{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:14:12Z","timestamp":1764080052682,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 2153136"],"award-info":[{"award-number":["CNS 2153136"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-20-1-2636"],"award-info":[{"award-number":["N00014-20-1-2636"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101070303"],"award-info":[{"award-number":["101070303"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3636083","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"212-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["CANLP: NLP-Based Intrusion Detection System for CAN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8518-0982","authenticated-orcid":false,"given":"Kavya","family":"Balasubramanian","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4504-4929","authenticated-orcid":false,"given":"Adithya Gowda","family":"Baragur","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7050-9369","authenticated-orcid":false,"given":"Denis","family":"Donadel","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7776-7865","authenticated-orcid":false,"given":"Dinuka","family":"Sahabandu","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6138-2995","authenticated-orcid":false,"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2166-7838","authenticated-orcid":false,"given":"Bhaskar","family":"Ramasubramanian","sequence":"additional","affiliation":[{"name":"Western Washington University, Bellingham, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0269-8097","authenticated-orcid":false,"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(02)00021-3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECOME.2018.8658720"},{"volume-title":"Low-Power Computer Vision","author":"Gholami Amir","key":"e_1_3_2_1_3_1","unstructured":"Amir Gholami, Sehoon Kim, Zhen Dong, Zhewei Yao, Michael W Mahoney, and Kurt Keutzer. 2022. A survey of quantization methods for efficient neural network inference. In Low-Power Computer Vision. Chapman and Hall\/CRC, 291--326."},{"key":"e_1_3_2_1_4_1","volume-title":"Byung Il Kwak, and Huy Kang Kim","author":"Han Mee Lan","year":"2018","unstructured":"Mee Lan Han, Byung Il Kwak, and Huy Kang Kim. 2018. Anomaly intrusion detection method for vehicular networks based on survival analysis. Vehicular communications 14 (2018), 52--63."},{"volume-title":"Machine Learning in Action","author":"Harrington Peter","key":"e_1_3_2_1_5_1","unstructured":"Peter Harrington. 2012. Machine Learning in Action. Simon and Schuster, New York, NY, USA."},{"key":"e_1_3_2_1_6_1","volume-title":"Accessed","author":"Technology Influx","year":"2021","unstructured":"Influx Technology. 2021. Understanding CAN DBC. www.influxtechnology.com\/post\/understanding-can-dbc. Accessed: Aug. 23, 2023."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23035"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL57034.2022.00070"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Xiao-Yang Liu Yiming Fang Liuqing Yang Zechu Li and Anwar Walid. 2022. Chapter 9 - High-performance tensor decompositions for compressing and accelerating deep neural networks. In Tensors for Data Processing Yipeng Liu (Ed.). Academic Press 293--340. 10.1016\/B978-0-12-824447-0.00015-7","DOI":"10.1016\/B978-0-12-824447-0.00015-7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3288456"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"volume-title":"Accessed","year":"2023","key":"e_1_3_2_1_12_1","unstructured":"Tensorflow. 2023. Tensorflow Lite. https:\/\/www.tensorflow.org\/lite. Accessed: Aug. 30, 2023."},{"key":"e_1_3_2_1_13_1","volume-title":"Addressing lack of comparability & testing in CAN intrusion detection research: A comprehensive guide to CAN IDS data & introduction of the ROAD dataset. arXiv preprint arXiv:2012.14600","author":"Verma Miki E","year":"2020","unstructured":"Miki E Verma, Michael D Iannacone, Robert A Bridges, Samuel C Hollifield, Pablo Moriano, Bill Kay, and Frank L Combs. 2020. Addressing lack of comparability & testing in CAN intrusion detection research: A comprehensive guide to CAN IDS data & introduction of the ROAD dataset. arXiv preprint arXiv:2012.14600 (2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3084796"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540198"}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Avila Spain","acronym":"SAC '24"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3636083","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3636083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:00Z","timestamp":1750291440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":15,"alternative-id":["10.1145\/3605098.3636083","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3636083","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}