{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:57:24Z","timestamp":1775667444591,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621400","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"2299-2307","source":"Crossref","is-referenced-by-count":6,"title":["Efficient and Effective In-Vehicle Intrusion Detection System using Binarized Convolutional Neural Network"],"prefix":"10.1109","author":[{"given":"Linxi","family":"Zhang","sequence":"first","affiliation":[{"name":"Central Michigan University,Department of Computer Science,USA"}]},{"given":"Xuke","family":"Yan","sequence":"additional","affiliation":[{"name":"Oakland University,Department of Computer Science and Engineering,USA"}]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn,Computer and Information Science Department,USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Cho"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3570954"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3145007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119771"},{"key":"ref6","volume-title":"Deep Learning Book","author":"Ian Goodfellow","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2877890"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3242897"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021744"},{"key":"ref11","article-title":"Binarized neural networks: Training deep neural networks with weights and activations constrained to+ 1 or-1","author":"Courbariaux","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4271\/2022-01-0156"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208091"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47765-6"},{"issue":"S 91","key":"ref15","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref19","first-page":"1","article-title":"A two-stage deep learning approach for can intrusion detection","volume-title":"Proc. Ground Vehicle Syst. Eng. Technol. Symp.(GVSETS)","author":"Zhang"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100471"},{"issue":"11","key":"ref22","article-title":"Visualizing data using t-sne","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"Journal of machine learning research"},{"key":"ref23","volume-title":"Introduction to algorithms","author":"Cormen","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868993"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107281"},{"issue":"1","key":"ref27","first-page":"6869","article-title":"Quantized neural networks: Training neural networks with low precision weights and activations","volume":"18","author":"Hubara","year":"2017","journal-title":"The Journal of Machine Learning Research"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref30","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref31","first-page":"680","article-title":"Larq compute engine: Design, benchmark and deploy state-of-the-art binarized neural networks","volume-title":"Proceedings of Machine Learning and Systems","volume":"3","author":"Bannink"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","location":"Vancouver, BC, Canada","start":{"date-parts":[[2024,5,20]]},"end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621400.pdf?arnumber=10621400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:44:03Z","timestamp":1723527843000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621400\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621400","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}