{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:54:29Z","timestamp":1764240869097,"version":"3.44.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T00:00:00Z","timestamp":1748044800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T00:00:00Z","timestamp":1748044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007224","name":"National Foundation for Science and Technology Development","doi-asserted-by":"publisher","award":["102.02-2021.56"],"award-info":[{"award-number":["102.02-2021.56"]}],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-025-05461-3","type":"journal-article","created":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T01:33:45Z","timestamp":1748050425000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Robust intrusion detection for unmanned aerial vehicles: a PCA-based feature extraction and ensemble learning approach"],"prefix":"10.1007","volume":"28","author":[{"given":"Thien Van","family":"Luong","sequence":"first","affiliation":[]},{"given":"Van-Cuong","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Thi Thanh Huyen","family":"Le","sequence":"additional","affiliation":[]},{"given":"Xuan-Nam","family":"Tran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,24]]},"reference":[{"issue":"2","key":"5461_CR1","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","volume":"18","author":"L Gupta","year":"2016","unstructured":"Gupta, L., Jain, R., Vaszkun, G.: Survey of important issues in UAV communication networks. IEEE Commun. Surv. Tuts. 18(2), 1123\u20131152 (2016)","journal-title":"IEEE Commun. Surv. Tuts."},{"issue":"3","key":"5461_CR2","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1007\/s10586-023-04089-5","volume":"27","author":"V-D Ngo","year":"2024","unstructured":"Ngo, V.-D., Vuong, T.-C., Van Luong, T., Tran, H.: Machine learning-based intrusion detection: feature selection versus feature extraction. Cluster Comput. 27(3), 2365\u20132379 (2024)","journal-title":"Cluster Comput."},{"issue":"6","key":"5461_CR3","doi-asserted-by":"publisher","first-page":"6106","DOI":"10.1109\/TITS.2023.3339728","volume":"25","author":"SC Hassler","year":"2024","unstructured":"Hassler, S.C., Mughal, U.A., Ismail, M.: Cyber-physical intrusion detection system for unmanned aerial vehicles. IEEE Trans. Intell. Transp. Syst. 25(6), 6106\u20136117 (2024)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5461_CR4","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, AA.: \u201cA detailed analysis of the KDD CUP 99 data set,\u201d in IEEE Symp. on Computational Intelligence for Security and Defense Applications, 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"6","key":"5461_CR5","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., Shantharajah, D.S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446\u2013452 (2015)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"5461_CR6","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: \u201cUNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),\u201d in Military Communications and Information Systems Conference (MilCIS), 1\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"5461_CR7","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, AH., Ghorbani, AA.: \u201cA detailed analysis of the CICIDS2017 data set,\u201d in International Conference on Information Systems Security and Privacy, (2018)","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"5461_CR8","doi-asserted-by":"crossref","unstructured":"Elsayed, MS., Le-Khac, N.-A., Jurcut, AD.: \u201cInSDN: A novel SDN intrusion dataset,\u201d IEEE Access, 8, 165 263\u2013165 284, (2020)","DOI":"10.1109\/ACCESS.2020.3022633"},{"key":"5461_CR9","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, AH., Ghorbani, AA.: \u201cToward generating a new intrusion detection dataset and intrusion traffic characterization,\u201d in Int. Conf. on Information Systems Security and Privacy, (2018)","DOI":"10.5220\/0006639801080116"},{"key":"5461_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105650","volume":"83","author":"S Khan","year":"2019","unstructured":"Khan, S., Liew, C.F., Yairi, T., McWilliam, R.: Unsupervised anomaly detection in unmanned aerial vehicles. Appl. Soft Comput. 83, 105650 (2019)","journal-title":"Appl. Soft Comput."},{"key":"5461_CR11","doi-asserted-by":"crossref","unstructured":"Agyapong, RA., Nabil, M., Nuhu, A.