{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T09:52:28Z","timestamp":1770976348157,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819698110","type":"print"},{"value":"9789819698127","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9812-7_36","type":"book-chapter","created":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T07:27:15Z","timestamp":1753428435000},"page":"433-444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Causal Disentanglement for Stability in IoV Network Anomaly Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5329-0713","authenticated-orcid":false,"given":"Zengri","family":"Zeng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6276-7001","authenticated-orcid":false,"given":"Cong","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4214-8594","authenticated-orcid":false,"given":"Ming","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Aimei","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Yunlian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,26]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"100809","DOI":"10.1016\/j.iot.2023.100809","volume":"22","author":"H Taslimasa","year":"2023","unstructured":"Taslimasa, H., et al.: Security issues in internet of vehicles (IoV): a comprehensive survey. Internet Things 22, 100809 (2023)","journal-title":"Internet Things"},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"10751","DOI":"10.1109\/JIOT.2024.3512531","volume":"12","author":"Z Zeng","year":"2024","unstructured":"Zeng, Z., et al.: Toward intelligent attack detection with causal transformer in Internet of Things. IEEE Internet Things J. 12, 10751 (2024)","journal-title":"IEEE Internet Things J."},{"key":"36_CR3","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1109\/TNSM.2024.3455768","volume":"21","author":"Z Zeng","year":"2024","unstructured":"Zeng, Z., et al.: Causal genetic network anomaly detection method for imbalanced data and information redundancy. IEEE Trans. Netw. Serv. Manag. 21, 6937 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"18","key":"36_CR4","doi-asserted-by":"publisher","first-page":"3811","DOI":"10.3390\/electronics12183811","volume":"12","author":"S Liu","year":"2023","unstructured":"Liu, S., et al.: Hierarchical decentralized federated learning framework with adaptive clustering: bloom-filter-based companions choice for learning non-IID data in IoV. Electronics 12(18), 3811 (2023)","journal-title":"Electronics"},{"issue":"12","key":"36_CR5","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1038\/s42256-024-00932-5","volume":"6","author":"S Fan","year":"2024","unstructured":"Fan, S., et al.: Stable Cox regression for survival analysis under distribution shifts. Nat. Mach. Intell. 6(12), 1525\u20131541 (2024)","journal-title":"Nat. Mach. Intell."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Kuang, K., et al.: Stable prediction across unknown environments. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (2018)","DOI":"10.1145\/3219819.3220082"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Kuang, K, et al.: Stable prediction with model misspecification and agnostic distribution shift. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34. no. 04 (2020)","DOI":"10.1609\/aaai.v34i04.5876"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., et al.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138 (2019)","DOI":"10.1109\/CCST.2019.8888419"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1093\/biomet\/70.1.41","volume":"70","author":"PR Rosenbaum","year":"1983","unstructured":"Rosenbaum, P.R., Rubin, D.B.: The central role of the propensity score in observational studies for causal effects. Biometrika 70, 41\u201355 (1983)","journal-title":"Biometrika"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Zeng, S., et al.: Causal transfer random forest: combining logged data and randomized experiments for robust prediction. In: Proceedings of the 14th ACM International Conference on Web Search and Data Mining (2021)","DOI":"10.1145\/3437963.3441722"},{"issue":"4","key":"36_CR11","doi-asserted-by":"publisher","first-page":"4750","DOI":"10.1109\/TNSM.2022.3193099","volume":"19","author":"Z Zeng","year":"2022","unstructured":"Zeng, Z., Peng, W., Zeng, D.: Improving the stability of intrusion detection with causal deep learning. IEEE Trans. Netw. Serv. Manag. 19(4), 4750\u20134763 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"36_CR12","doi-asserted-by":"publisher","first-page":"101209","DOI":"10.1016\/j.iot.2024.101209","volume":"26","author":"ECP Neto","year":"2024","unstructured":"Neto, E.C.P., et al.: CICIoV2024: advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet Things 26, 101209 (2024)","journal-title":"Internet Things"},{"key":"36_CR13","doi-asserted-by":"publisher","first-page":"20572","DOI":"10.1109\/JIOT.2025.3544368","volume":"12","author":"X Nie","year":"2025","unstructured":"Nie, X., et al.: Mobility-aware cooperative caching in IoVs based on secure asynchronous federated and deep reinforcement learning. IEEE Internet Things J. 12, 20572 (2025)","journal-title":"IEEE Internet Things J."},{"key":"36_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105881","volume":"120","author":"R Chhabra","year":"2023","unstructured":"Chhabra, R., Singh, S., Khullar, V.: Privacy enabled driver behavior analysis in heterogeneous IoV using federated learning. Eng. Appl. Artif. Intell. 120, 105881 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Dai, M., et al.: Toward Unknown\/Known Cyberattack Detection with a Causal Transformer. In: International Conference on Intelligent Computing. Springer Nature Singapore, Singapore (2024)","DOI":"10.1007\/978-981-97-5581-3_22"},{"key":"36_CR16","doi-asserted-by":"publisher","first-page":"4788","DOI":"10.1109\/TVT.2024.3489629","volume":"74","author":"L Zhang","year":"2024","unstructured":"Zhang, L., et al.: Dynamic vehicle reputation consensus: enhancing IoV communication with a blockchain algorithm. IEEE Trans. Veh. Technol.Veh. Technol. 74, 4788 (2024)","journal-title":"IEEE Trans. Veh. Technol.Veh. Technol."},{"issue":"8","key":"36_CR17","doi-asserted-by":"publisher","first-page":"5730","DOI":"10.1109\/JIOT.2021.3051211","volume":"9","author":"G Xu","year":"2021","unstructured":"Xu, G., Song, Z.: Performance analysis of a UAV-assisted RF\/FSO relaying systems for internet of vehicles. IEEE Internet Things J. 9(8), 5730\u20135741 (2021)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9812-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:57:21Z","timestamp":1770973041000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9812-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698110","9789819698127"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9812-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"26 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}