{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:47:51Z","timestamp":1776358071610,"version":"3.51.2"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100013061","name":"Jilin Provincial Scientific and Technological Development Program","doi-asserted-by":"publisher","award":["20210101166JC"],"award-info":[{"award-number":["20210101166JC"]}],"id":[{"id":"10.13039\/501100013061","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Changsha Automobile Innovation Research Institute Free Exploration Program","award":["CAIRIZT20220104"],"award-info":[{"award-number":["CAIRIZT20220104"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Anomaly detection in the Controller Area Network (CAN) bus is critical for ensuring the security and reliability of intelligent connected vehicles, which are increasingly prevalent. While existing anomaly detection strategies offer some benefits, they often face challenges such as limited feature extraction and data imbalance, which reduce their effectiveness. To address these issues, in this paper, we propose an unsupervised intrusion detection method based on CAN message graph named CGTS. Specifically, we first construct a message graph based on CAN message sequences. A Graph Transformer is then employed to extract complex structural information, accurately capturing the intrinsic connections between messages. Furthermore, to address the data imbalance problem, we integrate the Support Vector Data Description algorithm after the Graph Transformer model. This algorithm identifies anomalous behaviors efficiently without relying on a priori labels. Experiments conducted on public datasets, including Car-Hacking and CAN-Train-and-Test, demonstrate the efficacy of CGTS. The model achieves an average accuracy exceeding 0.990, precision above 0.995, and an F1-score nearing 0.993. These results highlight CGTS can effectively detect multiple injection attacks and significantly improve the CAN bus intrusion detection performance.<\/jats:p>","DOI":"10.1186\/s42400-025-00365-6","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:01:58Z","timestamp":1755738118000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CGTS: graph transformer-based anomaly detection in controller area networks"],"prefix":"10.1186","volume":"8","author":[{"given":"Xue","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Guihe","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Yanhua","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Jiaru","family":"Song","sequence":"additional","affiliation":[]},{"given":"Wanning","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qingxin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"key":"365_CR1","doi-asserted-by":"publisher","unstructured":"Altalbe A (2024) Enhanced intrusion detection in in-vehicle networks using advanced feature fusion and stacking-enriched learning. In: IEEE Access 12, 2045\u20132056 https:\/\/doi.org\/10.1109\/ACCESS.2023.3347619","DOI":"10.1109\/ACCESS.2023.3347619"},{"issue":"8","key":"365_CR2","doi-asserted-by":"publisher","first-page":"5081","DOI":"10.1109\/TITS.2020.3046974","volume":"22","author":"F Amato","year":"2021","unstructured":"Amato F, Coppolino L, Mercaldo F, Moscato F, Nardone R, Santone A (2021) Can-bus attack detection with deep learning. IEEE Trans Intell Transp Syst 22(8):5081\u20135090. https:\/\/doi.org\/10.1109\/TITS.2020.3046974","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"365_CR3","doi-asserted-by":"crossref","unstructured":"Bi Z, Xu G, Xu G, Tian M, Jiang R, Zhang S (2022) Intrusion detection method for in-vehicle can bus based on message and time transfer matrix. In: Security and communication networks","DOI":"10.1155\/2022\/2554280"},{"key":"365_CR4","doi-asserted-by":"crossref","unstructured":"Bozdal M, Samie M, Aslam S, Jennions IK (2020) Evaluation of can bus security challenges. Sensors (Basel, Switzerland) 20","DOI":"10.3390\/s20082364"},{"issue":"10","key":"365_CR5","doi-asserted-by":"publisher","first-page":"7925","DOI":"10.1109\/JIOT.2020.3041860","volume":"8","author":"J