{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T13:03:14Z","timestamp":1765803794949,"version":"3.48.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:00:00Z","timestamp":1759536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:00:00Z","timestamp":1759536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. ITS Res."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s13177-025-00550-4","type":"journal-article","created":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T12:38:56Z","timestamp":1759581536000},"page":"1911-1923","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Traffic Safety Identification Technology Combined with Foreign Body Intrusion Intelligent Identification Technology in Railway Scene"],"prefix":"10.1007","volume":"23","author":[{"given":"Li","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,4]]},"reference":[{"issue":"12","key":"550_CR1","doi-asserted-by":"publisher","first-page":"11487","DOI":"10.1109\/TII.2023.3246995","volume":"19","author":"T Yang","year":"2023","unstructured":"Yang, T., Liu, Y., Huang, Y.: Symmetry-driven unsupervised abnormal object detection for railway inspection. IEEE Transactions on Industrial Informatics 19(12), 11487\u201311498 (2023)","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"550_CR2","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3934\/mbe.2022015","volume":"19","author":"W Zhoukai","year":"2022","unstructured":"Zhoukai, W., Xinhong, H., Weigang, M.: Parallel anomaly detection algorithm for cybersecurity on the high-speed train control system. Math. Biosci. Eng. 19(1), 287\u2013308 (2022)","journal-title":"Math. Biosci. Eng."},{"issue":"2","key":"550_CR3","doi-asserted-by":"publisher","first-page":"30","DOI":"10.33142\/mes.v4i2.9085","volume":"5","author":"B Wang","year":"2023","unstructured":"Wang, B., Wang, L., Chuanya, G.U.: A system of image Recognition-Based railway foreign object intrusion monitoring design. Mech. Eng. Sci 5(2), 30\u201336 (2023)","journal-title":"Mech. Eng. Sci"},{"issue":"4","key":"550_CR4","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.11591\/ijai.v11.i4.pp1607-1614","volume":"11","author":"Y Ayachi","year":"2022","unstructured":"Ayachi, Y., Mellah, Y., Bouchentouf, K.T.: A survey and analysis of intrusion detection models based on information security and object technology-cloud intrusion dataset. IAES International Journal of Artificial Intelligence (IJ-AI) 11(4), 1607\u20131614 (2022)","journal-title":"IAES International Journal of Artificial Intelligence (IJ-AI)"},{"issue":"3","key":"550_CR5","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TITS.2021.3088998","volume":"23","author":"A Derhab","year":"2021","unstructured":"Derhab, A., Belaoued, M., Mohiuddin, I.: Histogram-based intrusion detection and filtering framework for secure and safe in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 23(3), 2366\u20132379 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"7","key":"550_CR6","doi-asserted-by":"publisher","first-page":"8453","DOI":"10.1007\/s10489-022-03911-8","volume":"53","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Yu, Z., Zhu, L.: Intrusion detection for high-speed railways based on unsupervised anomaly detection models. Appl. Intell 53(7), 8453\u20138466 (2023)","journal-title":"Appl. Intell"},{"issue":"2","key":"550_CR7","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s11760-023-02791-w","volume":"18","author":"Y Shen","year":"2024","unstructured":"Shen, Y., He, D., Liu, Q.: Unsupervised intrusion detection for rail transit based on anomaly segmentation. Signal, Image and Video Processing 18(2), 1079\u20131087 (2024)","journal-title":"Signal, Image and Video Processing"},{"issue":"2","key":"550_CR8","first-page":"2135","volume":"24","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Xie, X., Chen, L.: Intrusion detection and network information security based on deep learning algorithm in urban rail transit management system. IEEE Trans. Intell. Transp. Syst. 24(2), 2135\u20132143 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"8","key":"550_CR9","doi-asserted-by":"publisher","first-page":"11301","DOI":"10.1109\/TITS.2021.3102613","volume":"23","author":"X Gong","year":"2021","unstructured":"Gong, X., Chen, X., Zhong, Z.: Enhanced few-shot learning for intrusion detection in railway video surveillance. IEEE Trans. Intell. Transp. Syst. 23(8), 11301\u201311313 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"11","key":"550_CR10","doi-asserted-by":"publisher","first-page":"7677","DOI":"10.1109\/TCSVT.2022.3181452","volume":"32","author":"Z Zheng","year":"2022","unstructured":"Zheng, Z., Liu, W., Liu, R.: Anomaly detection of metro station tracks based on sequential updatable anomaly detection framework. IEEE Trans. Circuits Syst. Video Technol. 