{"id":"https://openalex.org/W4409291225","doi":"https://doi.org/10.1016/j.adhoc.2025.103865","title":"An adaptive trust threshold based on Q-Learning for detecting intelligent attacks in vehicular Ad-Hoc Networks","display_name":"An adaptive trust threshold based on Q-Learning for detecting intelligent attacks in vehicular Ad-Hoc Networks","publication_year":2025,"publication_date":"2025-04-09","ids":{"openalex":"https://openalex.org/W4409291225","doi":"https://doi.org/10.1016/j.adhoc.2025.103865"},"language":"en","primary_location":{"id":"doi:10.1016/j.adhoc.2025.103865","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.adhoc.2025.103865","pdf_url":null,"source":{"id":"https://openalex.org/S4210177528","display_name":"Ad Hoc Networks","issn_l":"1570-8705","issn":["1570-8705","1570-8713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ad Hoc Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.adhoc.2025.103865","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022847217","display_name":"Xiao Liu","orcid":"https://orcid.org/0000-0003-1933-7669"},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Liu","raw_affiliation_strings":["School of Computer, Electronics and Information, Guangxi University, Nanning, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, Electronics and Information, Guangxi University, Nanning, PR China","institution_ids":["https://openalex.org/I150807315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100420696","display_name":"Liang Li","orcid":"https://orcid.org/0000-0002-8528-3171"},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Liang","raw_affiliation_strings":["School of Computer, Electronics and Information, Guangxi University, Nanning, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, Electronics and Information, Guangxi University, Nanning, PR China","institution_ids":["https://openalex.org/I150807315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108980621","display_name":"Zhencai Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhencai Tan","raw_affiliation_strings":["School of Computer, Electronics and Information, Guangxi University, Nanning, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, Electronics and Information, Guangxi University, Nanning, PR China","institution_ids":["https://openalex.org/I150807315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005373524","display_name":"Jining Chen","orcid":"https://orcid.org/0009-0008-0357-6802"},"institutions":[{"id":"https://openalex.org/I4210112430","display_name":"Guangxi Zhuang Autonomous Region Health and Family Planning","ror":"https://ror.org/022z3g211","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210112430"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jining Chen","raw_affiliation_strings":["Guangxi Key Laboratory of Digital Infrastructure, Guangxi Zhuang Autonomous Region Information Center, Nanning, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Digital Infrastructure, Guangxi Zhuang Autonomous Region Information Center, Nanning, PR China","institution_ids":["https://openalex.org/I4210112430"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003751701","display_name":"Gaoxiang Li","orcid":"https://orcid.org/0000-0001-9000-6630"},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gaoxiang Li","raw_affiliation_strings":["School of Electrical Engineering, Guangxi University, Nanning, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Guangxi University, Nanning, PR China","institution_ids":["https://openalex.org/I150807315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003751701"],"corresponding_institution_ids":["https://openalex.org/I150807315"],"apc_list":{"value":2610,"currency":"USD","value_usd":2610},"apc_paid":{"value":2610,"currency":"USD","value_usd":2610},"fwci":1.8757,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.85240063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"175","issue":null,"first_page":"103865","last_page":"103865"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6371203064918518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6153957843780518},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5972881317138672},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4147516191005707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4131982624530792},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15887439250946045},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08777463436126709}],"concepts":[{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6371203064918518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6153957843780518},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5972881317138672},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4147516191005707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4131982624530792},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15887439250946045},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08777463436126709}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.adhoc.2025.103865","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.adhoc.2025.103865","pdf_url":null,"source":{"id":"https://openalex.org/S4210177528","display_name":"Ad Hoc Networks","issn_l":"1570-8705","issn":["1570-8705","1570-8713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ad Hoc Networks","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.adhoc.2025.103865","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.adhoc.2025.103865","pdf_url":null,"source":{"id":"https://openalex.org/S4210177528","display_name":"Ad Hoc Networks","issn_l":"1570-8705","issn":["1570-8705","1570-8713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ad Hoc Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7472150210","display_name":null,"funder_award_id":"62402124","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2039842676","https://openalex.org/W2104846640","https://openalex.org/W2305409997","https://openalex.org/W2320115123","https://openalex.org/W2530635014","https://openalex.org/W2595545394","https://openalex.org/W2773244559","https://openalex.org/W2876445337","https://openalex.org/W2992860123","https://openalex.org/W3000687211","https://openalex.org/W3005834336","https://openalex.org/W3009904945","https://openalex.org/W3012066402","https://openalex.org/W3040906473","https://openalex.org/W3111603885","https://openalex.org/W3161863195","https://openalex.org/W3195437048","https://openalex.org/W3207839577","https://openalex.org/W3215217041","https://openalex.org/W3217000788","https://openalex.org/W3217539601","https://openalex.org/W4254527311","https://openalex.org/W4285411754","https://openalex.org/W4312921393","https://openalex.org/W4313892679","https://openalex.org/W4393435486","https://openalex.org/W4394807962","https://openalex.org/W4396216055","https://openalex.org/W4400689177","https://openalex.org/W4401608773","https://openalex.org/W6730950566","https://openalex.org/W6746243922","https://openalex.org/W6771182953","https://openalex.org/W6862835602","https://openalex.org/W6871513549"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W2163664197","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W2771454953","https://openalex.org/W3046762796","https://openalex.org/W3202102306","https://openalex.org/W3046260513","https://openalex.org/W2998294818","https://openalex.org/W45347327"],"abstract_inverted_index":{"Due":[0],"to":[1,27,57],"the":[2,10,28,34,59,63,67,71,76,82,86,92,96,102,106,111],"intelligence":[3],"of":[4,9,62,70,85,95],"attack,":[5],"some":[6],"malicious":[7,64,87,116],"nodes":[8],"Vehicular":[11],"Ad-Hoc":[12],"Networks":[13],"(VANETs)":[14],"can":[15,114],"evade":[16],"detection":[17,60,80,83],"and":[18,37,66,91,120],"reconnaissance":[19],",":[20],"which":[21],"poses":[22],"a":[23,42,46],"huge":[24],"security":[25,30],"threat":[26],"network":[29],".":[31],"With":[32],"considering":[33],"sufficient":[35],"adaptability":[36],"limited":[38],"resources":[39],"consumption":[40],"in":[41,118],"small":[43],"state":[44],"space,":[45],"Q-Learning":[47],"based":[48],"adaptive":[49],"trust":[50],"threshold":[51],"control":[52],"strategy":[53,113],"(QART)":[54],"is":[55,89,99],"proposed":[56,103,112],"balance":[58],"efficiency":[61,84],"vehicle":[65,88,98],"false":[68,93,123],"alarm":[69,94],"normal":[72,97],"vehicle.":[73],"Compared":[74],"with":[75],"existing":[77],"intelligent":[78],"attack":[79],"schemes,":[81],"higher":[90],"lower":[100],"under":[101],"strategy.":[104],"Finally,":[105],"experimental":[107],"results":[108],"verify":[109],"that":[110],"identify":[115],"vehicles":[117],"time":[119],"effectively":[121],"reduces":[122],"alarms.":[124]},"counts_by_year":[{"year":2026,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
