{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:37:10Z","timestamp":1725763030984},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/trustcom56396.2022.00188","type":"proceedings-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T17:38:24Z","timestamp":1679333904000},"page":"1333-1339","source":"Crossref","is-referenced-by-count":1,"title":["Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment"],"prefix":"10.1109","author":[{"given":"Yanghui","family":"Zhang","sequence":"first","affiliation":[{"name":"Changsha University of Science & Technology,College of Automotive and Mechanical Engineering,Changsha,China,410114"}]},{"given":"Kai","family":"Gao","sequence":"additional","affiliation":[{"name":"Changsha University of Science & Technology,College of Automotive and Mechanical Engineering,Changsha,China,410114"}]},{"given":"Shuo","family":"Huang","sequence":"additional","affiliation":[{"name":"Changsha University of Science & Technology,College of Automotive and Mechanical Engineering,Changsha,China,410114"}]},{"given":"Xunhao","family":"Li","sequence":"additional","affiliation":[{"name":"Changsha University of Science & Technology,College of Automotive and Mechanical Engineering,Changsha,China,410114"}]},{"given":"Ronghua","family":"Du","sequence":"additional","affiliation":[{"name":"Changsha University of Science & Technology,College of Automotive and Mechanical Engineering,Changsha,China,410114"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810891"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2903299"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2015.03.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2749459"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s19092059"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2018.5170"},{"article-title":"A minimax game for resilient-by-design adaptive traffic control systems","year":"2020","author":"Al Mallah","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900214"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23222"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103196"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2743025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55753-3_15"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26190-4_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3385809"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2591558"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8823300"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2568759"}],"event":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2022,12,9]]},"location":"Wuhan, China","end":{"date-parts":[[2022,12,11]]}},"container-title":["2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10063338\/10063342\/10063728.pdf?arnumber=10063728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T12:36:48Z","timestamp":1707827808000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10063728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/trustcom56396.2022.00188","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]}}}