{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:59:48Z","timestamp":1773269988691,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_6","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:29:37Z","timestamp":1767320977000},"page":"109-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection for ADS-B Data Based on KAN-LSTM"],"prefix":"10.1007","author":[{"given":"Lixia","family":"Xie","sequence":"first","affiliation":[]},{"given":"Yazhou","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Youwen","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Huiling","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"122147","DOI":"10.1109\/ACCESS.2020.3007182","volume":"8","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Shang, T., Guo, A.: Security issues in automatic dependent surveillance-broadcast (ADS-B): a survey. IEEE Access 8, 122147\u2013122167 (2020)","journal-title":"IEEE Access"},{"key":"6_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102892","volume":"174","author":"S Sciancalepore","year":"2021","unstructured":"Sciancalepore, S., Alhazbi, S., Di Pietro, R.: Receivers location privacy in avionic crowd-sourced networks: issues and countermeasures. J. Netw. Comput. Appl. 174, 102892 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102405","volume":"109","author":"F Asaf","year":"2021","unstructured":"Asaf, F., Mark, L.: Facing airborne attacks on ADS-B data with autoencoders. Comput. Secur. 109, 102405 (2021)","journal-title":"Comput. Secur."},{"issue":"S1","key":"6_CR4","first-page":"114","volume":"45","author":"BM Sun","year":"2024","unstructured":"Sun, B.M., Chen, J., Gu, Z.M.: Risks faced by ADS-B system and countermeasures. J. Commun. 45(S1), 114\u2013118 (2024)","journal-title":"J. Commun."},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.1109\/JIOT.2018.2882633","volume":"6","author":"H Yang","year":"2019","unstructured":"Yang, H., Zhou, Q., Yao, M., et al.: A practical and compatible cryptographic solution to ADS-B security. IEEE Internet Things J. 6(2), 3322\u20133334 (2019)","journal-title":"IEEE Internet Things J."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Burfeind, B., Hooper, P., Lachow, A.: Confidential ADS-B. In: Proceedings of the 2019 IEEE Aerospace Conference, Piscataway, pp. 1\u201311. IEEE (2019)","DOI":"10.1109\/AERO.2019.8742166"},{"issue":"2","key":"6_CR7","first-page":"1292","volume":"59","author":"P Yi","year":"2023","unstructured":"Yi, P., Li, J., Zhang, Y., et al.: Efficient hierarchical signature scheme with batch verification function suitable for ADS-B system. IEEE Trans. Aerosp. Electron. Syst. 59(2), 1292\u20131299 (2023)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"5157","DOI":"10.1109\/TAES.2024.3386148","volume":"60","author":"X Chen","year":"2024","unstructured":"Chen, X., He, D., Peng, C., et al.: A secure and effective hierarchical identity-based signature scheme for ADS-B systems. IEEE Trans. Aerosp. Electron. Syst. 60(4), 5157\u20135168 (2024)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Damis, H.A., Shehada, D., Fachkha, C., et al.: A microservices architecture for ADS-B data security using blockchain. In: Proceedings of the 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS), Piscataway, pp. 1\u20134. IEEE (2020)","DOI":"10.1109\/ICSPIS51252.2020.9340152"},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"8535","DOI":"10.1109\/TAES.2023.3306336","volume":"59","author":"Z Wu","year":"2023","unstructured":"Wu, Z., Shang, T., Yue, M., et al.: ADS-Bchain: a blockchain-based trusted service scheme for automatic dependent surveillance broadcast. IEEE Trans. Aerosp. Electron. Syst. 59(6), 8535\u20138549 (2023)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Pennapareddy, S., Natarajan, K.: Securing ADS-B data transmissions using blockchain: a comprehensive survey and analysis. Aircr. Eng. Aerosp. Technol. 95(3), 452\u2013463 (2023)","DOI":"10.1108\/AEAT-02-2022-0058"},{"issue":"4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"3872","DOI":"10.1109\/TAES.2024.3371396","volume":"60","author":"X Lu","year":"2024","unstructured":"Lu, X., Wu, Z., Cao, J.: ATM Chain: blockchain-based security architecture for air traffic management in future. IEEE Trans. Aerosp. Electron. Syst. 60(4), 3872\u20133896 (2024)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1109\/TAES.2020.3043536","volume":"57","author":"J Naganawa","year":"2021","unstructured":"Naganawa, J., Miyazaki, H.: Theory of automatic dependent surveillance-broadcast position verification using time difference of arrival. IEEE Trans. Aerosp. Electron. Syst. 57(3), 1387\u20131404 (2021)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.cja.2020.05.026","volume":"34","author":"AA Elmarady","year":"2021","unstructured":"Elmarady, A.A., Rahouma, K.: Actual TDoA-based augmentation system for enhancing cybersecurity in ADS-B. Chin. J. Aeronaut. 34(2), 217\u2013228 (2021)","journal-title":"Chin. J. Aeronaut."