{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T04:07:10Z","timestamp":1754021230736},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T00:00:00Z","timestamp":1709078400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T00:00:00Z","timestamp":1709078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Research on Deep Learning Method for Encrypted Traffic Recognition Based on Conditional Generative Adversarial Networks and Variational Self Encoders","award":["61972211","61972211"],"award-info":[{"award-number":["61972211","61972211"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11227-024-05948-7","type":"journal-article","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T11:03:13Z","timestamp":1709118193000},"page":"13124-13140","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on safety verification methods of static data of train control systems based on deep association rules"],"prefix":"10.1007","volume":"80","author":[{"given":"Tongdian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qingyang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,28]]},"reference":[{"key":"5948_CR1","volume-title":"Research on the safety processing and verification method of CBTC system data in urban rail transit","author":"Y Huang","year":"2014","unstructured":"Huang Y (2014) Research on the safety processing and verification method of CBTC system data in urban rail transit. Beijing Jiaotong University, Beijing"},{"issue":"1","key":"5948_CR2","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TITS.2022.3211020","volume":"24","author":"H Liang","year":"2022","unstructured":"Liang H, Zhu L, Yu FR et al (2022) A cross-layer defense method for blockchain empowered CBTC systems against data tampering attacks. IEEE Trans Intell Transp Syst 24(1):501\u2013515","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"5948_CR3","volume-title":"SCBM based safety analysis method and its application in train control systems","author":"G Zhou","year":"2016","unstructured":"Zhou G (2016) SCBM based safety analysis method and its application in train control systems. Beijing Jiaotong University, Beijing"},{"key":"5948_CR4","doi-asserted-by":"publisher","first-page":"13948","DOI":"10.1109\/TITS.2023.3294546","volume":"24","author":"Y Li","year":"2023","unstructured":"Li Y, Zhu L, Wang H et al (2023) Joint security and resources allocation scheme design in edge intelligence enabled CBTCs: a two-level game theoretic approach. IEEE Trans Intell Transp Syst 24:13948\u201313961","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"5948_CR5","doi-asserted-by":"publisher","first-page":"3935","DOI":"10.1109\/TITS.2022.3231838","volume":"24","author":"L Zhu","year":"2022","unstructured":"Zhu L, Shen C, Wang X et al (2022) A learning based intelligent train regulation method with dynamic prediction for the metro passenger flow. IEEE Trans Intell Transp Syst 24(4):3935\u20133948","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"5948_CR6","doi-asserted-by":"publisher","first-page":"18691","DOI":"10.1007\/s11227-022-04625-x","volume":"78","author":"Z Ozturk","year":"2022","unstructured":"Ozturk Z, Topcuoglu HR, Kandemir MT (2022) Studying error propagation on application data structure and hardware. J Supercomput 78:18691\u201318724","journal-title":"J Supercomput"},{"key":"5948_CR7","unstructured":"Safety Critical System Club (2023) Data safety by the SCSC safety initiative working group"},{"key":"5948_CR8","volume-title":"Improving the analysis of data in safety-related systems","author":"JR Inge","year":"2008","unstructured":"Inge JR (2008) Improving the analysis of data in safety-related systems. University of York, Heslington"},{"key":"5948_CR9","unstructured":"Safety Management Requirements for Defence (2007) Def Stan 00-56, part 1, requirements and part 2 guidance, issue 4"},{"key":"5948_CR10","volume-title":"Improving railway data verification with ProB","author":"J Falampin","year":"2013","unstructured":"Falampin J, LeDang H, Leuschel M (2013) Improving railway data verification with ProB. Springer, Berlin"},{"issue":"4","key":"5948_CR11","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.cie.2013.09.019","volume":"66","author":"D Wang","year":"2013","unstructured":"Wang D, Chen X, Huang H (2013) A graph theory-based approach to route location in railway interlocking. Comput Ind Eng 66(4):791\u2013799","journal-title":"Comput Ind Eng"},{"issue":"110","key":"5948_CR12","first-page":"141","volume":"30","author":"N Shayan","year":"2022","unstructured":"Shayan N, Sandidzadeh MA (2022) Standard formulation of data in interlocking system by RailML method: case study Zavaraeh station in Tehran-Bafgh corridor. Road 30(110):141\u2013150","journal-title":"Road"},{"issue":"3","key":"5948_CR13","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.3233\/JIFS-211537","volume":"42","author":"L Bai","year":"2022","unstructured":"Bai L, Cui Z, Duan X et al (2022) Keyword coupling query of spatiotemporal data based on XML. J Intell Fuzzy Syst 42(3):2219\u20132228","journal-title":"J Intell Fuzzy Syst"},{"key":"5948_CR14","doi-asserted-by":"publisher","first-page":"3585","DOI":"10.1007\/s11227-018-2705-y","volume":"75","author":"M Sargolzaei Javan","year":"2019","unstructured":"Sargolzaei Javan M, Akbari MK (2019) SmartData 40: a formal description framework for big data. J Supercomput 75:3585\u20133620","journal-title":"J Supercomput"},{"issue":"06","key":"5948_CR15","first-page":"100","volume":"41","author":"X Huang","year":"2019","unstructured":"Huang X, Liu Z (2019) Formal modeling and verification of compilation rules of balise telegram. J China Railw Soc 41(06):100\u2013106","journal-title":"J China Railw Soc"},{"key":"5948_CR16","doi-asserted-by":"crossref","unstructured":"Abo R, Voisin L (2013) Formal implementation of data verification for railway safety-related systems with OVADO. In: International conference on software engineering and formal methods, pp 221\u2013236","DOI":"10.1007\/978-3-319-05032-4_17"},{"key":"5948_CR17","unstructured":"Iliasov A, Taylor D, Laibinis L, et al (2022) Formal verification of railway interlocking and its safety case. In: Safety-critical systems symposium 2022. Newcastle University"},{"key":"5948_CR18","doi-asserted-by":"crossref","unstructured":"Feng J, Liu L, Hou X, et al (2023) QoE fairness resource allocation in digital twin-enabled wireless virtual reality systems. IEEE J Sel Areas Commun","DOI":"10.1109\/JSAC.2023.3313195"},{"issue":"5","key":"5948_CR19","first-page":"441","volume":"6","author":"H Hu","year":"2019","unstructured":"Hu H, He J, He X et al (2019) Emergency material scheduling optimization model and algorithms: a review. J Traffic Transp Eng (Engl Ed) 6(5):441\u2013454","journal-title":"J Traffic Transp Eng (Engl Ed)"},{"key":"5948_CR20","doi-asserted-by":"publisher","first-page":"107252","DOI":"10.1016\/j.engappai.2023.107252","volume":"127","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Song H, Wang H et al (2024) A novel brain-inspired approach based on spiking neural network for cooperative control and protection of multiple trains. Eng Appl Artif Intell 127:107252","journal-title":"Eng Appl Artif Intell"},{"key":"5948_CR21","doi-asserted-by":"publisher","first-page":"107256","DOI":"10.1016\/j.engappai.2023.107256","volume":"127","author":"RR Faria","year":"2024","unstructured":"Faria RR, Capron BDO, Secchi AR et al (2024) A data-driven tracking control framework using physics-informed neural networks and deep reinforcement learning for dynamical systems. Eng Appl Artif Intell 127:107256","journal-title":"Eng Appl Artif Intell"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-05948-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-05948-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-05948-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T10:50:04Z","timestamp":1717498204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-05948-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,28]]},"references-count":21,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["5948"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-05948-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,28]]},"assertion":[{"value":"28 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}