{"id":"https://openalex.org/W4404317639","doi":"https://doi.org/10.1109/aiotc63215.2024.10748330","title":"Hardware Security Vulnerability Mining Techniques for Intelligent Connected Vehicles","display_name":"Hardware Security Vulnerability Mining Techniques for Intelligent Connected Vehicles","publication_year":2024,"publication_date":"2024-09-13","ids":{"openalex":"https://openalex.org/W4404317639","doi":"https://doi.org/10.1109/aiotc63215.2024.10748330"},"language":"en","primary_location":{"id":"doi:10.1109/aiotc63215.2024.10748330","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiotc63215.2024.10748330","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 3rd International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology (AIoTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089037972","display_name":"Dongqing Sun","orcid":"https://orcid.org/0009-0007-7302-1880"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongqing Sun","raw_affiliation_strings":["CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China","institution_ids":["https://openalex.org/I4210094894"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100873082","display_name":"Mingming Yu","orcid":"https://orcid.org/0009-0001-3665-4925"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingming Yu","raw_affiliation_strings":["CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China","institution_ids":["https://openalex.org/I4210094894"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100329580","display_name":"Zhen Guo","orcid":"https://orcid.org/0000-0002-6563-5934"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Guo","raw_affiliation_strings":["CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China","institution_ids":["https://openalex.org/I4210094894"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113413933","display_name":"Tianling Liu","orcid":"https://orcid.org/0009-0009-5789-7916"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianling Liu","raw_affiliation_strings":["CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"CATARC Intelligent and connected technology Co., LTd., China Automotive Technology &#x0026; Research Center Co., Ltd.,Tianjin,China","institution_ids":["https://openalex.org/I4210094894"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089037972"],"corresponding_institution_ids":["https://openalex.org/I4210094894"],"apc_list":null,"apc_paid":null,"fwci":0.386,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62755329,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"138","last_page":"143"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.8213000297546387,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.8213000297546387,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.7562000155448914,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.7516999840736389,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6580746173858643},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6279922127723694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5961130857467651},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5297366380691528}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6580746173858643},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6279922127723694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5961130857467651},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5297366380691528},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiotc63215.2024.10748330","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiotc63215.2024.10748330","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 3rd International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology (AIoTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1968022045","https://openalex.org/W2008105825","https://openalex.org/W2520210241","https://openalex.org/W4206307994","https://openalex.org/W4388723347"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2062873522","https://openalex.org/W2947584067","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2789975780"],"abstract_inverted_index":{"This":[0,75],"paper":[1,76],"introduces":[2],"a":[3,15],"method":[4,102],"of":[5,41,48,81,103,153],"hardware":[6,79,86,115,131,151],"security":[7,50,53,80,87,99,116,132,152],"vulnerability":[8,104],"mining":[9],"for":[10,18,67],"intelligent":[11,24,42,59,91],"connected":[12],"vehicles.":[13],"As":[14],"key":[16],"technology":[17],"realizing":[19],"vehicle":[20,35],"intelligence":[21],"and":[22,34,51,70,106,127,137,148,164,167],"connectivity,":[23],"in-vehicle":[25,60,82,92,154],"terminals":[26,43,61,93],"have":[27,54,62],"brought":[28],"significant":[29],"progress":[30],"to":[31,113,124],"driving":[32],"experience":[33],"functions.":[36],"However,":[37],"with":[38,126],"the":[39,46,78,85,98,101,129,144,150],"increase":[40],"in":[44,90,141,143],"vehicles,":[45],"problems":[47,133],"information":[49],"functional":[52],"become":[55],"increasingly":[56],"prominent.":[57],"These":[58],"always":[63],"been":[64],"important":[65],"targets":[66],"malicious":[68],"attacks":[69],"reverse":[71],"engineering":[72],"by":[73],"hackers.":[74],"analyzes":[77],"terminals,":[83,155],"summarizes":[84],"risks":[88,140],"existing":[89,130],"at":[94,119,134],"this":[95,135],"stage,":[96,136],"verifies":[97],"through":[100],"mining,":[105],"puts":[107],"forward":[108],"reasonable":[109],"suggestions":[110],"on":[111],"how":[112,123],"avoid":[114],"problems,":[117],"aiming":[118],"guiding":[120],"automobile":[121,157],"enterprises":[122,158],"deal":[125],"improve":[128],"avoiding":[138],"known":[139],"advance":[142],"design":[145],"stage.":[146],"Improve":[147],"strengthen":[149],"help":[156],"master":[159],"basic":[160],"safety":[161],"verification":[162],"methods,":[163],"effectively":[165],"manage":[166],"repair":[168],"vulnerabilities.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