32(11), 7677\u20137691 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"550_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.4103\/TPSY.TPSY_23_24","volume":"38","author":"YF Lo","year":"2024","unstructured":"Lo, Y.F., Tai, Y.M.: Performance of artificial intelligence models (Bidirectional encoder representations from Transformers\u2009+\u2009TextCNN) in detecting eight psychiatric diagnoses from unstructured texts Chinese electronic medical records. Taiwanese Journal of Psychiatry 38(3), 120\u2013127 (2024)","journal-title":"Taiwanese Journal of Psychiatry"},{"issue":"6","key":"550_CR12","doi-asserted-by":"publisher","first-page":"2636","DOI":"10.1109\/TNNLS.2020.3007412","volume":"32","author":"M Liu","year":"2020","unstructured":"Liu, M., Jiao, L., Liu, X.: C-CNN: Contourlet convolutional neural networks. IEEE Trans. Neural Networks Learn. Syst. 32(6), 2636\u20132649 (2020)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"issue":"11","key":"550_CR13","doi-asserted-by":"publisher","first-page":"14577","DOI":"10.1007\/s13369-024-08730-2","volume":"49","author":"S Chen","year":"2024","unstructured":"Chen, S., Xu, M., Liu, S.: CNN-AUPI-Based: Force hysteresis modeling for soft joint actuator. Arab. J. Sci. Eng. 49(11), 14577\u201314591 (2024)","journal-title":"Arab. J. Sci. Eng."},{"issue":"2","key":"550_CR14","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1049\/cit2.12110","volume":"8","author":"Q Zhang","year":"2023","unstructured":"Zhang, Q., Xiao, J., Tian, C.: A robust deformed convolutional neural network (CNN) for image denoising. CAAI Trans. Intell. Technol. 8(2), 331\u2013342 (2023)","journal-title":"CAAI Trans. Intell. Technol."},{"issue":"10","key":"550_CR15","doi-asserted-by":"publisher","first-page":"4741","DOI":"10.1007\/s00521-020-05532-z","volume":"33","author":"W Lu","year":"2021","unstructured":"Lu, W., Li, J., Wang, J.: A CNN-BiLSTM-AM method for stock price prediction. Neural Computing and Applications 33(10), 4741\u20134753 (2021)","journal-title":"Neural Computing and Applications"},{"issue":"11","key":"550_CR16","doi-asserted-by":"publisher","first-page":"7704","DOI":"10.1109\/TII.2020.3025755","volume":"17","author":"M Abdel-Basset","year":"2020","unstructured":"Abdel-Basset, M., Chang, V., Hawash, H.: Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Trans. Industr. Inf. 17(11), 7704\u20137715 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"550_CR17","first-page":"140","volume":"1","author":"R Corizzo","year":"2020","unstructured":"Corizzo, R., Zdravevski, E., Russell, M.: Feature extraction based on word embedding models for intrusion detection in network traffic. J. Surveillance Secur. Saf. 1(2), 140\u2013150 (2020)","journal-title":"J. Surveillance Secur. Saf."},{"issue":"2","key":"550_CR18","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1177\/09544097211041020","volume":"236","author":"P Hyde","year":"2022","unstructured":"Hyde, P., Ulianov, C., Liu, J.: Use cases for obstacle detection and track intrusion detection systems in the context of new generation of railway traffic management systems. Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 236(2), 149\u2013158 (2022)","journal-title":"Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit"},{"issue":"1","key":"550_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1049\/itr2.12257","volume":"17","author":"A Razi","year":"2023","unstructured":"Razi, A., Chen, X., Li, H., Wang, H., Russo, B., Chen, Y., Yu, H.: Deep learning serves traffic safety analysis: A forward-looking review. IET Intelligent Transport Systems 17(1), 22\u201371 (2023)","journal-title":"IET Intelligent Transport Systems"},{"issue":"1","key":"550_CR20","first-page":"85","volume":"19","author":"YH Lee","year":"2020","unstructured":"Lee, Y.H., Kim, Y.: Comparison of CNN and YOLO for object detection. J. Semicond. Disp. Technol. 19(1), 85\u201392 (2020)","journal-title":"J. Semicond. Disp. Technol."},{"issue":"8\u20139","key":"550_CR21","doi-asserted-by":"publisher","first-page":"6491","DOI":"10.1007\/s11760-024-03332-9","volume":"18","author":"AS Banu","year":"2024","unstructured":"Banu, A.S., Hameed, K.A.S.: Automatic target detection and recognition of military vehicles in synthetic aperture radar images is fostered by optimizing VGG-googLeNet with the giraffe kicking optimization algorithm. Signal, Image and Video Processing 18(8\u20139), 6491\u20136502 (2024)","journal-title":"Signal, Image and Video Processing"}],"container-title":["International Journal of Intelligent Transportation Systems Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13177-025-00550-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13177-025-00550-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13177-025-00550-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T12:57:38Z","timestamp":1765803458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13177-025-00550-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,4]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["550"],"URL":"https:\/\/doi.org\/10.1007\/s13177-025-00550-4","relation":{},"ISSN":["1348-8503","1868-8659"],"issn-type":[{"type":"print","value":"1348-8503"},{"type":"electronic","value":"1868-8659"}],"subject":[],"published":{"date-parts":[[2025,10,4]]},"assertion":[{"value":"13 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"The authors declare no conflict of interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}