Recoverable Identifier
advisory
doi_compliance
recoverable_identifier
DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TVT.2024.3402366.Gordon-Rodriguez) was visible in the surrounding text but could not be confirmed against doi.org as printed.
Paper page Integrity report arXiv Try DOI
Evidence text
Brown, C. E. (1998). Coefficient of variation. In Applied multivariate statistics in geohydrology and related sciences (pp. 155–157). Springer. Chen, R., Chen, X., & Zhao, J. (2024). Private and utility enhanced intrusion detection based on attack behavior analysis with local differential privacy on IoV. Computer Networks, 250, Article 110560. Cheng, P., Hua, L., Jiang, H., & Liu, G. (2023). LSF-idm: Automotive intrusion detection model with lightweight attribution and semantic fusion. arXiv preprint arXiv:2308.01237. Derhab, A., Belaoued, M., Mohiuddin, I., Kurniawan, F., & Khan, M. K. (2021). Histogram-based intrusion detection and filtering framework for secure and safe in-vehicle networks. IEEE Transactions on Intelligent Transportation Systems, 23(3), 2366–2379. Devnath, M. K. H. (2023). GCNIDS: A graph convolutional network-based intrusion detection system for CAN bus. arXiv preprint arXiv:2309.10173. Fawcett, T. (2006). An Introduction to ROC Analysis. Pattern Recogn. Lett., 27(8), 861–874. Fu, M., Wang, P., Liu, M., Zhang, Z., & Zhou, X. (2025). IoV-BERT-IDS: Hybrid network intrusion detection system in IoV using large language models. IEEE Transactions on Vehicular Technology, 74(2), 1909–1921. http://dx.doi.org/10.1109/TVT.2024. 3402366. Gordon-Rodriguez, E., Loaiza-Ganem, G., Pleiss, G., & Cunningham, J. P. (2020). Uses and abuses of the cross-entropy loss: Case studies in modern deep learning. In J. Zosa Forde, F. Ruiz, M. F. Pradier, & A. Schein (Eds.), Proceedin
Evidence payload
{
"printed_excerpt": "Brown, C. E. (1998). Coefficient of variation. In Applied multivariate statistics in geohydrology and related sciences (pp. 155\u2013157). Springer. Chen, R., Chen, X., & Zhao, J. (2024). Private and utility enhanced intrusion detection based on",
"reconstructed_doi": "10.1109/TVT.2024.3402366.Gordon-Rodriguez",
"ref_index": 3,
"resolved_title": null,
"verdict_class": "incontrovertible"
}