{"id":"https://openalex.org/W4411949835","doi":"https://doi.org/10.1109/vnc64509.2025.11054209","title":"Quantification Methods for Trust in Cooperative Driving","display_name":"Quantification Methods for Trust in Cooperative Driving","publication_year":2025,"publication_date":"2025-06-02","ids":{"openalex":"https://openalex.org/W4411949835","doi":"https://doi.org/10.1109/vnc64509.2025.11054209"},"language":"en","primary_location":{"id":"doi:10.1109/vnc64509.2025.11054209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vnc64509.2025.11054209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Vehicular Networking Conference (VNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071810146","display_name":"Artur Hermann","orcid":"https://orcid.org/0009-0004-3406-267X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Artur Hermann","raw_affiliation_strings":["Ulm University, Institute of Distributed Systems"],"affiliations":[{"raw_affiliation_string":"Ulm University, Institute of Distributed Systems","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003589733","display_name":"Nata\u0161a Trkulja","orcid":"https://orcid.org/0000-0003-2945-4869"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nata\u0161a Trkulja","raw_affiliation_strings":["Ulm University, Institute of Distributed Systems"],"affiliations":[{"raw_affiliation_string":"Ulm University, Institute of Distributed Systems","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118792111","display_name":"Patrick Wachter","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Patrick Wachter","raw_affiliation_strings":["Ulm University, Institute of Distributed Systems"],"affiliations":[{"raw_affiliation_string":"Ulm University, Institute of Distributed Systems","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020002735","display_name":"Benjamin Erb","orcid":"https://orcid.org/0000-0002-5432-4989"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Benjamin Erb","raw_affiliation_strings":["Ulm University, Institute of Distributed Systems"],"affiliations":[{"raw_affiliation_string":"Ulm University, Institute of Distributed Systems","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050897976","display_name":"Frank Kargl","orcid":"https://orcid.org/0000-0003-3800-8369"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Frank Kargl","raw_affiliation_strings":["Ulm University, Institute of Distributed Systems"],"affiliations":[{"raw_affiliation_string":"Ulm University, Institute of Distributed Systems","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071810146"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91666481,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8974999785423279,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8974999785423279,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.8896999955177307,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8705999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5753902196884155}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5753902196884155}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vnc64509.2025.11054209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vnc64509.2025.11054209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Vehicular Networking Conference (VNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/2","display_name":"Zero hunger","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1963914923","https://openalex.org/W2545176003","https://openalex.org/W2556903150","https://openalex.org/W2793239297","https://openalex.org/W2808108461","https://openalex.org/W2905610623","https://openalex.org/W2912530467","https://openalex.org/W2945379140","https://openalex.org/W2982574993","https://openalex.org/W2991092324","https://openalex.org/W3040161881","https://openalex.org/W3124176675","https://openalex.org/W4234587807","https://openalex.org/W4379876680","https://openalex.org/W4385801260","https://openalex.org/W4389279173","https://openalex.org/W4407281624","https://openalex.org/W6763844985","https://openalex.org/W6885409898"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Future":[0],"vehicles":[1,14],"and":[2,132,157,166],"infrastructure":[3,44],"will":[4],"rely":[5],"on":[6,72],"data":[7,25,53,70],"from":[8,78],"external":[9],"entities":[10],"such":[11],"as":[12],"other":[13],"via":[15],"V2X":[16],"communication":[17],"for":[18,65,115],"safety-critical":[19],"applications.":[20],"Malicious":[21],"manipulation":[22],"of":[23,68,75,92,118],"this":[24,93,96],"can":[26,50,61],"lead":[27],"to":[28,39,46],"safety":[29,165],"incidents.":[30],"Earlier":[31],"works":[32],"proposed":[33,171],"a":[34,41,59,139],"trust":[35,51,63,80,86],"assessment":[36,87],"framework":[37],"(TAF)":[38],"allow":[40],"vehicle":[42],"or":[43],"node":[45],"assess":[47],"whether":[48],"it":[49,54],"the":[52,66,69,89,147],"received.":[55],"Using":[56],"subjective":[57,108],"logic,":[58],"TAF":[60,148],"calculate":[62],"opinions":[64],"trustworthiness":[67],"based":[71],"different":[73,100,116],"types":[74,117],"evidence":[76,105],"obtained":[77],"diverse":[79],"sources.":[81],"One":[82],"particular":[83],"challenge":[84],"in":[85,138],"is":[88],"appropriate":[90,107],"quantification":[91,101,113,172],"evidence.":[94],"In":[95],"paper,":[97],"we":[98],"introduce":[99],"methods":[102,114],"that":[103,146],"transform":[104],"into":[106],"logic":[109],"opinions.":[110],"We":[111],"suggest":[112],"evidence:":[119],"security":[120],"reports,":[121,124],"misbehavior":[122],"detection":[123,126],"intrusion":[125],"system":[127,133,143],"alerts,":[128],"GNSS":[129],"spoofing":[130],"scores,":[131],"integrity":[134],"reports.":[135],"Our":[136],"evaluations":[137],"smart":[140],"traffic":[141],"light":[142],"scenario":[144],"show":[145],"detects":[149],"attacks":[150],"with":[151],"an":[152],"accuracy":[153],"greater":[154],"than":[155],"96%":[156],"intersection":[158],"throughput":[159],"increased":[160],"by":[161],"42%":[162],"while":[163],"maintaining":[164],"security,":[167],"when":[168],"using":[169],"our":[170],"methods.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
