{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:36:42Z","timestamp":1773221802606,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"XJTLU Research Development Funding","award":["RDF-21-02-012"],"award-info":[{"award-number":["RDF-21-02-012"]}]},{"name":"XJTLU Teaching Development Funding","award":["TDF21\/22-R24-177"],"award-info":[{"award-number":["TDF21\/22-R24-177"]}]},{"name":"XJTLU AI University Research Centre, Jiangsu Province Engineering Research Centre of Data Science and Cognitive Computation at XJTLU and SIP AI innovation platform","award":["YZCXPT2022103"],"award-info":[{"award-number":["YZCXPT2022103"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s12083-025-02113-6","type":"journal-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T09:10:27Z","timestamp":1762765827000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ML-BF: Responsive and Dynamic Intrusion Detection towards Intelligent Connected Vehicles"],"prefix":"10.1007","volume":"19","author":[{"given":"Jia","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenjun","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Enggee","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Alexei","family":"Lisitsa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"issue":"1","key":"2113_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MNET.2015.7018198","volume":"29","author":"S Abdelhamid","year":"2015","unstructured":"Abdelhamid S, Hassanein HS, Takahara G (2015) Vehicle as a resource (vaar). IEEE Netw 29(1):12\u201317. https:\/\/doi.org\/10.1109\/MNET.2015.7018198","journal-title":"IEEE Netw"},{"key":"2113_CR2","doi-asserted-by":"crossref","unstructured":"Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl 148:113249","DOI":"10.1016\/j.eswa.2020.113249"},{"key":"2113_CR3","doi-asserted-by":"crossref","unstructured":"Costantino G, De\u00a0Vincenzi M, Matteucci I (2022) A comparative analysis of unece wp. 29 r155 and iso\/sae 21434. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), IEEE, pp 340\u2013347","DOI":"10.1109\/EuroSPW55150.2022.00041"},{"issue":"4","key":"2113_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.dcan.2020.04.007","volume":"6","author":"M Dibaei","year":"2020","unstructured":"Dibaei M, Zheng X, Jiang K, Abbas R, Liu S, Zhang Y, Xiang Y, Yu S (2020) Attacks and defences on intelligent connected vehicles: A survey. Digital Commun Netw 6(4):399\u2013421","journal-title":"Digital Commun Netw"},{"key":"2113_CR5","doi-asserted-by":"publisher","unstructured":"Gharaee H, Hosseinvand H (2016) A new feature selection ids based on genetic algorithm and svm. In: 2016 8th International Symposium on Telecommunications (IST), pp 139\u2013144. https:\/\/doi.org\/10.1109\/ISTEL.2016.7881798","DOI":"10.1109\/ISTEL.2016.7881798"},{"issue":"4","key":"2113_CR6","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1109\/TIFS.2018.2869351","volume":"14","author":"B Groza","year":"2018","unstructured":"Groza B, Murvay PS (2018) Efficient intrusion detection with bloom filtering in controller area networks. IEEE Trans Inf Foren Secur 14(4):1037\u20131051","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"2113_CR7","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"IM Guyon","year":"2002","unstructured":"Guyon IM, Weston J, Barnhill SD, Vapnik VN (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46:389\u2013422","journal-title":"Mach Learn"},{"key":"2113_CR8","doi-asserted-by":"publisher","unstructured":"Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of iot networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp 1\u20136. https:\/\/doi.org\/10.1109\/ISNCC.2016.7746067","DOI":"10.1109\/ISNCC.2016.7746067"},{"issue":"6","key":"2113_CR9","first-page":"226","volume":"4","author":"T Hoppe","year":"2009","unstructured":"Hoppe T, Kiltz S, Dittmann J (2009) Applying intrusion detection to automotive it-early insights and remaining challenges. J Inf Assur Secur 4(6):226\u2013235","journal-title":"J