{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:09:48Z","timestamp":1778083788280,"version":"3.51.4"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T00:00:00Z","timestamp":1674777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T00:00:00Z","timestamp":1674777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["19L2020"],"award-info":[{"award-number":["19L2020"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R &D Program of China","doi-asserted-by":"crossref","award":["2020YFB2009500"],"award-info":[{"award-number":["2020YFB2009500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00521-023-08233-5","type":"journal-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T19:32:15Z","timestamp":1674847935000},"page":"10257-10273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Transfer learning-based self-learning intrusion detection system for in-vehicle networks"],"prefix":"10.1007","volume":"35","author":[{"given":"Yuhang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9844-1717","authenticated-orcid":false,"given":"Yingxu","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jingwen","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Zhaoyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,27]]},"reference":[{"key":"8233_CR1","doi-asserted-by":"publisher","unstructured":"Alfardus A, Rawat DB (2021) Intrusion detection system for can bus in-vehicle network based on machine learning algorithms. In: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), IEEE, 0944\u20130949 https:\/\/doi.org\/10.1109\/UEMCON53757.2021.9666745","DOI":"10.1109\/UEMCON53757.2021.9666745"},{"issue":"8","key":"8233_CR2","doi-asserted-by":"publisher","first-page":"5081","DOI":"10.1109\/TITS.2020.3046974","volume":"22","author":"F Amato","year":"2021","unstructured":"Amato F, Coppolino L, Mercaldo F et al (2021) Can-bus attack detection with deep learning. IEEE Trans Intell Transp Sys 22(8):5081\u20135090. https:\/\/doi.org\/10.1109\/TITS.2020.3046974","journal-title":"IEEE Trans Intell Transp Sys"},{"key":"8233_CR3","doi-asserted-by":"publisher","unstructured":"Boudguiga A, Letailleur J, Sirdey R, et\u00a0al (2019) Enhancing can security by means of lightweight stream-ciphers and protocols. In: International Conference on Computer Safety, Reliability, and Security, Springer, 235\u2013250 https:\/\/doi.org\/10.1007\/978-3-030-26250-1_19","DOI":"10.1007\/978-3-030-26250-1_19"},{"key":"8233_CR4","first-page":"77","volume":"2011","author":"S Checkoway","year":"2011","unstructured":"Checkoway S, Mccoy D, Anderson D et al (2011) Comprehensive experimental analyses of automotive attack surfaces. Proc USENIX Secur Symp 2011:77\u201392","journal-title":"Proc USENIX Secur Symp"},{"issue":"2","key":"8233_CR5","doi-asserted-by":"publisher","first-page":"310","DOI":"10.3390\/sym14020310","volume":"14","author":"P Cheng","year":"2022","unstructured":"Cheng P, Xu K, Li S et al (2022) Tcan-ids: intrusion detection system for internet of vehicle using temporal convolutional attention network. Symmetry 14(2):310. https:\/\/doi.org\/10.3390\/sym14020310","journal-title":"Symmetry"},{"issue":"8","key":"8233_CR6","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1109\/34.400568","volume":"17","author":"Y Cheng","year":"1995","unstructured":"Cheng Y (1995) Mean shift, mode seeking, and clustering. IEEE Trans Pattern Anal Mach Intell 17(8):790\u2013799. https:\/\/doi.org\/10.1109\/34.400568","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8233_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3088998","author":"A Derhab","year":"2021","unstructured":"Derhab A, Belaoued M, Mohiuddin I et al (2021) Histogram-based intrusion detection and filtering framework for secure and safe in-vehicle networks. IEEE Trans Intell Transp Sys. https:\/\/doi.org\/10.1109\/TITS.2021.3088998","journal-title":"IEEE Trans Intell Transp Sys"},{"key":"8233_CR8","doi-asserted-by":"publisher","unstructured":"Hoppe T, Kiltz S, Dittmann J (2008) Security threats to automotive can networks-practical examples and selected short-term countermeasures. In: Proceedings of the Conference on Computer Safety, Reliability, and Security, 235-248 https:\/\/doi.org\/10.1007\/978-3-540-87698-4_21","DOI":"10.1007\/978-3-540-87698-4_21"},{"issue":"2","key":"8233_CR9","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TNSE.2021.3059881","volume":"8","author":"AR Javed","year":"2021","unstructured":"Javed AR, Ur Rehman