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Allmann, C., Stanzel, S., Steffes, C.: TDOA-based position verification of ADS-B information using a sensor network. In: 2022 Sensor Data Fusion: Trends, Solutions, Applications (SDF), Piscataway, pp. 1\u20136. IEEE (2022)","DOI":"10.1109\/SDF55338.2022.9931704"},{"issue":"11","key":"6_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MAES.2018.160234","volume":"32","author":"K Yoohwan","year":"2017","unstructured":"Yoohwan, K., Yeon, J.J., Sungchul, L.: ADS-B vulnerabilities and a security solution with a timestamp. IEEE Aerosp. Electron. Syst. Mag. 32(11), 52\u201361 (2017)","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"6_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100555","volume":"38","author":"R Saulius","year":"2022","unstructured":"Saulius, R., Jurgis, A., Rimvydas, A., et al.: Physical layer protection for ADS-B against spoofing and jamming. Int. J. Crit. Infrastruct. Prot. 38, 100555 (2022)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"8","key":"6_CR18","doi-asserted-by":"publisher","first-page":"13647","DOI":"10.1109\/JIOT.2023.3337543","volume":"11","author":"Q Zhang","year":"2024","unstructured":"Zhang, Q., Wang, Z., Wu, B., et al.: A robust and practical solution to ADS-B security against denial-of-service attacks. IEEE Internet Things J. 11(8), 13647\u201313659 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"6_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MAES.2017.160276","volume":"32","author":"M Leonardi","year":"2017","unstructured":"Leonardi, M., Piracci, E., Galati, G.: ADS-B jamming mitigation: a solution based on a multichannel receiver. IEEE Aerosp. Electron. Syst. Mag. 32(11), 44\u201351 (2017)","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Dai, H., et al.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: 2010 Proceedings IEEE INFOCOM, Piscataway, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462156"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Hasjuks, N., Hellbruck, H., Aboltins, A.: Performance study of chaos-based DSSS and FHSS multiuser communication systems. In: 2022 Workshop on Microwave Theory and Techniques in Wireless Communications (MTTW), Piscataway, pp. 23\u201328. IEEE (2022)","DOI":"10.1109\/MTTW56973.2022.9942505"},{"key":"6_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101789","volume":"93","author":"T Li","year":"2020","unstructured":"Li, T., Wang, B., Shang, F., et al.: Dynamic temporal ADS-B data attack detection based on sHDP-HMM. Comput. Secur. 93, 101789 (2020)","journal-title":"Comput. Secur."},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Khan, S., Thorn, J., Wahlgren, A., et al.: Intrusion detection in automatic dependent surveillance-broadcast (ADS-B) with machine learning. In: 2021 IEEE\/AIAA 40th Digital Avionics Systems Conference (DASC), Piscataway, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/DASC52595.2021.9594431"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.cose.2018.07.004","volume":"78","author":"E Habler","year":"2018","unstructured":"Habler, E., Shabtai, A.: Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. Comput. Secur. 78, 155\u2013173 (2018)","journal-title":"Comput. Secur."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Ying, X., Mazer, J., Bernieri, G., et al.: Detecting ADS-B spoofing attacks using deep neural networks. In: 2019 IEEE Conference on Communications and Network Security (CNS), Piscataway, pp. 187\u2013195. IEEE (2019)","DOI":"10.1109\/CNS.2019.8802732"},{"issue":"12","key":"6_CR26","volume":"40","author":"J Ding","year":"2019","unstructured":"Ding, J., Zou, Y., Wang, J., et al.: ADS-B anomaly data detection model based on deep learning. Acta Aeronautica et Astronautica Sinica 40(12), 323220 (2019)","journal-title":"Acta Aeronautica et Astronautica Sinica"},{"key":"6_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102213","volume":"104","author":"P Luo","year":"2021","unstructured":"Luo, P., Wang, B., Li, T., et al.: ADS-B anomaly data detection model based on VAE-SVDD. Comput. Secur. 104, 102213 (2021)","journal-title":"Comput. Secur."},{"key":"6_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103840","volume":"141","author":"P Luo","year":"2024","unstructured":"Luo, P., Wang, B., Tian, J.: TTSAD: TCN-Transformer-SVDD model for anomaly detection in air traffic ADS-B data. Comput. Secur. 141, 103840 (2024)","journal-title":"Comput. Secur."},{"issue":"14","key":"6_CR29","doi-asserted-by":"publisher","first-page":"12651","DOI":"10.1109\/JIOT.2023.3252809","volume":"10","author":"M Yue","year":"2023","unstructured":"Yue, M., Zheng, H., Cui, H., et al.: GAN-LSTM-based ADS-B attack detection in the context of air traffic control. IEEE Internet Things J. 10(14), 12651\u201312665 (2023)","journal-title":"IEEE Internet Things J."},{"key":"6_CR30","unstructured":"Liu, Z., Wang, Y., Vaidya, S., et al.: KAN: Kolmogorov-Arnold networks. arXiv preprint arXiv:2404.19756 (2024)"},{"issue":"7","key":"6_CR31","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1162\/neco_a_01199","volume":"31","author":"Y Yu","year":"2019","unstructured":"Yu, Y., Si, X., Hu, C., Zhang, J.: A review of recurrent neural networks: LSTM cells and network architectures. Neural Comput. 31(7), 1235\u20131270 (2019)","journal-title":"Neural Comput."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:36:20Z","timestamp":1773214580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}