{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:08:23Z","timestamp":1774541303803,"version":"3.50.1"},"reference-count":95,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s13042-024-02401-2","type":"journal-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T13:02:34Z","timestamp":1728478954000},"page":"2431-2467","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Leveraging LSTM and GRU-based deep neural coordination in intelligent transportation to strengthen security in the Internet of Vehicles"],"prefix":"10.1007","volume":"16","author":[{"given":"Cai","family":"Yanmin","sequence":"first","affiliation":[]},{"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Jasni Mohamad","family":"Zain","sequence":"additional","affiliation":[]},{"given":"Arindam","family":"Bhar","sequence":"additional","affiliation":[]},{"given":"Abdulfattah","family":"Noorwali","sequence":"additional","affiliation":[]},{"given":"Kamal M.","family":"Othman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,9]]},"reference":[{"key":"2401_CR1","unstructured":"(2022) Global Status Report on Road Safety. 2021. https:\/\/www.who.int\/news-room\/fact-sheets\/detail\/roadtraffic-injuries"},{"issue":"4","key":"2401_CR2","first-page":"20","volume":"58","author":"AY Abeshu","year":"2020","unstructured":"Abeshu AY, Chilamkurti N (2020) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 58(4):20\u201324","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"2401_CR3","doi-asserted-by":"crossref","first-page":"25","DOI":"10.5815\/ijigsp.2022.02.03","volume":"14","author":"V Agarwal","year":"2022","unstructured":"Agarwal V, Sharma S (2022) EMVD: efficient multitype vehicle detection algorithm using deep learning approach in vehicular communication network for radio resource management. Int J Image Graph Signal Process 14(2):25\u201337","journal-title":"Int J Image Graph Signal Process"},{"key":"2401_CR4","doi-asserted-by":"crossref","unstructured":"Agarwal V, Sharma S, Agarwal P (2021) IoT based smart transport management and vehicle-to-vehicle communication system. In: Computer networks, big data and IoT: proceedings of ICCBI 2020. Springer, Berlin, pp 709\u2013716","DOI":"10.1007\/978-981-16-0965-7_55"},{"key":"2401_CR5","doi-asserted-by":"crossref","unstructured":"Agarwal V, Sharma S, Bansal G (2022) Network resource allocation security techniques and challenges for vehicular communication network management. In: New trends and applications in internet of things (IoT) and big data analytics. Springer, Berlin, pp 123\u2013137","DOI":"10.1007\/978-3-030-99329-0_9"},{"issue":"1\u20132","key":"2401_CR6","first-page":"16","volume":"8","author":"V Agarwal","year":"2023","unstructured":"Agarwal V, Sharma S, Bansal G (2023) Route forecasting-based authentication scheme using A* algorithm in vehicular communication network. Int J Veh Inf Commun Syst 8(1\u20132):16\u201332","journal-title":"Int J Veh Inf Commun Syst"},{"issue":"03","key":"2401_CR7","first-page":"846","volume":"14","author":"CG Akhtar","year":"2023","unstructured":"Akhtar CG, Srija B, Sneha D et al (2023) Block hunter federated learning for cyber threat hunting in blockchain-based IIoT networks. Turk J Comput Math Educ 14(03):846\u2013856","journal-title":"Turk J Comput Math Educ"},{"key":"2401_CR8","first-page":"101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks. Eng Sci Technol Int J 38:101322","journal-title":"Eng Sci Technol Int J"},{"key":"2401_CR9","doi-asserted-by":"crossref","unstructured":"Altunay HC, Albayrak Z, \u00d6zalp AN, et\u00a0al (2021) Analysis of anomaly detection approaches performed through deep learning methods in SCADA systems. In: 3rd international congress on human-computer interaction, optimization and robotic applications (HORA)","DOI":"10.1109\/HORA52670.2021.9461273"},{"key":"2401_CR10","doi-asserted-by":"crossref","first-page":"13950","DOI":"10.1109\/JIOT.2021.3069642","volume":"8","author":"S Anbalagan","year":"2021","unstructured":"Anbalagan S, Bashir AK, Raja G et al (2021) Machine learning-based efficient and secure RSU placement mechanism for software defined-IoV. IEEE