A secure flexible and tampering-resistant data sharing system for vehicular social networks

J Sun, H Xiong, S Zhang, X Liu, J Yuan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Vehicular social networks (VSNs) have emerged as the promising paradigm of vehicular
networks that can improve traffic safety, relieve traffic congestion and even provide …

Leveraging dynamic stackelberg pricing game for multi-mode spectrum sharing in 5G-VANET

B Qian, H Zhou, T Ma, Y Xu, K Yu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
5G enabled Vehicular ad hoc network (5G-VANET) plays a promising role to support diverse
intelligent transportation system (ITS) applications. There are three types of communication …

Cooperative collision avoidance for overtaking maneuvers in cellular V2X-based autonomous driving

R Deng, B Di, L Song - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
In this paper, we consider a cooperative autonomous driving system where a vehicle
overtakes the one in front based on collective perception. To avoid collisions with vehicles …

Internet of Vehicles (IoV): A survey of challenges and solutions

JA Fadhil, QI Sarhan - 2020 21st International Arab …, 2020 - ieeexplore.ieee.org
The technological revolution of the Internet of Things (IoT) increased the number of objects
(eg, vehicles) connected to the Internet, making our lives easier, safer, and smarter. Putting …

Data poisoning attacks in internet-of-vehicle networks: Taxonomy, state-of-the-art, and future directions

Y Chen, X Zhu, X Gong, X Yi, S Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the unprecedented development of deep learning, autonomous vehicles (AVs) have
achieved tremendous progress nowadays. However, AV supported by DNN models is …

Secrecy rate maximization via radio resource allocation in cellular underlaying V2V communications

Y Liu, W Wang, HH Chen, L Wang… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In device-to-device (D2D) underlaying vehicle-to-vehicle (V2V) communications, radio
resource blocks (RBs) are allocated to primary cellular users, which yields sub-optimal rates …

An energy-balanced trust cloud migration scheme for underwater acoustic sensor networks

G Han, J Du, C Lin, H Wu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As a candidate trust management scheme, trust models based on the cloud theory are
always taken into account when detecting malicious attacks in Underwater Acoustic Sensor …

Communication security analysis of intelligent transportation system using 5G Internet of Things from the perspective of big data

Y He, M Kong, C Du, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The transportation system has entered the era of 5G intelligent Internet of things (IoT), which
can realize the comprehensive monitoring, perception, and intelligent decision-making of …

Zero-to-stable driver identification: A non-intrusive and scalable driver identification scheme

MA Rahim, L Zhu, X Li, J Liu, Z Zhang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Driver identification faces various challenges in real-time applications. These challenges
include high dimensional input data, moderate accuracy, scalability issues and need for …

Successive point-of-interest recommendation with personalized local differential privacy

T Bao, L Xu, L Zhu, L Wang, T Li - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The fast development of vehicle positioning technologies has paved the way for in-vehicle
recommendation systems. Successive Point-of-Interest (POI) recommendation, one of the …