{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:49:36Z","timestamp":1745988576235,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_19","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"263-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Mu","family":"Han","sequence":"first","affiliation":[]},{"given":"Pengzhou","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Shidian","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"19_CR1","unstructured":"Li Xinghua, Z.C., Chen, Y., Zhang, H., Weng, J.: Survey of internet of vehicles security. J. Cyber Secur. (in Chinese), 4(3), 17\u201333 (2019)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Golovko, V., Kachurka, P., Vaitsekhovich, L.: Neural network ensembles for intrusion detection. In: 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 578\u2013583 (2007)","DOI":"10.1109\/IDAACS.2007.4488487"},{"issue":"2","key":"19_CR3","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"A Buczak","year":"2015","unstructured":"Buczak, A., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"19_CR4","first-page":"265","volume":"52","author":"MXZ Xiaojian","year":"2015","unstructured":"Xiaojian, M.X.Z.: Big data privacy management. Comput. Res. Dev. 52(2), 265\u2013281 (2015)","journal-title":"Comput. Res. Dev."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Yeom, S., Giacomelli, I., Fredrikson, M., Jha, S.: Privacy risk in machine learning: analyzing the connection to overfitting. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 268\u2013282 (2018)","DOI":"10.1109\/CSF.2018.00027"},{"key":"19_CR6","unstructured":"Liu Junxu, M.X.: Survey on privacy-preserving machine learning. Comput. Res. Dev. (in Chinese), 57(2), 346\u2013362 (2020)"},{"key":"19_CR7","unstructured":"Xiang, L., Ma, H., Zhang, H., Zhang, Y., Ren, J., Zhang, Q.: Interpretable complex-valued neural networks for privacy protection. arXiv preprint arXiv:1901.09546 (2019)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Mter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 1110\u20131115 (2011)","DOI":"10.1109\/IVS.2011.5940552"},{"issue":"4","key":"19_CR9","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1109\/TIFS.2018.2869351","volume":"14","author":"B Groza","year":"2019","unstructured":"Groza, B., Murvay, P.: Efficient intrusion detection with bloom filtering in controller area networks. IEEE Trans. Inf. Forensics Secur. 14(4), 1037\u20131051 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130\u2013139 (2016)","DOI":"10.1109\/DSAA.2016.20"},{"issue":"6","key":"19_CR11","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016)","journal-title":"PLoS ONE"},{"key":"19_CR12","unstructured":"Wu, Q.G.L., Yu, H.: Anomaly detection method of vehicle-mounted CAN bus based on random forest. J. Jilin Univ. (Sci. Sci. Edn.) 56(3), 663\u2013668 (2018). (in Chinese)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: GIDS: GAN based Intrusion Detection System for In-Vehicle Network. In: Conference on Privacy (2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Jichici, C., Groza, B., Murvay, P.-S.: Examining the use of neural networks for intrusion detection in controller area networks. In: International Conference on Security for Information Technology and Communications, pp. 109\u2013125 (2018)","DOI":"10.1007\/978-3-030-12942-2_10"},{"key":"19_CR15","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein GAN. arXiv preprint arXiv:1701.07875 (2017)"},{"key":"19_CR16","unstructured":"Su, J.: O-GAN: extremely concise approach for auto-encoding generative adversarial networks. arXiv preprint arXiv:1903.01931 (2019)"},{"key":"19_CR17","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Xiao, J., Wu, H., Li, X.: Internet of things meets vehicles: sheltering in-vehicle network through lightweight machine learning. Symmetry 11(11), 1388 (2019)","DOI":"10.3390\/sym11111388"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:29:25Z","timestamp":1619317765000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}