Inf Assur Secur"},{"issue":"1","key":"2113_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MCOMSTD.001.1900053","volume":"4","author":"B Ji","year":"2020","unstructured":"Ji B, Zhang X, Mumtaz S, Han C, Li C, Wen H, Wang D (2020) Survey on the internet of vehicles: Network architectures and applications. IEEE Commun Stand Magaz 4(1):34\u201341","journal-title":"IEEE Commun Stand Magaz"},{"key":"2113_CR11","first-page":"139","volume-title":"2023 IEEE 34th International Conference on Application-specific Systems","author":"S Khandelwal","year":"2023","unstructured":"Khandelwal S, Shreejith S (2023) Real-time zero-day intrusion detection system for automotive controller area network on fpgas. 2023 IEEE 34th International Conference on Application-specific Systems. Architectures and Processors (ASAP), IEEE, pp 139\u2013146"},{"key":"2113_CR12","doi-asserted-by":"crossref","unstructured":"Kumar A, Das TK (2023) Cavids: Real time intrusion detection system for connected autonomous vehicles using logical analysis of data. Veh Commun 43:100652","DOI":"10.1016\/j.vehcom.2023.100652"},{"key":"2113_CR13","doi-asserted-by":"crossref","unstructured":"Lampe B, Meng W (2024) can-train-and-test: A curated can dataset for automotive intrusion detection. Comput Secur p 103777","DOI":"10.1016\/j.cose.2024.103777"},{"key":"2113_CR14","doi-asserted-by":"crossref","unstructured":"Lee S, Kim H, Cho H, Jo HJ (2023) Fids: Filtering-based intrusion detection system for in-vehicle can. Intell Automat Soft Comput 37(3)","DOI":"10.32604\/iasc.2023.039992"},{"issue":"3","key":"2113_CR15","doi-asserted-by":"publisher","first-page":"3360","DOI":"10.1109\/TITS.2022.3224395","volume":"24","author":"C Li","year":"2023","unstructured":"Li C, Zhang Y, Luo Y (2023) A federated learning-based edge caching approach for mobile edge computing-enabled intelligent connected vehicles. IEEE Trans Intell Transport Syst 24(3):3360\u20133369. https:\/\/doi.org\/10.1109\/TITS.2022.3224395","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"2113_CR16","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.ins.2020.05.130","volume":"547","author":"X Li","year":"2021","unstructured":"Li X, Hu Z, Xu M, Wang Y, Ma J (2021) Transfer learning based intrusion detection scheme for internet of vehicles. Inf Sci 547:119\u2013135","journal-title":"Inf Sci"},{"key":"2113_CR17","unstructured":"Liu J, Fan W (2023) A machine learning-based intrusion detection approach for intelligent connected vehicles. In: 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS), IEEE, pp 231\u2013234"},{"key":"2113_CR18","doi-asserted-by":"crossref","unstructured":"Liu Y, Fan Y, Huang D, Mi B, Huang L, et\u00a0al (2022) Formal model and analysis for the random event in the intelligent car with stochastic petri nets and z. Secur Commun Netw 2022","DOI":"10.1155\/2022\/3288308"},{"key":"2113_CR19","doi-asserted-by":"crossref","unstructured":"Luo A (2022) Intrusion detection system for internet of vehicles based on ensemble learning and cnn. In: Journal of Physics: Conference Series, IOP Publishing, vol 2414, p 012014","DOI":"10.1088\/1742-6596\/2414\/1\/012014"},{"key":"2113_CR20","doi-asserted-by":"publisher","first-page":"57","DOI":"10.5755\/j01.eee.20.7.8025","volume":"20","author":"N Ma\u010dek","year":"2014","unstructured":"Ma\u010dek N, Djordjevic B, Timcenko V, Bojovic M, Milosavljevi\u0107 M (2014) Improving intrusion detection with adaptive support vector machines. Elektron Elektrotech 20:57\u201360. https:\/\/doi.org\/10.5755\/j01.eee.20.7.8025","journal-title":"Elektron Elektrotech"},{"key":"2113_CR21","first-page":"80","volume":"44","author":"S Mohammadi","year":"2019","unstructured":"Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inf Secur Appl 44:80\u201388","journal-title":"J Inf Secur Appl"},{"key":"2113_CR22","doi-asserted-by":"crossref","unstructured":"Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH (2021) A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7)","DOI":"10.3390\/math9070751"},{"key":"2113_CR23","doi-asserted-by":"crossref","unstructured":"Seo E, Song HM, Kim HK (2018) Gids: Gan based intrusion detection system for in-vehicle network. In: 2018 16th annual conference on privacy, security and trust (PST), IEEE, pp 1\u20136","DOI":"10.1109\/PST.2018.8514157"},{"key":"2113_CR24","unstructured":"Serag K, Bhatia R, Faqih A, Ozmen MO, Kumar V, Celik ZB, Xu D, Zhang N, Veloso M, Tao D, et\u00a0al (2023) Zbcan: A zero-byte can defense system. In: 32nd USENIX Security Symposium (USENIX Security 23), pp 6893\u20136910"},{"key":"2113_CR25","doi-asserted-by":"crossref","unstructured":"Sharma S, Kaushik B (2019) A survey on internet of vehicles: Applications, security issues & solutions. Veh Commun 20:100182","DOI":"10.1016\/j.vehcom.2019.100182"},{"key":"2113_CR26","doi-asserted-by":"crossref","unstructured":"Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"2113_CR27","doi-asserted-by":"crossref","unstructured":"Usman Y, Gyawali PK, Gyawali S, Chataut R (2024) The dark side of ai: Large language models as tools for cyber attacks on vehicle systems. In: 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE, pp 169\u2013175","DOI":"10.1109\/UEMCON62879.2024.10754676"},{"key":"2113_CR28","doi-asserted-by":"crossref","unstructured":"Wang YC, Houng YC, Chen HX, Tseng SM (2023) Network anomaly intrusion detection based on deep learning approach. Sensors 23(4)","DOI":"10.3390\/s23042171"},{"key":"2113_CR29","doi-asserted-by":"publisher","unstructured":"Yang L, Moubayed A, Hamieh I, Shami A (2019) Tree-based intelligent intrusion detection system in internet of vehicles. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013892","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"issue":"1","key":"2113_CR30","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JIOT.2021.3084796","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang L, Moubayed A, Shami A (2021) Mth-ids: A multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet of Things J 9(1):616\u2013632","journal-title":"IEEE Internet of Things J"},{"key":"2113_CR31","doi-asserted-by":"crossref","unstructured":"Yang L, Shami A, Stevens G, Rusett SD (2022) Lccde: A decision-based ensemble framework for intrusion detection in the internet of vehicles","DOI":"10.1109\/GLOBECOM48099.2022.10001280"},{"issue":"17","key":"2113_CR32","doi-asserted-by":"publisher","first-page":"15593","DOI":"10.1109\/JIOT.2022.3151377","volume":"9","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Xun Y, Liu J (2022) Clockids: A real-time vehicle intrusion detection system based on clock skew. IEEE Internet of Things J 9(17):15593\u201315606","journal-title":"IEEE Internet of Things J"},{"key":"2113_CR33","doi-asserted-by":"crossref","unstructured":"Liu J, Fan W, Dai Y, Lim EG, Lisitsa A (2024) A lightweight and responsive on-line ids towards intelligent connected vehicles system. In: International Conference on Computer Safety, Reliability, and Security, Springer, pp 184\u2013199","DOI":"10.1007\/978-3-031-68606-1_12"},{"key":"2113_CR34","doi-asserted-by":"crossref","unstructured":"Liu J, Fan W, Dai Y, Lim E, Pan Z, Lisitsa A (2024) Leveraging semi-supervised learning for enhancing anomaly-based ids in automotive ethernet. In: 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp 1563\u20131571","DOI":"10.1109\/TrustCom63139.2024.00216"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02113-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02113-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02113-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:18:38Z","timestamp":1773145118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02113-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["2113"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02113-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"20 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"2"}}