Internet Things J 8:13950\u201313957","journal-title":"IEEE Internet Things J"},{"key":"2401_CR11","doi-asserted-by":"crossref","first-page":"4507","DOI":"10.1109\/TITS.2020.3017882","volume":"22","author":"J Ashraf","year":"2021","unstructured":"Ashraf J, Bakhshi AD, Moustafa N et al (2021) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst 22:4507\u20134518","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2401_CR12","doi-asserted-by":"crossref","unstructured":"Cai Q, Chen J, Luo D et\u00a0al (2024) Deter-Pay: a deterministic routing protocol in concurrent payment channel network. IEEE Internet Things J","DOI":"10.1109\/JIOT.2024.3416086"},{"key":"2401_CR13","doi-asserted-by":"crossref","first-page":"100864","DOI":"10.1016\/j.swevo.2021.100864","volume":"63","author":"B Cao","year":"2021","unstructured":"Cao B, Zhang W, Wang X et al (2021) A memetic algorithm based on two_Arch2 for multi-depot heterogeneous-vehicle capacitated arc routing problem. Swarm Evol Comput 63:100864","journal-title":"Swarm Evol Comput"},{"issue":"8","key":"2401_CR14","doi-asserted-by":"crossref","first-page":"5765","DOI":"10.1109\/JIOT.2021.3065583","volume":"9","author":"B Cao","year":"2022","unstructured":"Cao B, Zhang J, Liu X et al (2022) Edge-cloud resource scheduling in space-air-ground-integrated networks for internet of vehicles. IEEE Internet Things J 9(8):5765\u20135772","journal-title":"IEEE Internet Things J"},{"key":"2401_CR15","doi-asserted-by":"crossref","unstructured":"Chawla A, Lee B, Fallon S et\u00a0al (2018) Host based intrusion detection system with combined CNN\/RNN model. In: Proceedings of the joint European conference on machine learning and knowledge discovery in databases, pp 149\u2013158","DOI":"10.1007\/978-3-030-13453-2_12"},{"issue":"5","key":"2401_CR16","doi-asserted-by":"crossref","first-page":"152202","DOI":"10.1007\/s11432-023-3903-6","volume":"67","author":"B Chen","year":"2024","unstructured":"Chen B, Hu J, Ghosh BK (2024) Finite-time tracking control of heterogeneous multi-AUV systems with partial measurements and intermittent communication. Sci China Inf Sci 67(5):152202","journal-title":"Sci China Inf Sci"},{"issue":"11","key":"2401_CR17","doi-asserted-by":"crossref","first-page":"19954","DOI":"10.1109\/TITS.2022.3182410","volume":"23","author":"J Chen","year":"2022","unstructured":"Chen J, Wang Q, Cheng HH et al (2022) A review of vision-based traffic semantic understanding in ITSs. IEEE Trans Intell Transp Syst 23(11):19954\u201319979","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"10","key":"2401_CR18","doi-asserted-by":"crossref","first-page":"18855","DOI":"10.1109\/TITS.2022.3161977","volume":"23","author":"J Chen","year":"2022","unstructured":"Chen J, Wang Q, Peng W et al (2022) Disparity-based multiscale fusion network for transportation detection. IEEE Trans Intell Transp Syst 23(10):18855\u201318863","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"2401_CR19","doi-asserted-by":"crossref","first-page":"10067","DOI":"10.1109\/TITS.2023.3269794","volume":"24","author":"J Chen","year":"2023","unstructured":"Chen J, Xu M, Xu W et al (2023) A flow feedback traffic prediction based on visual quantified features. IEEE Trans Intell Transp Syst 24(9):10067\u201310075","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2401_CR20","doi-asserted-by":"crossref","first-page":"2741","DOI":"10.1177\/09544070221121859","volume":"237","author":"Z Deng","year":"2022","unstructured":"Deng Z, Jin Y, Gao W et al (2022) A closed-loop directional dynamics control with LQR active trailer steering for articulated heavy vehicle. Proc Inst Mech Eng 237:2741\u20132758","journal-title":"Proc Inst Mech Eng"},{"issue":"8","key":"2401_CR21","doi-asserted-by":"crossref","first-page":"1853","DOI":"10.1007\/s11012-022-01532-6","volume":"57","author":"ZW Deng","year":"2022","unstructured":"Deng ZW, Zhao YQ, Wang BH et al (2022) A preview driver model based on sliding-mode and fuzzy control for articulated heavy vehicle. Meccanica 57(8):1853\u20131878","journal-title":"Meccanica"},{"key":"2401_CR22","first-page":"451","volume":"9339","author":"M