S, Khan MU et al (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using cnn and attention-based gru. IEEE Trans Netw Sci Eng 8(2):1456\u20131466. https:\/\/doi.org\/10.1109\/TNSE.2021.3059881","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"2","key":"8233_CR10","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TVT.2019.2961765","volume":"69","author":"HJ Jo","year":"2020","unstructured":"Jo HJ, Kim JH, Choi HY et al (2020) Mauth-can: Masquerade-attack-proof authentication for in-vehicle networks. IEEE Trans Veh Technol 69(2):2204\u20132218. https:\/\/doi.org\/10.1109\/TVT.2019.2961765","journal-title":"IEEE Trans Veh Technol"},{"key":"8233_CR11","doi-asserted-by":"publisher","unstructured":"Jolliffe IT (2002) Principal component analysis springer verlag. In: Proceedings of WSEAS International Conference on Signal, Speech and Image Processing, 150\u2013166 https:\/\/doi.org\/10.1007\/0-387-22440-8_7","DOI":"10.1007\/0-387-22440-8_7"},{"key":"8233_CR12","doi-asserted-by":"publisher","unstructured":"Kalkan SC, Sahingoz OK (2020) In-vehicle intrusion detection system on controller area network with machine learning models. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 1\u20136 https:\/\/doi.org\/10.1109\/ICCCNT49239.2020.9225442","DOI":"10.1109\/ICCCNT49239.2020.9225442"},{"issue":"7553","key":"8233_CR13","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444. https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nature"},{"key":"8233_CR14","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.ins.2020.05.130","volume":"547","author":"X Li","year":"2021","unstructured":"Li X, Hu Z, Xu M et al (2021) Transfer learning based intrusion detection scheme for internet of vehicles. Inf Sci 547:119\u2013135. https:\/\/doi.org\/10.1016\/j.ins.2020.05.130","journal-title":"Inf Sci"},{"issue":"14","key":"8233_CR15","doi-asserted-by":"publisher","first-page":"4736","DOI":"10.3390\/s21144736","volume":"21","author":"S Mehedi","year":"2021","unstructured":"Mehedi S, Anwar A, Rahman Z et al (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736. https:\/\/doi.org\/10.3390\/s21144736","journal-title":"Sensors"},{"key":"8233_CR16","first-page":"94","volume":"2014","author":"C Miller","year":"2014","unstructured":"Miller C, Valasek C (2014) A survey of remote automotive attack surfaces. Black Hat USA 2014:94","journal-title":"Black Hat USA"},{"issue":"7","key":"8233_CR17","doi-asserted-by":"publisher","first-page":"7078","DOI":"10.1109\/TVT.2020.2989808","volume":"69","author":"H Mun","year":"2020","unstructured":"Mun H, Han K, Lee DH (2020) Ensuring safety and security in can-based automotive embedded systems: a combination of design optimization and secure communication. IEEE Trans Veh Technol 69(7):7078\u20137091. https:\/\/doi.org\/10.1109\/TVT.2020.2989808","journal-title":"IEEE Trans Veh Technol"},{"key":"8233_CR18","doi-asserted-by":"publisher","unstructured":"Otoum Y, Nayak A (2021) Signature-over-the-air with transfer learning ids for intelligent connected vehicles (icv). In: 2021 IEEE Globecom Workshops (GC Wkshps), IEEE, 1\u20136 https:\/\/doi.org\/10.1109\/GCWkshps52748.2021.9682145","DOI":"10.1109\/GCWkshps52748.2021.9682145"},{"issue":"10","key":"8233_CR19","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2009","unstructured":"Pan SJ, Yang Q (2009) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345\u20131359. https:\/\/doi.org\/10.1109\/TKDE.2009.191","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1\u20134","key":"8233_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.3233\/IDA-1998-2304","volume":"2","author":"M Partridge","year":"1998","unstructured":"Partridge M, Calvo RA (1998) Fast dimensionality reduction and simple pca. Intell Data Anal 2(1\u20134):203\u2013214. https:\/\/doi.org\/10.3233\/IDA-1998-2304","journal-title":"Intell Data Anal"},{"key":"8233_CR21","doi-asserted-by":"publisher","unstructured":"Seo E, Song HM, Kim HK (2018) Gids: Gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust, 1\u20136 https:\/\/doi.org\/10.1109\/PST.2018.8514157","DOI":"10.1109\/PST.2018.8514157"},{"key":"8233_CR22","unstructured":"Song HM, Kim HK (2018) Can network intrusion datasets http:\/\/ocslab.hksecurity.net\/Dataset\/Car-Hacking-dataset"},{"key":"8233_CR23","doi-asserted-by":"publisher","first-page":"100,198.1","DOI":"10.1016\/j.vehcom.2019.100198","volume":"21","author":"HM