{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:14:05Z","timestamp":1759331645797,"version":"build-2065373602"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tits.2025.3565257","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T13:34:06Z","timestamp":1747316046000},"page":"14264-14276","source":"Crossref","is-referenced-by-count":0,"title":["ReMeNet: A Memory-Enhanced GAN Model for Intrusion Detection in Transportation Cyber-Physical Systems"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1235-9296","authenticated-orcid":false,"given":"Xin","family":"Wang","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9969-211X","authenticated-orcid":false,"given":"Lianbo","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9471-0868","authenticated-orcid":false,"given":"Sajal K.","family":"Das","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Missouri University of Science and Technology, Rolla, MO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5822-4346","authenticated-orcid":false,"given":"Zhonghua","family":"Liu","sequence":"additional","affiliation":[{"name":"Computer Center, Shengjing Hospital of China Medical University, Shenyang, China"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"Baheti","year":"2011","journal-title":"Impact Control Technol."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2991223"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.81"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.31"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2929020"},{"issue":"1","key":"ref6","first-page":"144","article-title":"Research summary on transportation cyber physical systems and the challenging technologies","volume":"26","author":"Dihua","year":"2013","journal-title":"Zhongguo Gonglu Xuebao (China J. Highway Transport)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MPS58874.2023.10187420"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app11093751"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3304326"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3202869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886457"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010063"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102878"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106436"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107810"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s21020626"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.06.018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2022.101322"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3479426"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108768"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-022-00910-3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108076"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010076"},{"issue":"12","key":"ref28","first-page":"66","article-title":"Network intrusion detection method based on GAN-PSO-ELM","volume":"56","author":"Yang","year":"2020","journal-title":"Comput. Eng. Appl."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103368"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3296002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT48917.2020.9214160"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16530"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3128667"},{"key":"ref34","article-title":"Neural Turing machines","author":"Graves","year":"2014","journal-title":"arXiv:1410.5401"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3102637"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2828095"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i18.17895"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/11178161\/11005675.pdf?arnumber=11005675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T13:51:23Z","timestamp":1759240283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11005675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":39,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tits.2025.3565257","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"type":"print","value":"1524-9050"},{"type":"electronic","value":"1558-0016"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}