Dolecki","year":"2015","unstructured":"Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. Comput Inf Syst Ind Manag 9339:451\u2013460","journal-title":"Comput Inf Syst Ind Manag"},{"issue":"11","key":"2401_CR23","doi-asserted-by":"crossref","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999\u20135004","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"3","key":"2401_CR24","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1051\/ro\/2024082","volume":"58","author":"J Feng","year":"2024","unstructured":"Feng J, Wang Y, Liu Z (2024) Joint impact of service efficiency and salvage value on the manufacturer\u2019s shared vehicle-type strategies. RAIRO-Oper Res 58(3):2261\u20132287","journal-title":"RAIRO-Oper Res"},{"key":"2401_CR25","first-page":"102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Moschoyiannis S et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419","journal-title":"J Inf Secur Appl"},{"issue":"12","key":"2401_CR26","doi-asserted-by":"crossref","first-page":"14800","DOI":"10.1109\/TITS.2023.3297996","volume":"24","author":"Y Fu","year":"2023","unstructured":"Fu Y, Li C, Yu FR et al (2023) An incentive mechanism of incorporating supervision game for federated learning in autonomous driving. IEEE Trans Intell Transp Syst 24(12):14800\u201314812","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2401_CR27","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1109\/TNSM.2020.3014929","volume":"18","author":"M Injadat","year":"2020","unstructured":"Injadat M, Moubayed A, Nassif AB et al (2020) Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans Netw Serv Manag 18:1803\u20131816","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2401_CR28","doi-asserted-by":"crossref","first-page":"10511","DOI":"10.1007\/s11227-023-05846-4","volume":"80","author":"GK Jagarlamudi","year":"2024","unstructured":"Jagarlamudi GK, Yazdinejad A, Parizi RM (2024) Exploring privacy measurement in federated learning. J Supercomput 80:10511","journal-title":"J Supercomput"},{"key":"2401_CR29","doi-asserted-by":"crossref","unstructured":"Jazi HH, Gonzalez H, Stakhanova N et\u00a0al (2017) Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Comput Netw","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"2401_CR30","doi-asserted-by":"crossref","first-page":"6680782","DOI":"10.1155\/2021\/6680782","volume":"2021","author":"S Jeong","year":"2021","unstructured":"Jeong S, Park C, Hong D et al (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw 2021:6680782","journal-title":"Secur Commun Netw"},{"key":"2401_CR31","first-page":"155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11:155781","journal-title":"PLoS ONE"},{"key":"2401_CR32","doi-asserted-by":"crossref","first-page":"98","DOI":"10.3390\/s21010098","volume":"21","author":"DY Kim","year":"2021","unstructured":"Kim DY, Jung M, Kim S (2021) An internet of vehicles (IoV) access gateway design considering the efficiency of the in-vehicle ethernet backbone. Sensors 21:98","journal-title":"Sensors"},{"key":"2401_CR33","doi-asserted-by":"crossref","first-page":"6435","DOI":"10.1109\/TII.2021.3130248","volume":"18","author":"S Latif","year":"2021","unstructured":"Latif S, Huma Z, Jamal SS et al (2021) Intrusion detection framework for the internet of things using a dense random neural network. IEEE Trans Ind Inform 18:6435\u20136444","journal-title":"IEEE Trans Ind Inform"},{"key":"2401_CR34","doi-asserted-by":"crossref","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","volume":"6","author":"J Li","year":"2018","unstructured":"Li J, Zhao Z, Li R et al (2018) Ai-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J 6:2093\u20132102","journal-title":"IEEE Internet Things J"},{"key":"2401_CR35","doi-asserted-by":"crossref","first-page":"36191","DOI":"10.1109\/ACCESS.2020.2974293","volume":"8","author":"J Li","year":"2020","unstructured":"Li J, Liu M, Xue Z et al (2020) RTVD: a real-time volumetric detection scheme for DDoS in the internet of things. IEEE Access 8:36191\u201336201","journal-title":"IEEE