4.5 Article

TCAN-IDS: Intrusion Detection System for Internet of Vehicle Using Temporal Convolutional Attention Network

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks

Neelakandan Subramani et al.

Summary: In recent years, the underwater wireless sensor network (UWSN) has gained significant attention for various applications. Energy efficiency is a major challenge for UWSN due to restricted sensor energy and the difficulty of recharging or replacing batteries. This study focuses on designing a metaheuristics-based clustering and routing protocol called MCR-UWSN, which addresses the issues of underwater current, low bandwidth, high water pressure, propagation delay, and error probability. By utilizing cultural emperor penguin optimizer-based clustering (CEPOC) and grasshopper optimization (MHR-GOA) for routing, the MCR-UWSN technique demonstrates improved performance compared to existing techniques.

SENSORS (2022)

Article Computer Science, Information Systems

MTH-IDS: A Multitiered Hybrid Intrusion Detection System for Internet of Vehicles

Li Yang et al.

Summary: Modern vehicles, including connected vehicles and autonomous vehicles, are vulnerable to cyber-attacks due to their increasing functionality and connectivity. To secure vehicular networks, researchers propose a hybrid intrusion detection system that can detect both known and unknown attacks.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Telecommunications

Application of Controller Area Network (CAN) bus anomaly detection based on time series prediction

Hongmao Qin et al.

Summary: Electronization and intelligentization are becoming the fundamental characteristics of modern automobiles. Automotive information security is increasingly highlighted with the deepening of intelligent network integration. An anomaly detection algorithm based on long short-term memory (LSTM) is proposed to detect abnormal behavior of the controller area network (CAN) bus, showing lower false positive rate and higher detection rate.

VEHICULAR COMMUNICATIONS (2021)

Article Engineering, Multidisciplinary

Applicability of time-domain feature extraction methods and artificial intelligence in two-phase flow meters based on gamma-ray absorption technique

Mohammad Amir Sattari et al.

Summary: The study successfully utilized simulation and signal processing techniques to extract features from a two-phase flow meter and identify flow regime types with high precision, leading to accurate gas volumetric percentage measurements.

MEASUREMENT (2021)

Article Engineering, Electrical & Electronic

Anomaly Detection for In-Vehicle Network Using CNN-LSTM With Attention Mechanism

Heng Sun et al.

Summary: A novel intrusion detection model called CLAM is proposed for in-vehicle network, especially CAN, which utilizes one-dimensional convolution, Bidirectional LSTM, and attention mechanisms to effectively detect CAN attacks. The proposed CLAM model achieves an average F1-score of 0.951 and improves the accuracy of attack detection by 2.5% compared to related research.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Theory & Methods

Cyberattacks and Countermeasures for In-Vehicle Networks

Emad Aliwa et al.

Summary: The increasing connectivity within vehicles has raised concerns about safety and security, especially regarding automotive serial protocols like CAN Bus. Current security mechanisms focus on encryption, authentication, and IDS, but face limitations due to constraints like low bandwidth and real-time sensitivity. Future research needs to address these limitations and challenges in order to improve the security of connected vehicles.

ACM COMPUTING SURVEYS (2021)

Article Chemistry, Analytical

Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods

Ming Zhong et al.

Summary: IoT plays a crucial role in daily life, but cyber threats have become a critical factor. This paper proposes a sequential model-based intrusion detection system using deep learning methods, which can improve accuracy and performance.

SENSORS (2021)

Article Multidisciplinary Sciences

A cautionary tale for machine learning generated configurations in presence of a conserved quantity

Ahmadreza Azizi et al.

Summary: The study investigates the performance of machine learning algorithms trained with configurations from Monte Carlo simulations of the two-dimensional Ising model. Convolutional neural networks are effective in locating the phase transition point accurately and displaying finite-size scaling with Ising critical exponent. However, restricted Boltzmann machines generate configurations with magnetizations and energies not allowed in the original system, leading to incorrect weight distributions and spatial correlations. Shortcomings are also observed when training RBM with configurations from the non-conserved Ising model.

SCIENTIFIC REPORTS (2021)

Article Telecommunications

PPM-InVIDS: Privacy protection model for in-vehicle intrusion detection system based complex-valued neural network

Mu Han et al.

Summary: This paper focuses on studying the complex value neural network (CVNN) to detect arbitration field (CAN ID) for protecting CAN network. The constructed IDS in real-time detection shows high accuracy, reaching 98%. The attack experiment indicates that the model makes it difficult for adversaries to infer valuable information.

VEHICULAR COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network

Chuan Yue et al.

Summary: A novel dynamic temporal convolutional network-based intrusion detection system (DyTCN-IDS) is proposed to detect serious network attacks on modern intelligent trains. The system achieved satisfying detection performance with optimized dataset and computational efficiency.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Nighttime object detection system with lightweight deep network for internet of vehicles

Sin-Ye Jhong et al.

Summary: Autonomous driving systems in internet of vehicles (IoV) applications often use cloud computing with challenges in storage, communication, and computing due to the large amount of traffic information. The proposed nighttime object detection scheme utilizes a lightweight deep learning model for real-time detection on edge devices, demonstrating high accuracy and efficiency.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2021)

Article Multidisciplinary Sciences

Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach

Ebrima Jaw et al.

Summary: Researchers have proposed a promising hybrid feature selection (HFS) with an ensemble classifier to design and implement IDS systems to mitigate cyber threats. Achieving remarkable results on multiple datasets with high accuracy of 99.99% and consistent attack classification.

SYMMETRY-BASEL (2021)

Article Computer Science, Information Systems

Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks

Rakesh Shrestha et al.

Summary: The study introduces a UAV- and satellite-based 5G-network security model leveraging machine learning to effectively detect vulnerabilities and cyberattacks. Testing shows that the decision tree algorithm performs exceptionally well in detecting various attacks, achieving a high accuracy rate of 99.99% and a low false negative rate of 0%.

ELECTRONICS (2021)

Proceedings Paper Computer Science, Theory & Methods

Recent Advances in Machine-Learning Driven Intrusion Detection in Transportation: Survey

Hind Bangui et al.

Summary: The rapid development of Intelligent Transportation Systems (ITSs) has led to the emergence of new research areas, with technologies like VANET and UAV being integrated to enhance urban traffic management and safety. Advanced machine learning techniques are being used to protect vehicular data from cyber attacks, but security challenges still remain for VANET and UAV technologies.

12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS (2021)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on CNN and RNN

Chuan Yue et al.

Summary: A novel ensemble intrusion detection method is proposed to defense network attacks against the train Ethernet Consist Network (ECN), achieving a superior detection performance with an accuracy of 0.975 based on experimental results.

IEEE ACCESS (2021)

Article Telecommunications

In-vehicle network intrusion detection using deep convolutional neural network

Hyun Min Song et al.

VEHICULAR COMMUNICATIONS (2020)

Article Computer Science, Information Systems

CAN-ADF: The controller area network attack detection framework

Shahroz Tariq et al.

COMPUTERS & SECURITY (2020)

Article Engineering, Mechanical

Application of GMDH neural network technique to improve measuring precision of a simplified photon attenuation based two-phase flowmeter

Mohammadmehdi Roshani et al.

FLOW MEASUREMENT AND INSTRUMENTATION (2020)

Article Multidisciplinary Sciences

Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

Min-Joo Kang et al.

PLOS ONE (2016)