-R., Rasul, MI., Homaifar, A.: \u201cEfficient detection of GPS spoofing attacks on unmanned aerial vehicles using deep learning,\u201d in IEEE Symp. Series on Computational Intelligence (SSCI), 01\u201308 (2021)","DOI":"10.1109\/SSCI50451.2021.9659972"},{"key":"5461_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107784","volume":"99","author":"J Whelan","year":"2022","unstructured":"Whelan, J., Almehmadi, A., El-Khatib, K.: Artificial intelligence for intrusion detection systems in unmanned aerial vehicles. Comput. Electr. Eng. 99, 107784 (2022)","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"5461_CR13","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/TITS.2016.2600370","volume":"18","author":"H Sedjelmaci","year":"2017","unstructured":"Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18(5), 1143\u20131153 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5461_CR14","doi-asserted-by":"crossref","unstructured":"Whelan, J., Sangarapillai, T., Minawi, O., Almehmadi, A., El-Khatib, K.: \u201cNovelty-based intrusion detection of sensor attacks on unmanned aerial vehicles,\u201d in Proceedings of the 16th ACM Symp. on QoS and Security for Wireless and Mobile Networks, 23\u201328 (2020)","DOI":"10.1145\/3416013.3426446"},{"key":"5461_CR15","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1109\/TIFS.2019.2959899","volume":"15","author":"A Alipour-Fanid","year":"2020","unstructured":"Alipour-Fanid, A., Dabaghchian, M., Wang, N., Wang, P., Zhao, L., Zeng, K.: Machine learning-based delay-aware UAV detection and operation mode identification over encrypted Wi-Fi traffic. IEEE Trans. Inf. Forensics Security 15, 2346\u20132360 (2020)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"5461_CR16","doi-asserted-by":"crossref","unstructured":"Sedjelmaci, H., Senouci, SM., Ansari, N.: \u201cA hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks,\u201d IEEE Trans. Syst., Man, Cybern. Syst., 48,9, 1594\u20131606, (2018)","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"5461_CR17","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/JSEN.2020.3012697","volume":"21","author":"KH Park","year":"2021","unstructured":"Park, K.H., Park, E., Kim, H.K.: Unsupervised fault detection on unmanned aerial vehicles: Encoding and thresholding approach. Sensors 21, 6 (2021)","journal-title":"Sensors"},{"key":"5461_CR18","unstructured":"Bouhamed, O., Bouachir, O., Aloqaily, M., Ridhawi, IA.: \u201cLightweight ids for UAV networks: A periodic deep reinforcement learning-based approach,\u201d in IFIP\/IEEE International Symposium on Integrated Network Management (IM), 1032\u20131037 (2021)"},{"key":"5461_CR19","doi-asserted-by":"crossref","unstructured":"Ihekoronye, VU., Ajakwe, SO., Kim, D-S., Lee, JM.: \u201cCyber edge intelligent intrusion detection framework for UAV network based on random forest algorithm,\u201d in 13th Int. Conf. on Information and Communication Technology Convergence (ICTC), 1242\u20131247 (2022)","DOI":"10.1109\/ICTC55196.2022.9952400"},{"key":"5461_CR20","doi-asserted-by":"crossref","unstructured":"Ihekoronye, VU., Ajakwe, SO., Kim, D., Lee, JM.: (2022) \u201cHierarchical intrusion detection system for secured military drone network: A perspicacious approach,\u201d in IEEE Military Communications Conference (MILCOM), 336\u2013341","DOI":"10.1109\/MILCOM55135.2022.10017532"},{"issue":"11","key":"5461_CR21","doi-asserted-by":"publisher","first-page":"342","DOI":"10.3390\/drones6110342","volume":"6","author":"L Kou","year":"2022","unstructured":"Kou, L., Ding, S., Wu, T., Dong, W., Yin, Y.: An intrusion detection model for drone communication network in sdn environment. Drones 6(11), 342 (2022)","journal-title":"Drones"},{"issue":"6","key":"5461_CR22","doi-asserted-by":"publisher","first-page":"4128","DOI":"10.1109\/TSC.2023.3311045","volume":"16","author":"F Tlili","year":"2023","unstructured":"Tlili, F., Ayed, S., Fourati, L.C.: A new hybrid adaptive deep learning-based framework for UAVs faults and attacks detection. IEEE Trans. Services Comput. 16(6), 4128\u20134139 (2023)","journal-title":"IEEE Trans. Services Comput."},{"key":"5461_CR23","doi-asserted-by":"crossref","unstructured":"He, X., Chen, Q., Tang, L., Wang, W., Liu, T., Li, L., Liu, Q., Luo, J.: \u201cFederated continuous learning based on stacked broad learning system assisted by digital twin networks: An incremental learning approach for intrusion detection in UAV networks,\u201d IEEE Internet Things J., 10,22, 19\u00a0825\u201319\u00a0838, (2023)","DOI":"10.1109\/JIOT.2023.3282648"},{"issue":"1","key":"5461_CR24","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/JIOT.2022.3200121","volume":"10","author":"X He","year":"2023","unstructured":"He, X., Chen, Q., Tang, L., Wang, W., Liu, T.: CGAN-based collaborative intrusion detection for UAV networks: A blockchain-empowered distributed federated learning approach. IEEE Internet Things J. 10(1), 120\u2013132 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5461_CR25","doi-asserted-by":"crossref","unstructured":"Fu, R., Ren, X., Li, Y., Wu, Y., Sun, H., Al-Absi, MA.: \u201cMachine-learning-based UAV-assisted agricultural information security architecture and intrusion detection,\u201d IEEE Internet Things J., 10,21 