Access"},{"issue":"13","key":"2401_CR36","doi-asserted-by":"crossref","first-page":"19643","DOI":"10.1007\/s11042-023-14360-x","volume":"82","author":"S Li","year":"2023","unstructured":"Li S, Chen J, Peng W et al (2023) A vehicle detection method based on disparity segmentation. Multimed Tools Appl 82(13):19643\u201319655","journal-title":"Multimed Tools Appl"},{"key":"2401_CR37","doi-asserted-by":"crossref","unstructured":"Li T, Alhilal A, Zhang A et\u00a0al (2019) Driving big data: a first look at driving behavior via a large-scale private car dataset. In: IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp 8\u201312","DOI":"10.1109\/ICDEW.2019.00-34"},{"key":"2401_CR38","doi-asserted-by":"crossref","first-page":"2262","DOI":"10.1109\/TITS.2021.3066404","volume":"23","author":"Z Li","year":"2021","unstructured":"Li Z, Kong Y, Wang C et al (2021) DDoS mitigation based on space-time flow regularities in IoV: a feature adaption reinforcement learning approach. IEEE Trans Intell Transp Syst 23:2262\u20132278","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2401_CR39","first-page":"88","volume":"115","author":"W Lin","year":"2021","unstructured":"Lin W, Ye J, Xu W et al (2021) A temporal fusion approach for intrusion detection in fog computing. Future Gener Comput Syst 115:88\u201396","journal-title":"Future Gener Comput Syst"},{"key":"2401_CR40","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhao Y (2024) A blockchain-enabled framework for vehicular data sensing: enhancing information freshness. IEEE Trans Veh Technol 1\u201314","DOI":"10.1109\/TVT.2024.3417689"},{"issue":"1","key":"2401_CR41","first-page":"64","volume":"18","author":"Y Liu","year":"2024","unstructured":"Liu Y, Fan Y, Zhao L et al (2024) A refinement and abstraction method of the SPZN formal model for intelligent networked vehicles systems. KSII Trans Internet Inf Syst 18(1):64\u201388","journal-title":"KSII Trans Internet Inf Syst"},{"key":"2401_CR42","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s41650-018-0022-5","volume":"3","author":"A Lohachab","year":"2018","unstructured":"Lohachab A, Karambir B (2018) Critical analysis of DDoS\u2014an emerging security threat over IoT networks. J Commun Inf Netw 3:57\u201378","journal-title":"J Commun Inf Netw"},{"key":"2401_CR43","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1177\/03611981221094829","volume":"12","author":"J Lu","year":"2022","unstructured":"Lu J, Osorio C (2022) On the analytical probabilistic modeling of flow transmission across nodes in transportation networks. Transp Res Rec 12:209\u2013225","journal-title":"Transp Res Rec"},{"issue":"1","key":"2401_CR44","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1109\/JSAC.2023.3322764","volume":"42","author":"G Luo","year":"2024","unstructured":"Luo G, Shao C, Cheng N et al (2024) EdgeCooper: network-aware cooperative LiDAR perception for enhanced vehicular awareness. IEEE J Sel Areas Commun 42(1):207\u2013222","journal-title":"IEEE J Sel Areas Commun"},{"issue":"9","key":"2401_CR45","doi-asserted-by":"crossref","first-page":"6585","DOI":"10.1007\/s00521-021-06015-5","volume":"34","author":"J Luo","year":"2022","unstructured":"Luo J, Wang G, Li G et al (2022) Transport infrastructure connectivity and conflict resolution: a machine learning analysis. Neural Comput Appl 34(9):6585\u20136601","journal-title":"Neural Comput Appl"},{"key":"2401_CR46","first-page":"500","volume":"9","author":"EL Lydia","year":"2021","unstructured":"Lydia EL, Jovith AA, Devaraj AFS et al (2021) Green energy efficient routing with deep learning based anomaly detection for internet of things. IoT Commun Math 9:500","journal-title":"IoT Commun Math"},{"key":"2401_CR47","first-page":"1","volume":"72","author":"B Ma","year":"2023","unstructured":"Ma B, Liu Z, Dang Q et al (2023) Deep reinforcement learning of UAV tracking control under wind disturbances environments. IEEE Trans Instrum Meas 72:1\u201313","journal-title":"IEEE Trans Instrum Meas"},{"issue":"3","key":"2401_CR48","first-page":"426","volume":"58","author":"J Ma","year":"2022","unstructured":"Ma J, Hu J (2022) Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 58(3):426\u2013439","journal-title":"Kybernetika"},{"key":"2401_CR49","doi-asserted-by":"publisher","unstructured":"Zhang S, Li T, Hui S, Li G, Liang Y, Yu L, Jin D, Li Y (2023). Deep transfer learning for city-scale cellular traffic generation through urban knowledge graph. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, USA, pp. 4842-4851. https:\/\/doi.org\/10.1145\/3580305.3599801","DOI":"10.1145\/3580305.3599801"},{"key":"2401_CR50","first-page":"15","volume":"21","author":"C Miller","year":"2013","unstructured":"Miller C, Valasek C (2013) Adventures in automotive networks and control units. Def Con 21:15\u201331","journal-title":"Def Con"},{"issue":"1","key":"2401_CR51","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1049\/cth2.12538","volume":"18","author":"A Mohammadzadeh","year":"2024","unstructured":"Mohammadzadeh A, Taghavifar H, Zhang C et al (2024) A non-linear fractional-order type-3 fuzzy control for enhanced path-tracking performance of autonomous cars. IET Control Theory Appl 18(1):40\u201354","journal-title":"IET Control Theory Appl"},{"key":"2401_CR52","doi-asserted-by":"crossref","unstructured":"Namakshenas D, Yazdinejad A, Dehghantanha A et\u00a0al (2024) Federated quantum-based privacy-preserving threat detection model for consumer internet of things. IEEE Trans Consum Electron","DOI":"10.1109\/TCE.2024.3377550"},{"key":"2401_CR53","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1109\/TNSE.2020.2990984","volume":"7","author":"L Nie","year":"2020","unstructured":"Nie L, Ning Z, Wang X et al (2020) Data-driven intrusion detection for intelligent Internet of vehicles: a deep convolutional neural network-based method. IEEE Trans Netw Sci Eng 7:2219\u20132230","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2401_CR54","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/TVT.2019.2961344","volume":"69","author":"H Olufowobi","year":"2020","unstructured":"Olufowobi H, Young C, Zambreno J et al (2020) SAIDuCANT: specification-based automotive intrusion detection using controller area network (CAN) timing. IEEE Trans Veh Technol 69:1484\u20131494","journal-title":"IEEE Trans Veh Technol"},{"key":"2401_CR55","doi-asserted-by":"crossref","first-page":"77","DOI":"10.32604\/jiot.2021.017943","volume":"3","author":"BK Osibo","year":"2021","unstructured":"Osibo BK, Zhang C, Xia C et al (2021) Security and privacy in 5G Internet of Vehicles (IoV) environment. J Internet Things 3:77","journal-title":"J Internet Things"},{"key":"2401_CR56","doi-asserted-by":"crossref","unstructured":"\u00d6zalp AN, Albayrak Z, \u00c7akmak M et\u00a0al (2022) Layer-based examination of cyber-attacks in IoT. In: International congress on human-computer interaction, optimization and robotic applications (HORA)","DOI":"10.1109\/HORA55278.2022.9800047"},{"key":"2401_CR57","first-page":"157","volume":"7","author":"MD Prasad","year":"2019","unstructured":"Prasad MD, Babu VP, Amarnath C (2019) Machine learning DDoS detection using stochastic gradient boosting. Int J Comput Sci Eng 7:157\u2013166","journal-title":"Int J Comput Sci Eng"},{"key":"2401_CR58","doi-asserted-by":"crossref","unstructured":"Qu Z, Liu X, Zheng M (2023) Temporal-spatial quantum graph convolutional neural network based on Schr\u00f6dinger approach for traffic congestion prediction. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2022.3203791"},{"key":"2401_CR59","doi-asserted-by":"crossref","unstructured":"Ren Y, Wang L, Li M et\u00a0al (2024) UIF-BEV: an underlying information fusion framework for Bird\u2019s-eye-view semantic segmentation. IEEE Trans Intell Veh 1\u201318","DOI":"10.1109\/TIV.2024.3395272"},{"issue":"12","key":"2401_CR60","doi-asserted-by":"crossref","first-page":"24524","DOI":"10.1109\/TITS.2022.3210170","volume":"23","author":"Y Rong","year":"2022","unstructured":"Rong Y, Xu Z, Liu J et al (2022) Du-Bus: a realtime bus waiting time estimation system based On multi-source data. IEEE Trans Intell Transp Syst 23(12):24524\u201324539","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2401_CR61","doi-asserted-by":"crossref","first-page":"5320","DOI":"10.1007\/s11227-019-02945-z","volume":"76","author":"MM