Song","year":"2020","unstructured":"Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100,198.1-100,198.13. https:\/\/doi.org\/10.1016\/j.vehcom.2019.100198","journal-title":"Veh Commun"},{"issue":"10","key":"8233_CR24","doi-asserted-by":"publisher","first-page":"10,880","DOI":"10.1109\/TVT.2021.3106940","volume":"70","author":"H Sun","year":"2021","unstructured":"Sun H, Chen M, Weng J et al (2021) Anomaly detection for in-vehicle network using cnn-lstm with attention mechanism. IEEE Trans Veh Technol 70(10):10,880-10,893. https:\/\/doi.org\/10.1109\/TVT.2021.3106940","journal-title":"IEEE Trans Veh Technol"},{"key":"8233_CR25","doi-asserted-by":"publisher","unstructured":"Tariq S, Lee S, Woo SS (2020) Cantransfer: Transfer learning based intrusion detection on a controller area network using convolutional lstm network. In: Proceedings of the 35th annual ACM symposium on applied computing, 1048\u20131055 https:\/\/doi.org\/10.1145\/3341105.3373868","DOI":"10.1145\/3341105.3373868"},{"key":"8233_CR26","doi-asserted-by":"publisher","unstructured":"Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: IEEE International Conference on Data Science and Advanced Analytics, 130\u2013139 https:\/\/doi.org\/10.1109\/DSAA.2016.20","DOI":"10.1109\/DSAA.2016.20"},{"issue":"2","key":"8233_CR27","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1109\/TITS.2014.2320605","volume":"16","author":"S Tuohy","year":"2015","unstructured":"Tuohy S, Glavin M, Hughes C et al (2015) Intra-vehicle networks: a review. IEEE Trans Intell Transp Syst 16(2):534\u2013545. https:\/\/doi.org\/10.1109\/TITS.2014.2320605","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"8233_CR28","unstructured":"Vassilieva N (2017) Characterization and benchmarking of deep learning. https:\/\/www.hpcuserforum.com\/presentations\/Wisconsin2017\/HPDLCookbook4HPCUserForum.pdf"},{"key":"8233_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2020.09.017","volume":"421","author":"Z Wan","year":"2021","unstructured":"Wan Z, Yang R, Huang M et al (2021) A review on transfer learning in eeg signal analysis. Neurocomputing 421:1\u201314. https:\/\/doi.org\/10.1016\/j.neucom.2020.09.017","journal-title":"Neurocomputing"},{"issue":"2","key":"8233_CR30","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TITS.2014.2351612","volume":"16","author":"S Woo","year":"2014","unstructured":"Woo S, Jo HJ, Lee DH (2014) A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans Intell Transp Syst 16(2):993\u20131006. https:\/\/doi.org\/10.1109\/TITS.2014.2351612","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"8233_CR31","doi-asserted-by":"publisher","unstructured":"Yang L, Shami A (2022) A transfer learning and optimized cnn based intrusion detection system for internet of vehicles. arXiv preprint arXiv:2201.11812https:\/\/doi.org\/10.48550\/arXiv.2201.11812","DOI":"10.48550\/arXiv.2201.11812"},{"key":"8233_CR32","doi-asserted-by":"publisher","unstructured":"Ying X, Bernieri G, Conti M, et\u00a0al (2019) Tacan: Transmitter authentication through covert channels in controller area networks. In: Proceedings of the 10th ACM\/IEEE International Conference on Cyber-Physical Systems, 23\u201334 https:\/\/doi.org\/10.1145\/3302509.3313783","DOI":"10.1145\/3302509.3313783"},{"key":"8233_CR33","unstructured":"Yosinski J, Clune J, Bengio Y, et\u00a0al (2014) How transferable are features in deep neural networks? Advances in neural information processing systems 27"},{"issue":"101","key":"8233_CR34","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1016\/j.adhoc.2019.101974","volume":"95","author":"J Zhang","year":"2019","unstructured":"Zhang J, Li F, Zhang H et al (2019) Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Netw 95(101):974. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101974","journal-title":"Ad Hoc Netw"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08233-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08233-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08233-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T17:17:06Z","timestamp":1682356626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08233-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,27]]},"references-count":34,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["8233"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08233-5","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,27]]},"assertion":[{"value":"21 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}