18\u00a0589\u201318\u00a0598, (2023)","DOI":"10.1109\/JIOT.2023.3236322"},{"issue":"10","key":"5461_CR26","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jafari Navimipour, N., Unal, M.: A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J. 10(10), 8445\u20138454 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5461_CR27","doi-asserted-by":"crossref","unstructured":"Asif, M., Rahman, MA.,\u00a0Akkaya, K., Shahriar, H., Cuzzocrea, A.: \u201cAdversarial data-augmented resilient intrusion detection system for unmanned aerial vehicles,\u201d in IEEE Int. Conf. on Big Data (BigData), 5428\u20135437 (2023)","DOI":"10.1109\/BigData59044.2023.10386140"},{"key":"5461_CR28","doi-asserted-by":"publisher","first-page":"4925","DOI":"10.1109\/ACCESS.2024.3349469","volume":"12","author":"K Cengiz","year":"2024","unstructured":"Cengiz, K., Lipsa, S., Dash, R.K., Ivkovic, N., Konecki, M.: A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication. IEEE Access 12, 4925\u20134937 (2024)","journal-title":"IEEE Access"},{"key":"5461_CR29","unstructured":"Hadi, HJ., Cao, Y., Li, S., Hu, Y., Wang, J., Wang, S.: \u201cReal-time collaborative intrusion detection system in UAV networks using deep learning,\u201d IEEE Internet Things J., 1\u20131, (2024)"},{"issue":"2\u20133","key":"5461_CR30","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1177\/0278364920966642","volume":"40","author":"A Keipour","year":"2021","unstructured":"Keipour, A., Mousaei, M., Scherer, S.: ALFA: A dataset for UAV fault and anomaly detection. Int. J. Robot. Res. 40(2\u20133), 515\u2013520 (2021)","journal-title":"Int. J. Robot. Res."},{"key":"5461_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107132","volume":"226","author":"PR Kanna","year":"2021","unstructured":"Kanna, P.R., Santhi, P.: Unified deep learning approach for efficient intrusion detection system using integrated spatial-temporal features. Knowl.-Based Syst. 226, 107132 (2021)","journal-title":"Knowl.-Based Syst."},{"key":"5461_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116545","volume":"194","author":"PR Kanna","year":"2022","unstructured":"Kanna, P.R., Santhi, P.: Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst. Appl. 194, 116545 (2022)","journal-title":"Expert Syst. Appl."},{"key":"5461_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100471","volume":"35","author":"W Lo","year":"2022","unstructured":"Lo, W., Alqahtani, H., Thakur, K., Almadhor, A., Chander, S., Kumar, G.: A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic. Vehicular Commun. 35, 100471 (2022)","journal-title":"Vehicular Commun."},{"key":"5461_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108447","volume":"104","author":"H Alqahtani","year":"2022","unstructured":"Alqahtani, H., Kumar, G.: A deep learning-based intrusion detection system for in-vehicle networks. Comput. Electr. Eng. 104, 108447 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"5461_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.103171","volume":"24","author":"YK Saheed","year":"2024","unstructured":"Saheed, Y.K., Chukwuere, J.E.: XAIEnsembleTL-IoV: A new explainable artificial intelligence ensemble transfer learning for zero-day botnet attack detection in the internet of vehicles. Results Eng. 24, 103171 (2024)","journal-title":"Results Eng."},{"issue":"1","key":"5461_CR36","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s11227-024-06552-5","volume":"81","author":"OH Abdulganiyu","year":"2024","unstructured":"Abdulganiyu, O.H., Tchakoucht, T.A., Saheed, Y.K., Ahmed, H.A.: XIDINTFL-VAE: XGBoost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder. J. Supercomput. 81(1), 16 (2024)","journal-title":"J. Supercomput."},{"key":"5461_CR37","unstructured":"Murphy, KP.: Probabilistic Machine Learning: An Introduction. MIT Press, (2022)"},{"issue":"6","key":"5461_CR38","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10462-024-10759-6","volume":"57","author":"W Chen","year":"2024","unstructured":"Chen, W., Yang, K., Yu, Z., Shi, Y., Chen, C.-L.P.: A survey on imbalanced learning: latest research, applications and future directions. Artif. Intell. Rev. 57(6), 137 (2024)","journal-title":"Artif. Intell. Rev."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05461-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05461-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05461-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T15:20:06Z","timestamp":1757172006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05461-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,24]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["5461"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05461-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,5,24]]},"assertion":[{"value":"21 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"346"}}