Salim","year":"2020","unstructured":"Salim MM, Rathore S, Park JH (2020) Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput 76:5320\u20135363","journal-title":"J Supercomput"},{"key":"2401_CR62","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1007\/s11063-021-10443-8","volume":"53","author":"A Sarkar","year":"2021","unstructured":"Sarkar A (2021) Deep learning guided double hidden layer neural synchronization through mutual learning. Neural Process Lett 53:1355\u20131384","journal-title":"Neural Process Lett"},{"key":"2401_CR63","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal","DOI":"10.5220\/0006639801080116"},{"key":"2401_CR64","doi-asserted-by":"crossref","first-page":"3510","DOI":"10.1109\/TCSVT.2023.3326375","volume":"34","author":"H Sheng","year":"2024","unstructured":"Sheng H, Wang S, Chen H et al (2024) Discriminative feature learning with co-occurrence attention network for vehicle ReID. IEEE Trans Circuits Syst Video Technol 34:3510\u20133522","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2401_CR65","doi-asserted-by":"crossref","first-page":"102310","DOI":"10.1016\/j.cose.2021.102353","volume":"108","author":"A Singh","year":"2021","unstructured":"Singh A, Jain A, Joshi RC (2021) Random forest-based intrusion detection systems for internet of things. Comput Secur 108:102310","journal-title":"Comput Secur"},{"key":"2401_CR66","first-page":"100198","volume":"21","author":"Min H Song","year":"2020","unstructured":"Song Min H, Woo J et al (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198","journal-title":"Veh Commun"},{"issue":"1","key":"2401_CR67","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1109\/TVT.2018.2884525","volume":"68","author":"G Sun","year":"2019","unstructured":"Sun G, Song L, Yu H et al (2019) V2V routing in a VANET based on the autoregressive integrated moving average model. IEEE Trans Veh Technol 68(1):908\u2013922","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"2401_CR68","doi-asserted-by":"crossref","first-page":"2409","DOI":"10.1109\/TITS.2019.2918255","volume":"21","author":"G Sun","year":"2020","unstructured":"Sun G, Zhang Y, Yu H et al (2020) Intersection fog-based distributed routing for V2V communication in urban vehicular ad hoc networks. IEEE Trans Intell Transp Syst 21(6):2409\u20132426","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"12","key":"2401_CR69","doi-asserted-by":"crossref","first-page":"24672","DOI":"10.1109\/TITS.2022.3198046","volume":"23","author":"G Sun","year":"2022","unstructured":"Sun G, Sheng L, Luo L et al (2022) Game theoretic approach for multipriority data transmission in 5G vehicular networks. IEEE Trans Intell Transp Syst 23(12):24672\u201324685","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2401_CR70","doi-asserted-by":"crossref","unstructured":"Sun G, Wang Z, Su H et\u00a0al (2024) Profit maximization of independent task offloading in MEC-enabled 5G internet of vehicles. IEEE Trans Intell Transp Syst 1\u201313","DOI":"10.1109\/TITS.2024.3416300"},{"issue":"14","key":"2401_CR71","doi-asserted-by":"crossref","first-page":"12777","DOI":"10.1109\/JIOT.2023.3256008","volume":"10","author":"R Sun","year":"2023","unstructured":"Sun R, Dai Y, Cheng Q (2023) An adaptive weighting strategy for multisensor integrated navigation in urban areas. IEEE Internet Things J 10(14):12777\u201312786","journal-title":"IEEE Internet Things J"},{"key":"2401_CR72","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1007\/s11277-021-08566-1","volume":"127","author":"A Teodoro","year":"2021","unstructured":"Teodoro A, Gomes O, Saadi M (2021) An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel Pers Commun 127:1085\u20131116","journal-title":"Wirel Pers Commun"},{"key":"2401_CR73","first-page":"1803","volume":"171","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Soman KP, Poornachandran P (2019) Applying deep learning approaches for network traffic prediction in software defined networks. Proc Comput Sci 171:1803\u20131812","journal-title":"Proc Comput