{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:42:59Z","timestamp":1760078579001,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819530717","type":"print"},{"value":"9789819530724","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3072-4_2","type":"book-chapter","created":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:21:26Z","timestamp":1760077286000},"page":"13-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on\u00a0Intelligent Classification Algorithm for\u00a0Attack Detection Based on\u00a0Pre-trained Fusion Network with\u00a0Bimodal Features"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5420-1463","authenticated-orcid":false,"given":"Maoli","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2440-3555","authenticated-orcid":false,"given":"Xiangsen","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4149-6391","authenticated-orcid":false,"given":"Weidong","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,11]]},"reference":[{"issue":"12","key":"2_CR1","doi-asserted-by":"publisher","first-page":"155014771881505","DOI":"10.1177\/1550147718815054","volume":"14","author":"M Abu Talib","year":"2018","unstructured":"Abu Talib, M., Abbas, S., Nasir, Q., Mowakeh, M.F.: Systematic literature review on internet-of-vehicles communication security. Int. J. Distrib. Sens. Netw. 14(12), 1550147718815054 (2018)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Altalbe, A.: Enhanced intrusion detection in in-vehicle networks using advanced feature fusion and stacking-enriched learning. IEEE Access 12 (2023)","DOI":"10.1109\/ACCESS.2023.3347619"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"54314","DOI":"10.1109\/ACCESS.2020.2981397","volume":"8","author":"P Bagga","year":"2020","unstructured":"Bagga, P., Das, A.K., Wazid, M., Rodrigues, J.J., Park, Y.: Authentication protocols in internet of vehicles: taxonomy, analysis, and challenges. Ieee Access 8, 54314\u201354344 (2020)","journal-title":"Ieee Access"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cantone, M., Marrocco, C., Bria, A.: Machine learning in network intrusion detection: a cross-dataset generalization study. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3472907"},{"key":"2_CR5","unstructured":"Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 911\u2013927 (2016)"},{"issue":"8","key":"2_CR6","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TIFS.2018.2812149","volume":"13","author":"W Choi","year":"2018","unstructured":"Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: VoltageIDS: low-level communication characteristics for automotive intrusion detection system. IEEE Trans. Inf. Forensics Secur. 13(8), 2114\u20132129 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1109\/TIV.2020.2987430","volume":"5","author":"M Hasan","year":"2020","unstructured":"Hasan, M., Mohan, S., Shimizu, T., Lu, H.: Securing vehicle-to-everything (V2X) communication platforms. IEEE Trans. Intell. Veh. 5(4), 693\u2013713 (2020)","journal-title":"IEEE Trans. Intell. Veh."},{"key":"2_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100547","volume":"48","author":"B Hildebrand","year":"2023","unstructured":"Hildebrand, B., et al.: A comprehensive review on blockchains for internet of vehicles: challenges and directions. Comput .Sci. Rev. 48, 100547 (2023)","journal-title":"Comput .Sci. Rev."},{"key":"2_CR9","unstructured":"Hou, R., Chang, H., Ma, B., Shan, S., Chen, X.: Cross attention network for few-shot classification. Adv. Neural Info. Process. Syst. 32 (2019)"},{"issue":"6","key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016)","journal-title":"PLoS ONE"},{"issue":"10","key":"2_CR11","doi-asserted-by":"publisher","first-page":"4741","DOI":"10.1007\/s00521-020-05532-z","volume":"33","author":"W Lu","year":"2021","unstructured":"Lu, W., Li, J., Wang, J., Qin, L.: A CNN-BiLSTM-AM method for stock price prediction. Neural Comput. Appl. 33(10), 4741\u20134753 (2021)","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"2_CR12","first-page":"1263820","volume":"2021","author":"F Luo","year":"2021","unstructured":"Luo, F., Jiang, Y., Zhang, Z., Ren, Y., Hou, S.: Threat analysis and risk assessment for connected vehicles: a survey. Secur. Commun. Netw. 2021(1), 1263820 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Marchetti, M., Stabili, D., Guido, A., Colajanni, M.: Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms. In: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), pp.