{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T13:02:48Z","timestamp":1765803768276,"version":"3.48.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. ITS Res."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s13177-025-00539-z","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T12:00:13Z","timestamp":1754654413000},"page":"1735-1748","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Early Warning of Classified Information Security in Rail Transit Vehicle Communication Network Based on Parallel Interference Cancellation"],"prefix":"10.1007","volume":"23","author":[{"given":"Junxian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,8]]},"reference":[{"issue":"10","key":"539_CR1","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.tbs.2021.10.007","volume":"26","author":"V Taecharungroj","year":"2022","unstructured":"Taecharungroj, V.: An analysis of tripadvisor reviews of 127 urban rail transit networks worldwide. Travel Behav. Soc. 26(10), 193\u2013205 (2022)","journal-title":"Travel Behav. Soc."},{"issue":"1","key":"539_CR2","first-page":"12","volume":"48","author":"B Tuzik","year":"2022","unstructured":"Tuzik, B.: Skytrain moving from reactive to preventive rail maintenance toward a state of good repair. Mass. Transit. 48(1), 12\u201318 (2022)","journal-title":"Mass. Transit."},{"issue":"5","key":"539_CR3","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.dcan.2022.06.018","volume":"9","author":"T Alladi","year":"2023","unstructured":"Alladi, T., Kohli, V., Chamola, V., Yu, F.R.: A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. Digit. Commun. Networks. 9(5), 1113\u20131122 (2023)","journal-title":"Digit. Commun. Networks"},{"key":"539_CR4","doi-asserted-by":"crossref","unstructured":"Quincozes, V.E., Quincozes, S.E., Passos, D.: C\u00e9lio Albuquerque, & Daniel Moss\u00e9. Towards feature engineering for intrusion detection in iec\u201361850 communication networks. Annals of Telecommunications 79(7\u20138), 537\u2013551 (2024)","DOI":"10.1007\/s12243-024-01011-x"},{"issue":"04","key":"539_CR5","first-page":"387","volume":"41","author":"GH Zhang","year":"2024","unstructured":"Zhang, G.H., Jiao, X.: A dynamic early warning method for classified information security in large scale communication network. Comput. Simul. 41(04), 387\u2013390440 (2024)","journal-title":"Comput. Simul."},{"issue":"May","key":"539_CR6","first-page":"1165451","volume":"194","author":"PR Kanna","year":"2022","unstructured":"Kanna, P.R., Santhi, P.: Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst. Application. 194(May), 1165451\u201311654517 (2022)","journal-title":"Expert Syst. Application"},{"issue":"1","key":"539_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11235-023-01005-5","volume":"83","author":"M Dmitry","year":"2023","unstructured":"Dmitry, M., Evgeny, B., Viktor, K.: On the interference cancellation by reduced channel zero forcing class of precodings in massive Mimo systems. Telecommunication Systems: Model. Anal. Des. Manage. 83(1), 29\u201340 (2023)","journal-title":"Telecommunication Systems: Model. Anal. Des. Manage."},{"issue":"9","key":"539_CR8","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1587\/transcom.2021EBP3187","volume":"E105\/B","author":"S Denno","year":"2022","unstructured":"Denno, S., Hou, Y.: Asynchronous periodic interference signals cancellation in frequency domain. IEICE Trans. Commun. E105\/B(9), 1087\u20131096 (2022)","journal-title":"IEICE Trans. Commun."},{"issue":"1","key":"539_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10776-024-00614-4","volume":"31","author":"SS Rana","year":"2024","unstructured":"Rana, S.S., Verma, G., Sahu, O.P.: Machine learning based improved user-pairing and power allocation with imperfect-successive interference cancellation for downlink noma-uav system. Int. J. Wireless Inf. Networks. 31(1), 29\u201336 (2024)","journal-title":"Int. J. Wireless Inf. Networks"},{"issue":"2","key":"539_CR10","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1109\/TCOMM.2021.3131622","volume":"70","author":"E Nassaji","year":"2022","unstructured":"Nassaji, E., Bashir, M., Truhachev, D.: Unsourced random access over fading channels via data repetition, permutation, and scrambling. IEEE Trans. Commun. 70(2), 1029\u20131042 (2022)","journal-title":"IEEE Trans. Commun."},{"issue":"5","key":"539_CR11","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.1109\/JSSC.2022.3200369","volume":"58","author":"H Abolmagd","year":"2023","unstructured":"Abolmagd, H., Subbaraman, R., Esmaeeli, O., Guntupalli, Y., Sharkia, A., Bharadia, D., et al.: A hierarchical self-interference canceller for full-duplex Lpwan applications achieving 52\u201370-db Rf cancellation. IEEE J. Solid-State Circuits. 