Sci"},{"issue":"7","key":"2401_CR74","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.3390\/electronics13071168","volume":"13","author":"R Wang","year":"2024","unstructured":"Wang R, Gu Q, Lu S et al (2024) FI-NPI: exploring optimal control in parallel platform systems. Electronics 13(7):1168","journal-title":"Electronics"},{"issue":"6","key":"2401_CR75","doi-asserted-by":"crossref","first-page":"6407","DOI":"10.1109\/TIE.2023.3288188","volume":"71","author":"Y Wang","year":"2024","unstructured":"Wang Y, Sun R, Cheng Q et al (2024) Measurement quality control aided multisensor system for improved vehicle navigation in urban areas. IEEE Trans Ind Electron 71(6):6407\u20136417","journal-title":"IEEE Trans Ind Electron"},{"issue":"2","key":"2401_CR76","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/TVT.2021.3131751","volume":"71","author":"J Wu","year":"2022","unstructured":"Wu J, Wang Y, Yin C (2022) Curvilinear multilane merging and platooning with bounded control in curved road coordinates. IEEE Trans Veh Technol 71(2):1237\u20131252","journal-title":"IEEE Trans Veh Technol"},{"key":"2401_CR77","doi-asserted-by":"crossref","first-page":"2038","DOI":"10.1109\/JIOT.2019.2960631","volume":"7","author":"Z Xiao","year":"2019","unstructured":"Xiao Z, Dai X, Jiang H et al (2019) Vehicular task offloading via heat-aware MEC cooperation using game-theoretic method. IEEE Internet Things J 7:2038\u20132052","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"2401_CR78","doi-asserted-by":"crossref","first-page":"2346","DOI":"10.1109\/TCYB.2021.3117705","volume":"53","author":"Z Xiao","year":"2023","unstructured":"Xiao Z, Fang H, Jiang H et al (2023) Understanding private car aggregation effect via spatio-temporal analysis of trajectory data. IEEE Trans Cybern 53(4):2346\u20132357","journal-title":"IEEE Trans Cybern"},{"issue":"4","key":"2401_CR79","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/MNET.018.2300125","volume":"37","author":"Z Xiao","year":"2023","unstructured":"Xiao Z, Shu J, Jiang H et al (2023) Overcoming occlusions: perception task-oriented information sharing in connected and autonomous vehicles. IEEE Netw 37(4):224\u2013229","journal-title":"IEEE Netw"},{"issue":"12","key":"2401_CR80","doi-asserted-by":"crossref","first-page":"9346","DOI":"10.1109\/TWC.2023.3270179","volume":"22","author":"H Xu","year":"2023","unstructured":"Xu H, Han S, Li X et al (2023) Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Trans Wirel Commun 22(12):9346\u20139360","journal-title":"IEEE Trans Wirel Commun"},{"issue":"10","key":"2401_CR81","doi-asserted-by":"crossref","first-page":"4406","DOI":"10.1109\/TIV.2023.3298481","volume":"8","author":"J Xu","year":"2023","unstructured":"Xu J, Guo K, Zhang X et al (2023) Left gaze bias between LHT and RHT: a recommendation strategy to mitigate human errors in left- and right-hand driving. IEEE Trans Intell Veh 8(10):4406\u20134417","journal-title":"IEEE Trans Intell Veh"},{"issue":"6","key":"2401_CR82","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s11265-024-01918-7","volume":"96","author":"Z Xuemin","year":"2024","unstructured":"Xuemin Z, Haitao D, Zenggang X et al (2024) Self-organizing key security management algorithm in socially aware networking. J Signal Process Syst 96(6):369\u2013383","journal-title":"J Signal Process Syst"},{"issue":"24","key":"2401_CR83","doi-asserted-by":"crossref","first-page":"21656","DOI":"10.1109\/JIOT.2023.3317639","volume":"10","author":"J Yang","year":"2023","unstructured":"Yang J, Yang K, Xiao Z et al (2023) Improving commute experience for private car users via blockchain-enabled multitask learning. IEEE Internet Things J 10(24):21656\u201321669","journal-title":"IEEE Internet Things J"},{"key":"2401_CR84","unstructured":"Yang L (2018) Comprehensive visibility indicator algorithm for adaptable speed limit control in intelligent transportation systems. Guelph, ON, Canada"},{"key":"2401_CR85","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/JIOT.2021.3084796","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang L, Moubayed A, Shami A et al (2021) A