{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:42:19Z","timestamp":1760078539081,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819530717","type":"print"},{"value":"9789819530724","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3072-4_1","type":"book-chapter","created":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:21:10Z","timestamp":1760077270000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on\u00a0CAN Bus Intrusion Detection Method Based on\u00a0Feature Fusion of\u00a0Fourier Transform and\u00a0Wavelet Transform"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6387-8258","authenticated-orcid":false,"given":"Zixin","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2440-3555","authenticated-orcid":false,"given":"Xiangsen","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3142-3121","authenticated-orcid":false,"given":"Daohua","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,11]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Altalbe, A.: Enhanced intrusion detection in in-vehicle networks using advanced feature fusion and stacking-enriched learning. IEEE Access 12, 2045\u20132056 (2023)","DOI":"10.1109\/ACCESS.2023.3347619"},{"issue":"7","key":"1_CR2","doi-asserted-by":"publisher","first-page":"6481","DOI":"10.1109\/JIOT.2019.2958185","volume":"7","author":"AA Cook","year":"2019","unstructured":"Cook, A.A., M\u0131s\u0131rl\u0131, G., Fan, Z.: Anomaly detection for IoT time-series data: a survey. IEEE Internet Things J. 7(7), 6481\u20136494 (2019)","journal-title":"IEEE Internet Things J."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/LSP.2020.3003828","volume":"27","author":"R De","year":"2020","unstructured":"De, R., Chakraborty, A., Sarkar, R.: Document image binarization using dual discriminator generative adversarial networks. IEEE Signal Process. Lett. 27, 1090\u20131094 (2020)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"2880","DOI":"10.1109\/TII.2020.3022912","volume":"17","author":"H Hu","year":"2020","unstructured":"Hu, H., Li, Q., Zhao, Y., Zhang, Y.: Parallel deep learning algorithms with hybrid attention mechanism for image segmentation of lung tumors. IEEE Trans. Industr. Inf. 17(4), 2880\u20132889 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.future.2018.10.052","volume":"93","author":"F Kong","year":"2019","unstructured":"Kong, F., Li, J., Jiang, B., Song, H.: Short-term traffic flow prediction in smart multimedia system for internet of vehicles based on deep belief network. Futur. Gener. Comput. Syst. 93, 460\u2013472 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107646","volume":"110","author":"W Li","year":"2021","unstructured":"Li, W., Fan, L., Wang, Z., Ma, C., Cui, X.: Tackling mode collapse in multi-generator GANs with orthogonal vectors. Pattern Recogn. 110, 107646 (2021)","journal-title":"Pattern Recogn."},{"issue":"1","key":"1_CR7","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/TIA.2018.2866586","volume":"55","author":"J Mayer","year":"2018","unstructured":"Mayer, J., Turner, R.: Third harmonic current in a generator neutral earthing resistor connected to a large cable network. IEEE Trans. Ind. Appl. 55(1), 152\u2013157 (2018)","journal-title":"IEEE Trans. Ind. Appl."},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"39213","DOI":"10.1109\/ACCESS.2023.3268519","volume":"11","author":"SB Park","year":"2023","unstructured":"Park, S.B., Jo, H.J., Lee, D.H.: G-IDCS: graph-based intrusion detection and classification system for can protocol. IEEE Access 11, 39213\u201339227 (2023)","journal-title":"IEEE Access"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: GIDS: GAN based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"1_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104076","volume":"147","author":"J Song","year":"2024","unstructured":"Song, J., Qin, G., Liang, Y., Yan, J., Sun, M.: DGIDS: dynamic graph-based intrusion detection system for can. Comput. Secur. 147, 104076 (2024)","journal-title":"Comput. Secur."},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10844-020-00609-6","volume":"56","author":"HTT Thuy","year":"2021","unstructured":"Thuy, H.T.T., Anh, D.T., Chau, V.T.N.: Efficient segmentation-based methods for anomaly detection in static and streaming time series under dynamic time warping. J. Intell. Info. Syst. 56(1), 121\u2013146 (2021)","journal-title":"J. Intell. Info. Syst."},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1007\/s10845-020-01583-0","volume":"32","author":"W Wang","year":"2021","unstructured":"Wang, W., Bao, J., Li, T.: Bound smoothing based time series anomaly detection using multiple similarity measures. J. Intell. Manuf. 32, 1711\u20131727 (2021)","journal-title":"J. Intell. Manuf."},{"issue":"8","key":"1_CR13","doi-asserted-by":"publisher","first-page":"5244","DOI":"10.1109\/TII.2019.2952917","volume":"16","author":"D Wu","year":"2019","unstructured":"Wu, D., Jiang, Z., Xie, X., Wei, X., Yu, W., Li, R.: LSTM learning with Bayesian and gaussian processing for anomaly detection in industrial IoT. IEEE Trans. Industr. Inf. 16(8), 5244\u20135253 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2023.3240291","volume":"18","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Zeng, K., Lin, S.: Federated graph neural network for fast anomaly detection in controller area networks. IEEE Trans. Inf. Forensics Secur. 18, 1566\u20131579 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1109\/TII.2020.3022432","volume":"17","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Hu, Y., Liang, W., Ma, J., Jin, Q.: Variational LSTM enhanced anomaly detection for industrial big data. IEEE Trans. Industr. Inf. 17(5), 3469\u20133477 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"7","key":"1_CR16","doi-asserted-by":"publisher","first-page":"4874","DOI":"10.1007\/s10489-020-02041-3","volume":"51","author":"Y Zhou","year":"2021","unstructured":"Zhou, Y., Ren, H., Li, Z., Wu, N., Al-Ahmari, A.M.: Anomaly detection via a combination model in time series data. Appl. Intell. 51(7), 4874\u20134887 (2021). https:\/\/doi.org\/10.1007\/s10489-020-02041-3","journal-title":"Appl. Intell."}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3072-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:21:12Z","timestamp":1760077272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3072-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,11]]},"ISBN":["9789819530717","9789819530724"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3072-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,11]]},"assertion":[{"value":"11 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ksem2025.scimeeting.cn\/en\/web\/index\/27434","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}