58(5), 1323\u20131336 (2023)","journal-title":"IEEE J. Solid-State Circuits"},{"issue":"8","key":"539_CR12","doi-asserted-by":"publisher","first-page":"4665","DOI":"10.1109\/TCOMM.2023.3277891","volume":"71","author":"L Valentini","year":"2023","unstructured":"Valentini, L., Chiani, M., Paolini, E.: Interference cancellation algorithms for grant-free multiple access with massive Mimo. IEEE Trans. Commun. 71(8), 4665\u20134677 (2023)","journal-title":"IEEE Trans. Commun."},{"issue":"Sep","key":"539_CR13","first-page":"11","volume":"218","author":"W Niewolski","year":"2023","unstructured":"Niewolski, W., Nowak, T.W., Sepczuk, M.K.Z.: Security architecture for authorized anonymous communication in 5\u00a0g mec. J. Netw. Comput. Appl. 218(Sep), 11\u2013113 (2023)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"539_CR14","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1109\/TGCN.2021.3115268","volume":"6","author":"N Garg","year":"2022","unstructured":"Garg, N., Rudraksh, A., Sharma, G., Ratnarajah, T.: Improved rate-energy trade-off for Swipt using chordal distance decomposition in interference alignment networks. IEEE Trans. Green. Commun. Netw. 6(2), 917\u2013929 (2022)","journal-title":"IEEE Trans. Green. Commun. Netw."},{"issue":"2 Pt3","key":"539_CR15","doi-asserted-by":"publisher","first-page":"3921","DOI":"10.32604\/cmc.2022.029541","volume":"73","author":"MA Siddiqi","year":"2022","unstructured":"Siddiqi, M.A., Pak, W.: An optimized and hybrid framework for image processing based network intrusion detection system. Computers Mater. Continua. 73(2 Pt3), 3921\u20133949 (2022)","journal-title":"Computers Mater. Continua"},{"issue":"4","key":"539_CR16","doi-asserted-by":"publisher","first-page":"210","DOI":"10.4236\/jis.2022.134012","volume":"13","author":"IY Morgan","year":"2022","unstructured":"Morgan, I.Y.: Systematic review of graphical visual methods in honeypot attack data analysis. J. Inform. Secur. 13(4), 210\u2013243 (2022)","journal-title":"J. Inform. Secur."},{"issue":"Jul","key":"539_CR17","first-page":"1079701","volume":"139","author":"PK Jena","year":"2022","unstructured":"Jena, P.K., Ghosh, S., Koley, E.: Identification of strategic sensor locations for intrusion detection and classification in smart grid networks. Int. J. Electr. Power Energy Syst. 139(Jul), 1079701\u201310797013 (2022)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"1","key":"539_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/JCS-220031","volume":"32","author":"SK Wanjau","year":"2024","unstructured":"Wanjau, S.K., Wambugu, G.M., Muketha, O.G.M.: Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. J. Comput. Secur. 32(1), 1\u201330 (2024)","journal-title":"J. Comput. Secur."},{"issue":"7","key":"539_CR19","doi-asserted-by":"publisher","first-page":"4032","DOI":"10.1109\/TMC.2022.3148690","volume":"22","author":"Y Shi","year":"2023","unstructured":"Shi, Y., Sagduyu, Y.E.: Membership inference attack and defense for wireless signal classifiers with deep learning. IEEE Trans. Mob. Comput. 22(7), 4032\u20134043 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"Feb","key":"539_CR20","first-page":"1065281","volume":"165","author":"K Matsuo","year":"2022","unstructured":"Matsuo, K., Chigai, N., Chattha, M.I., Sugiki, N.: Vulnerable road user safety evaluation using probe vehicle data with collision warning information. Accid. Anal. Prev. 165(Feb), 1065281\u201310652811 (2022)","journal-title":"Accid. Anal. Prev."}],"container-title":["International Journal of Intelligent Transportation Systems Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13177-025-00539-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13177-025-00539-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13177-025-00539-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T12:56:33Z","timestamp":1765803393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13177-025-00539-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,8]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["539"],"URL":"https:\/\/doi.org\/10.1007\/s13177-025-00539-z","relation":{},"ISSN":["1348-8503","1868-8659"],"issn-type":[{"type":"print","value":"1348-8503"},{"type":"electronic","value":"1868-8659"}],"subject":[],"published":{"date-parts":[[2025,8,8]]},"assertion":[{"value":"17 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}