{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:45Z","timestamp":1766298345799,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3632366.3632388","type":"proceedings-article","created":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T17:02:02Z","timestamp":1712163722000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-Preserving Intrusion Detection System for Internet of Vehicles using Split Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5037-8720","authenticated-orcid":false,"given":"Paul","family":"Agbaje","sequence":"first","affiliation":[{"name":"University Of Texas At Arlington, Arlington, Texas, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0687-7925","authenticated-orcid":false,"given":"Afia","family":"Anjum","sequence":"additional","affiliation":[{"name":"University Of Texas At Arlington, Arlington, Texas, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2586-3520","authenticated-orcid":false,"given":"Arkajyoti","family":"Mitra","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, Texas, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4187-6135","authenticated-orcid":false,"given":"Sena","family":"Hounsinou","sequence":"additional","affiliation":[{"name":"Metro State University, St. Paul, Minnesota, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5950-7231","authenticated-orcid":false,"given":"Ebelechukwu","family":"Nwafor","sequence":"additional","affiliation":[{"name":"Villanova University, Villanova, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8959-2038","authenticated-orcid":false,"given":"Habeeb","family":"Olufowobi","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, Texas, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3194413"},{"key":"e_1_3_2_1_2_1","unstructured":"Natasha Alkhatib Lina Achaji Maria Mushtaq Hadi Ghauch and Jean-Luc Danger. [n. d.]. WIP: AMICA: Attention-based Multi-Identifier model for asynchronous intrusion detection on Controller Area networks. ([n. d.])."},{"key":"e_1_3_2_1_3_1","volume-title":"Mohammad Mehedi Hassan, and Kuljeet Kaur","author":"Almutlaq Samah","year":"2022","unstructured":"Samah Almutlaq, Abdelouahid Derhab, Mohammad Mehedi Hassan, and Kuljeet Kaur. 2022. Two-stage intrusion detection system in intelligent transportation systems using rule extraction methods from deep neural networks. IEEE Transactions on Intelligent Transportation Systems (2022)."},{"key":"e_1_3_2_1_4_1","volume-title":"In-Vehicle Network Anomaly Detection Using Extreme Gradient Boosting Machine. In 2022 11th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1--6.","author":"Anjum Afia","year":"2022","unstructured":"Afia Anjum, Paul Agbaje, Sena Hounsinou, and Habeeb Olufowobi. 2022. In-Vehicle Network Anomaly Detection Using Extreme Gradient Boosting Machine. In 2022 11th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1--6."},{"key":"e_1_3_2_1_5_1","volume-title":"A secure authentication protocol for internet of vehicles. Ieee Access 7","author":"Chen Chien-Ming","year":"2019","unstructured":"Chien-Ming Chen, Bin Xiang, Yining Liu, and King-Hang Wang. 2019. A secure authentication protocol for internet of vehicles. Ieee Access 7 (2019)."},{"key":"e_1_3_2_1_6_1","volume-title":"Conference on Learning Theory. PMLR, 176--196","author":"Gaillard Pierre","year":"2014","unstructured":"Pierre Gaillard, Gilles Stoltz, and Tim Van Erven. 2014. A second-order bound with excess losses. In Conference on Learning Theory. PMLR, 176--196."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544422"},{"key":"e_1_3_2_1_8_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_9_1","volume-title":"Gopi Ramasamy, A Hariharasudan, et al.","author":"Karthiga B","year":"2022","unstructured":"B Karthiga, Danalakshmi Durairaj, Nishad Nawaz, Thiruppathy Kesavan Venkatasamy, Gopi Ramasamy, A Hariharasudan, et al. 2022. Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches. Wireless Communications and Mobile Computing (2022)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3028368"},{"key":"e_1_3_2_1_12_1","volume-title":"An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458","author":"O'Shea Keiron","year":"2015","unstructured":"Keiron O'Shea and Ryan Nash. 2015. An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015)."},{"key":"e_1_3_2_1_13_1","volume-title":"Sami Bourouis, Wajdi Alhakami, Jude Osamor, and Mounir Hamdi.","author":"Rathore Manjari Singh","year":"2022","unstructured":"Manjari Singh Rathore, M Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor, and Mounir Hamdi. 2022. A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering 102 (2022)."},{"key":"e_1_3_2_1_14_1","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018), 108--116.","journal-title":"ICISSp"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703272"},{"key":"e_1_3_2_1_16_1","volume-title":"A survey on internet of vehicles: Applications, security issues & solutions. Vehicular Communications","author":"Sharma Surbhi","year":"2019","unstructured":"Surbhi Sharma and Baijnath Kaushik. 2019. A survey on internet of vehicles: Applications, security issues & solutions. Vehicular Communications (2019)."},{"volume-title":"Tree-based intelligent intrusion detection system in internet of vehicles. In 2019 IEEE global communications conference (GLOBECOM)","author":"Yang Li","key":"e_1_3_2_1_17_1","unstructured":"Li Yang, Abdallah Moubayed, Ismail Hamieh, and Abdallah Shami. 2019. Tree-based intelligent intrusion detection system in internet of vehicles. In 2019 IEEE global communications conference (GLOBECOM). IEEE, 1--6."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2899062"}],"event":{"name":"BDCAT '23: IEEE\/ACM 10th International Conference on Big Data Computing, Applications and Technologies","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC"],"location":"Taormina (Messina) Italy","acronym":"BDCAT '23"},"container-title":["Proceedings of the IEEE\/ACM 10th International Conference on Big Data Computing, Applications and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632366.3632388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632366.3632388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:45:43Z","timestamp":1750178743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632366.3632388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":19,"alternative-id":["10.1145\/3632366.3632388","10.1145\/3632366"],"URL":"https:\/\/doi.org\/10.1145\/3632366.3632388","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2024-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}