{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:08:43Z","timestamp":1742958523248,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031575365"},{"type":"electronic","value":"9783031575372"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57537-2_2","type":"book-chapter","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T19:02:38Z","timestamp":1713985358000},"page":"18-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Smart Vehicles Through Federated Learning"],"prefix":"10.1007","author":[{"given":"Sadaf MD","family":"Halim","sequence":"first","affiliation":[]},{"given":"Md Delwar","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Anoop","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Hiroyuki","family":"Inoue","sequence":"additional","affiliation":[]},{"given":"Hideya","family":"Ochiai","sequence":"additional","affiliation":[]},{"given":"Kevin W.","family":"Hamlen","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Amato, F., Coppolino, L., Mercaldo, F., Moscato, F., Nardone, R., Santone, A.: Can-bus attack detection with deep learning. IEEE Trans. Intell. Transp. Syst. 22(8), 5081\u20135090 (2021)","DOI":"10.1109\/TITS.2020.3046974"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","DOI":"10.1613\/jair.953"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Feng, S.Y., Gangal, V., Wei, J., Chandar, S., Vosoughi, S., Mitamura, T., Hovy, E.: A survey of data augmentation approaches for NLP. arXiv Preprint arXiv:2105.03075 (2021)","DOI":"10.18653\/v1\/2021.findings-acl.84"},{"issue":"11","key":"2_CR5","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Hanselmann, M., Strauss, T., Dormann, K., Ulmer, H.: Canet: an unsupervised intrusion detection system for high dimensional can bus data. IEEE Access 8, 58194\u201358205 (2020)","DOI":"10.1109\/ACCESS.2020.2982544"},{"key":"2_CR7","unstructured":"Hossain, M.D., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: An effective in-vehicle can bus intrusion detection system using cnn deep learning approach. In: 2020 IEEE Global Communications Conference, pp.\u00a01\u20136. IEEE (2020)"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Iehira, K., Inoue, H., Ishida, K.: Spoofing attack using bus-off attacks against a specific ecu of the can bus. In: 2018 15th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp.\u00a01\u20134 (2018). https:\/\/doi.org\/10.1109\/CCNC.2018.8319180","DOI":"10.1109\/CCNC.2018.8319180"},{"key":"2_CR9","unstructured":"Karimireddy, S.P., Kale, S., Mohri, M., Reddi, S., Stich, S., Suresh, A.T.: Scaffold: stochastic controlled averaging for federated learning. In: International Conference on Machine Learning, pp. 5132\u20135143. PMLR (2020)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-031-10684-2_4","volume-title":"Data and Applications Security and Privacy XXXVI","author":"X Li","year":"2022","unstructured":"Li, X., Khan, L., Zamani, M., Wickramasuriya, S., Hamlen, K.W., Thuraisingham, B.: Mcom: a semi-supervised method for imbalanced tabular security data. In: Sural, S., Lu, H. (eds.) Data and Applications Security and Privacy XXXVI, pp. 48\u201367. Springer International Publishing, Cham (2022)"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-031-28996-5_2","volume-title":"Trustworthy Federated Learning","author":"Z Li","year":"2023","unstructured":"Li, Z., Shao, J., Mao, Y., Wang, J.H., Zhang, J.: Federated learning with gan-based data synthesis for non-iid clients. In: Goebel, R., Yu, H., Faltings, B., Fan, L., Xiong, Z. (eds.) Trustworthy Federated Learning, pp. 17\u201332. Springer International Publishing, Cham (2023)"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Lin, Y., Chen, C., Xiao, F., Avatefipour, O., Alsubhi, K., Yunianta, A.: An evolutionary deep learning anomaly detection framework for in-vehicle networks - can bus. IEEE Transactions on Industry Applications, pp.\u00a01\u20131 (2020). https:\/\/doi.org\/10.1109\/TIA.2020.3009906","DOI":"10.1109\/TIA.2020.3009906"},{"key":"2_CR13","unstructured":"Liu, M., Ho, S., Wang, M., Gao, L., Jin, Y., Zhang, H.: Federated learning meets natural language processing: a survey. CoRR abs\/2107.12603 (2021). https:\/\/arxiv.org\/abs\/2107.12603"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1484-3","volume":"2019","author":"SF Lokman","year":"2019","unstructured":"Lokman, S.F., Othman, A.T., Abu-Bakar, M.H.: Intrusion detection system for automotive controller area network (can) bus system: a review. EURASIP J. Wirel. Commun. Netw. 2019, 1\u201317 (2019)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"2_CR15","unstructured":"Van\u00a0der Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(11) (2008)"},{"key":"2_CR16","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.y.: Communication-efficient learning of deep networks from decentralized data. In: Singh, A., Zhu, J. (eds.) Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, PMLR (2017)"},{"key":"2_CR17","unstructured":"NIST: Differential privacy: Future work and open challenges (March 2023). https:\/\/www.nist.gov\/blogs\/cybersecurity-insights\/differential-privacy-future-work-open-challenges"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: Gids: Gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a01\u20136 (Aug 2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Shibly, K.H., Hossain, M.D., Inoue, H., Taenaka, Y., Kadobayashi, Y.: Personalized federated learning for automotive intrusion detection systems. In: 2022 IEEE Future Networks World Forum (FNWF), pp. 544\u2013549 (2022)","DOI":"10.1109\/FNWF55208.2022.00101"},{"key":"2_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198","volume":"21","author":"HM Song","year":"2020","unstructured":"Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Commun. 21, 100198 (2020)","journal-title":"Vehicular Commun."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zeng, K., Lin, S.: Federated graph neural network for fast anomaly detection in controller area networks. IEEE Trans. Inform. Forens. Security 18, 1566\u20131579 (2023)","DOI":"10.1109\/TIFS.2023.3240291"},{"key":"2_CR22","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: Mixup: beyond empirical risk minimization. arXiv Preprint arXiv:1710.09412 (2017)"},{"key":"2_CR23","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-iid data. CoRR abs\/1806.00582 (2018)"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.neucom.2021.07.098","volume":"465","author":"H Zhu","year":"2021","unstructured":"Zhu, H., Xu, J., Liu, S., Jin, Y.: Federated learning on non-iid data: a survey. Neurocomputing 465, 371\u2013390 (2021)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57537-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T19:03:09Z","timestamp":1713985389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57537-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031575365","9783031575372"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57537-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bordeaux","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-2023.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}