","author":"Tian","year":"2020","journal-title":"IEEe Trans. Industr. Inform."},{"issue":"5","key":"10.1016\/j.comnet.2024.110677_bib0020","doi-asserted-by":"crossref","first-page":"1985","DOI":"10.1007\/s12652-018-0800-9","article-title":"Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment","volume":"10","author":"Bhushan","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"3","key":"10.1016\/j.comnet.2024.110677_bib0021","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","article-title":"Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags","volume":"73","author":"Tewari","year":"2017","journal-title":"J. Supercomput."},{"key":"10.1016\/j.comnet.2024.110677_bib0022","first-page":"174","article-title":"Security, privacy & efficiency of sustainable cloud computing for big data & IoT","volume":"19","author":"Stergiou","year":"2018","journal-title":"Sustain. Comput. Inform. Syst."},{"issue":"2","key":"10.1016\/j.comnet.2024.110677_bib0023","doi-asserted-by":"crossref","first-page":"1987","DOI":"10.1109\/JIOT.2018.2872013","article-title":"Artificial intelligence inspired transmission scheduling in cognitive vehicular communications and networks","volume":"6","author":"Zhang","year":"2019","journal-title":"IEEe Internet. Things. J."},{"key":"10.1016\/j.comnet.2024.110677_bib0024","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.ins.2016.01.061","article-title":"Multi-level dense descriptor and hierarchical feature matching for copy\u2013move forgery detection","volume":"345","author":"Bi","year":"2016","journal-title":"Inf. Sci. (Ny)"},{"issue":"3","key":"10.1016\/j.comnet.2024.110677_bib0025","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","article-title":"Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery","volume":"25","author":"Qin","year":"2018","journal-title":"IEEE MultiMed."},{"key":"10.1016\/j.comnet.2024.110677_bib0026","doi-asserted-by":"crossref","first-page":"12881","DOI":"10.1007\/s11042-020-10451-1","article-title":"A hybrid-Sudoku based fragile watermarking scheme for image tampering detection","volume":"80","author":"Su","year":"2021","journal-title":"Multimed. Tools. Appl."},{"issue":"4","key":"10.1016\/j.comnet.2024.110677_bib0027","first-page":"211","article-title":"Three layer authentications with a spiral block mapping to prove authenticity in medical images","volume":"13","author":"Ernawan","year":"2022","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"10.1016\/j.comnet.2024.110677_bib0028","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"11963","article-title":"Scaling up your kernels to 31\u00d731: revisiting large kernel design in cnns","author":"Ding","year":"2022"},{"key":"10.1016\/j.comnet.2024.110677_bib0029","first-page":"91","article-title":"Faster r-cnn: towards real-time object detection with region proposal networks","volume":"28","author":"Ren","year":"2015","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.comnet.2024.110677_bib0030","unstructured":"J. Redmon and A. Farhadi, \"Yolov3: an incremental improvement,\" arXiv preprint arXiv:1804.02767, 2018."},{"key":"10.1016\/j.comnet.2024.110677_bib0031","unstructured":"X. Long et al., \"PP-YOLO: an effective and efficient implementation of object detector,\" arXiv preprint arXiv:2007.12099, 2020."},{"key":"10.1016\/j.comnet.2024.110677_bib0032","unstructured":"A. Bochkovskiy, C.Y. Wang, and H. Liao, \"YOLOv4: optimal speed and accuracy of object detection,\" 2020."},{"key":"10.1016\/j.comnet.2024.110677_bib0033","unstructured":"Z. Ge, S. Liu, F. Wang, Z. Li, and J. Sun, \"Yolox: exceeding yolo series in 2021,\" arXiv preprint arXiv:2107.08430, 2021."},{"key":"10.1016\/j.comnet.2024.110677_bib0034","unstructured":"S. Xu et al., \"PP-YOLOE: an evolved version of YOLO,\" arXiv preprint arXiv:2203.16250, 2022."},{"key":"10.1016\/j.comnet.2024.110677_bib0035","doi-asserted-by":"crossref","unstructured":"C.-Y. Wang, A. Bochkovskiy, and H.-Y.M. Liao, \"YOLOv7: trainable bag-of-freebies sets new state-of-the-art for real-time object detectors,\" arXiv preprint arXiv:2207.02696, 2022.","DOI":"10.1109\/CVPR52729.2023.00721"},{"issue":"11","key":"10.1016\/j.comnet.2024.110677_bib0036","doi-asserted-by":"crossref","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","article-title":"Dual watermark for image tamper detection and recovery","volume":"41","author":"Lee","year":"2008","journal-title":"Pattern Recogn."},{"issue":"3","key":"10.1016\/j.comnet.2024.110677_bib0037","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","article-title":"A novel chaos-based fragile watermarking for image tampering detection and self-recovery","volume":"28","author":"Tong","year":"2013","journal-title":"Signal Process. Image Commun."},{"issue":"11","key":"10.1016\/j.comnet.2024.110677_bib0038","doi-asserted-by":"crossref","first-page":"16549","DOI":"10.1007\/s11042-020-08814-9","article-title":"Medical image watermarking for ownership & tamper detection","volume":"80","author":"Alshanbari","year":"2021","journal-title":"Multimed. Tools. Appl."},{"issue":"6","key":"10.1016\/j.comnet.2024.110677_bib0039","doi-asserted-by":"crossref","first-page":"3199","DOI":"10.1007\/s00034-021-01926-z","article-title":"Multipurpose image watermarking: ownership check, tamper detection and self-recovery","volume":"41","author":"Sinhal","year":"2022","journal-title":"Circuits. Syst. Signal. Process."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128624005097?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128624005097?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:09:44Z","timestamp":1725336584000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128624005097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":39,"alternative-id":["S1389128624005097"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110677","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2024,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110677","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"110677"}}