\u00a01\u20136. IEEE (2016)","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"M\u00fcter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 1110\u20131115. IEEE (2011)","DOI":"10.1109\/IVS.2011.5940552"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"39213","DOI":"10.1109\/ACCESS.2023.3268519","volume":"11","author":"SB Park","year":"2023","unstructured":"Park, S.B., Jo, H.J., Lee, D.H.: G-IDCS: graph-based intrusion detection and classification system for can protocol. IEEE Access 11, 39213\u201339227 (2023)","journal-title":"IEEE Access"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: GIDS: GAN based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: GIDS: GAN based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"2_CR18","volume":"20","author":"S Sharma","year":"2019","unstructured":"Sharma, S., Kaushik, B.: A survey on internet of vehicles: applications, security issues & solutions. Veh. Commun. 20, 100182 (2019)","journal-title":"Veh. Commun."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Siami-Namini, S., Tavakoli, N., Namin, A.S.: The performance of LSTM and BiLSTM in forecasting time series. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 3285\u20133292. IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9005997"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network. In: 2016 International Conference on Information Networking (ICOIN), pp. 63\u201368. IEEE (2016)","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"2_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104076","volume":"147","author":"J Song","year":"2024","unstructured":"Song, J., Qin, G., Liang, Y., Yan, J., Sun, M.: DGIDS: dynamic graph-based intrusion detection system for can. Comput. Sec. 147, 104076 (2024)","journal-title":"Comput. Sec."},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s12243-016-0551-6","volume":"72","author":"Y Sun","year":"2017","unstructured":"Sun, Y., et al.: Attacks and countermeasures in the internet of vehicles. Ann. Telecommun. 72, 283\u2013295 (2017)","journal-title":"Ann. Telecommun."},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100809","volume":"22","author":"H Taslimasa","year":"2023","unstructured":"Taslimasa, H., Dadkhah, S., Neto, E.C.P., Xiong, P., Ray, S., Ghorbani, A.A.: Security issues in internet of vehicles (IoV): a comprehensive survey. Internet Things 22, 100809 (2023)","journal-title":"Internet Things"},{"key":"2_CR24","unstructured":"Vaswani, A.: Attention is all you need. Adv. Neural Info. Process. Syst. (2017)"},{"key":"2_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109583","volume":"139","author":"J Wang","year":"2025","unstructured":"Wang, J., Yu, L., Tian, S.: Cross-attention interaction learning network for multi-model image fusion via transformer. Eng. Appl. Artif. Intell. 139, 109583 (2025)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"2_CR26","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TITS.2019.2908074","volume":"21","author":"W Wu","year":"2019","unstructured":"Wu, W., et al.: A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 21(3), 919\u2013933 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Young, C., Olufowobi, H., Bloom, G., Zambreno, J.: Automotive intrusion detection based on constant can message frequencies across vehicle driving modes. In: Proceedings of the ACM Workshop on Automotive Cybersecurity, pp. 9\u201314 (2019)","DOI":"10.1145\/3309171.3309179"},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2023.3240291","volume":"18","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Zeng, K., Lin, S.: Federated graph neural network for fast anomaly detection in controller area networks. IEEE Trans. Inf. Forensics Secur. 18, 1566\u20131579 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"2_CR29","doi-asserted-by":"publisher","first-page":"4257","DOI":"10.1109\/TCSVT.2023.3243725","volume":"33","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Xie, Y., Ding, W., Wang, Z.: Cross on cross attention: deep fusion transformer for image captioning. IEEE Trans. Circuits Syst. Video Technol. 33(8), 4257\u20134268 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3072-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:21:33Z","timestamp":1760077293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3072-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,11]]},"ISBN":["9789819530717","9789819530724"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3072-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,11]]},"assertion":[{"value":"11 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ksem2025.scimeeting.cn\/en\/web\/index\/27434","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}