multi-tiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J 9:616\u2013632","journal-title":"IEEE Internet Things J"},{"key":"2401_CR86","doi-asserted-by":"crossref","first-page":"106630","DOI":"10.1016\/j.asoc.2020.106630","volume":"96","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, Haddadpajouh H, Dehghantanha A et al (2020) Cryptocurrency malware hunting: a deep Recurrent Neural Network approach. Appl Soft Comput 96:106630","journal-title":"Appl Soft Comput"},{"key":"2401_CR87","doi-asserted-by":"crossref","first-page":"103801","DOI":"10.1016\/j.compind.2022.103801","volume":"144","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM et al (2023) Secure intelligent fuzzy blockchain framework: effective threat detection in IoT networks. Comput Ind 144:103801","journal-title":"Comput Ind"},{"issue":"1","key":"2401_CR88","doi-asserted-by":"crossref","first-page":"2527","DOI":"10.1109\/TCE.2023.3318509","volume":"70","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G (2024) AP2FL: auditable privacy-preserving federated learning framework for electronics in healthcare. IEEE Trans Consum Electron 70(1):2527\u20132535","journal-title":"IEEE Trans Consum Electron"},{"key":"2401_CR89","doi-asserted-by":"crossref","first-page":"103088","DOI":"10.1016\/j.sysarc.2024.103088","volume":"148","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G et al (2024) Hybrid privacy-preserving federated learning against irregular users in next-generation internet of things. J Syst Archit 148:103088","journal-title":"J Syst Archit"},{"key":"2401_CR90","doi-asserted-by":"crossref","unstructured":"Yue W, Li J, Li C et\u00a0al (2024) A channel knowledge map-aided personalized resource allocation strategy in air-ground integrated mobility. IEEE Trans Intell Transp Syst 1\u201314","DOI":"10.1109\/TITS.2024.3409415"},{"key":"2401_CR91","doi-asserted-by":"crossref","first-page":"6703","DOI":"10.1109\/TVT.2015.2480244","volume":"65","author":"K Zaidi","year":"2015","unstructured":"Zaidi K, Milojevic MB, Rakocevic V et al (2015) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65:6703\u20136714","journal-title":"IEEE Trans Veh Technol"},{"key":"2401_CR92","first-page":"663","volume":"23","author":"S Zhang","year":"2021","unstructured":"Zhang S, Xie X, Xu Y (2021) A practical method to attack deep learning based host intrusion detection systems. Int J Netw Secur 23:663\u2013676","journal-title":"Int J Netw Secur"},{"key":"2401_CR93","doi-asserted-by":"crossref","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Li P, Wang X (2019) Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7:31711\u201331722","journal-title":"IEEE Access"},{"issue":"6","key":"2401_CR94","doi-asserted-by":"crossref","first-page":"8367","DOI":"10.1109\/TVT.2024.3356587","volume":"73","author":"L Zhao","year":"2024","unstructured":"Zhao L, Xu H, Qu S et al (2024) Joint trajectory and communication design for UAV-assisted symbiotic radio networks. IEEE Trans Veh Technol 73(6):8367\u20138378","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"2401_CR95","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/MITS.2020.2970185","volume":"14","author":"W Zou","year":"2022","unstructured":"Zou W et al (2022) Limited sensing and deep data mining: a new exploration of developing city-wide parking guidance systems. IEEE Intell Transp Syst Mag 14(1):198\u2013215. https:\/\/doi.org\/10.1109\/MITS.2020.2970185","journal-title":"IEEE Intell Transp Syst Mag"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02401-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02401-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02401-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T07:31:48Z","timestamp":1744011108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02401-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,9]]},"references-count":95,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2401"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02401-2","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,9]]},"assertion":[{"value":"16 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}