Cui","year":"2021","unstructured":"Cui J, Chen X, Zhang J, Zhang Q, Zhong H (2021) Toward achieving fine-grained access control of data in connected and autonomous vehicles. IEEE Internet Things J 8(10):7925\u20137937. https:\/\/doi.org\/10.1109\/JIOT.2020.3041860","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"365_CR6","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TITS.2021.3088998","volume":"23","author":"A Derhab","year":"2022","unstructured":"Derhab A, Belaoued M, Mohiuddin I, Kurniawan F, Khan MK (2022) Histogram-based intrusion detection and filtering framework for secure and safe in-vehicle networks. IEEE Trans Intell Transp Syst 23(3):2366\u20132379. https:\/\/doi.org\/10.1109\/TITS.2021.3088998","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"3","key":"365_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MNET.2024.3367303","volume":"38","author":"L Du","year":"2024","unstructured":"Du L, Gu Z, Wang Y, Gao C (2024) Open world intrusion detection: an open set recognition method for can bus in intelligent connected vehicles. IEEE Network 38(3):76\u201382. https:\/\/doi.org\/10.1109\/MNET.2024.3367303","journal-title":"IEEE Network"},{"issue":"2","key":"365_CR8","doi-asserted-by":"publisher","first-page":"2122","DOI":"10.1109\/TITS.2021.3128634","volume":"24","author":"X Duan","year":"2023","unstructured":"Duan X, Yan H, Tian D, Zhou J, Su J, Hao W (2023) In-vehicle can bus tampering attacks detection for connected and autonomous vehicles using an improved isolation forest method. IEEE Trans Intell Transp Syst 24(2):2122\u20132134. https:\/\/doi.org\/10.1109\/TITS.2021.3128634","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"365_CR9","unstructured":"Dwivedi VP, Bresson X (2021) A generalization of transformer networks to graphs . https:\/\/arxiv.org\/abs\/2012.09699"},{"key":"365_CR10","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.1007\/s10115-022-01709-1","volume":"64","author":"E Elahi","year":"2022","unstructured":"Elahi E, Halim Z (2022) Graph attention-based collaborative filtering for user-specific recommender system using knowledge graph and deep neural networks. Knowl Inf Syst 64:2457\u20132480","journal-title":"Knowl Inf Syst"},{"key":"365_CR11","doi-asserted-by":"publisher","unstructured":"Gong L-H, Ding W, Li Z, Wang Y-Z, Zhou N-R (2024) Quantum k-nearest neighbor classification algorithm via a divide-and-conquer strategy. Advanced Quantum Technologies 7(6):2300221. https:\/\/doi.org\/10.1002\/qute.202300221https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/qute.202300221","DOI":"10.1002\/qute.202300221"},{"key":"365_CR12","unstructured":"Greenberg A (2018) Hackers can steal a tesla model s in seconds by cloning its key fob. Wired Magazine 10 . Accessed: 2024-11-08"},{"key":"365_CR13","unstructured":"HPL SC (2002) Introduction to the controller area network (CAN). In: Application report SLOA101"},{"issue":"2","key":"365_CR14","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TVT.2019.2961765","volume":"69","author":"HJ Jo","year":"2020","unstructured":"Jo HJ, Kim JH, Choi H-Y, Choi W, Lee DH, Lee I (2020) Mauth-can: masquerade-attack-proof authentication for in-vehicle networks. IEEE Trans Veh Technol 69(2):2204\u20132218. https:\/\/doi.org\/10.1109\/TVT.2019.2961765","journal-title":"IEEE Trans Veh Technol"},{"key":"365_CR15","doi-asserted-by":"publisher","unstructured":"Khandelwal S, Wadhwa E, Shreejith S (2022) Deep learning-based embedded intrusion detection system for automotive can. In: 2022 IEEE 33rd international conference on application-specific systems, architectures and processors (ASAP), pp. 88\u201392 . https:\/\/doi.org\/10.1109\/ASAP54787.2022.00023","DOI":"10.1109\/ASAP54787.2022.00023"},{"key":"365_CR16","doi-asserted-by":"crossref","unstructured":"Kidmose B, Meng W (2024) can-sleuth: Investigating and evaluating automotive intrusion detection datasets. In: Proceedings of the 2024 European interdisciplinary cybersecurity conference","DOI":"10.1145\/3655693.3655696"},{"key":"365_CR17","doi-asserted-by":"publisher","unstructured":"Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S (2010) Experimental security analysis of a modern automobile. In: 2010 IEEE symposium on security and privacy, pp. 447\u2013462 . https:\/\/doi.org\/10.1109\/SP.2010.34","DOI":"10.1109\/SP.2010.34"},{"issue":"4","key":"365_CR18","doi-asserted-by":"publisher","first-page":"4701","DOI":"10.1109\/TNSM.2024.3391250","volume":"21","author":"Y Lai","year":"2024","unstructured":"Lai Y, Yu Y, Guan W, Luo L, Fan J, Zhou N, Ping Y (2024) A lightweight intrusion detection system using a finite dirichlet mixture model with extended stochastic variational inference. IEEE Trans Netw Serv Manage 21(4):4701\u20134712. https:\/\/doi.org\/10.1109\/TNSM.2024.3391250","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"365_CR19","doi-asserted-by":"publisher","unstructured":"Lampe B, Meng W (2023) can-train-and-test: A new can intrusion detection dataset. In: 2023 IEEE 98th vehicular technology conference (VTC2023-Fall), pp. 1\u20137 . https:\/\/doi.org\/10.1109\/VTC2023-Fall60731.2023.10333756","DOI":"10.1109\/VTC2023-Fall60731.2023.10333756"},{"issue":"5","key":"365_CR20","doi-asserted-by":"publisher","first-page":"3359","DOI":"10.1109\/JIOT.2021.3098221","volume":"9","author":"X Li","year":"2022","unstructured":"Li X, Zhang H, Miao Y, Ma S, Ma J, Liu X, Choo K-KR (2022) Can bus messages abnormal detection using improved svdd in internet of vehicles. IEEE Internet Things J 9(5):3359\u20133371. https:\/\/doi.org\/10.1109\/JIOT.2021.3098221","journal-title":"IEEE Internet Things J"},{"key":"365_CR21","doi-asserted-by":"crossref","unstructured":"Luo J-N, Wu C-M, Yang M-H (2021) A can-bus lightweight authentication scheme. Sensors (Basel, Switzerland) 21","DOI":"10.3390\/s21217069"},{"issue":"4","key":"365_CR22","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1109\/TIFS.2018.2870826","volume":"14","author":"M Marchetti","year":"2019","unstructured":"Marchetti M, Stabili D (2019) Read: Reverse engineering of automotive data frames. IEEE Trans Inf Forensics Secur 14(4):1083\u20131097. https:\/\/doi.org\/10.1109\/TIFS.2018.2870826","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"365_CR23","doi-asserted-by":"crossref","unstructured":"Martinelli F, Mercaldo F, Nardone V, Orlando A, Santone A (2018) Who\u2019s driving my car? a machine learning based approach to driver identification. In: International conference on information systems security and privacy . https:\/\/api.semanticscholar.org\/CorpusID:4707843","DOI":"10.5220\/0006633403670372"},{"key":"365_CR24","doi-asserted-by":"publisher","unstructured":"Meng Y, Li J, Liu F, Li S, Hu H, Zhu H(2023) Gb-ids: An intrusion detection system for can bus based on graph analysis. In: 2023 IEEE\/CIC international conference on communications in China (ICCC), pp. 1\u20136 . https:\/\/doi.org\/10.1109\/ICCC57788.2023.10233123","DOI":"10.1109\/ICCC57788.2023.10233123"},{"key":"365_CR25","doi-asserted-by":"publisher","unstructured":"Micale D, Costantino G, Matteucci I, Fenzl F, Rieke R, Patan\u00e8 G (2022) Cahoot: a context-aware vehicular intrusion detection system. In: 2022 IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp. 1211\u20131218 . https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00168","DOI":"10.1109\/TrustCom56396.2022.00168"},{"issue":"7","key":"365_CR26","doi-asserted-by":"publisher","first-page":"7078","DOI":"10.1109\/TVT.2020.2989808","volume":"69","author":"H Mun","year":"2020","unstructured":"Mun H, Han K, Lee DH (2020) Ensuring safety and security in can-based automotive embedded systems: a combination of design optimization and secure communication. IEEE Trans Veh Technol 69(7):7078\u20137091. https:\/\/doi.org\/10.1109\/TVT.2020.2989808","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"365_CR27","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1109\/TVT.2019.2961344","volume":"69","author":"H Olufowobi","year":"2020","unstructured":"Olufowobi H, Young C, Zambreno J, Bloom G (2020) Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing. IEEE Trans Veh Technol 69(2):1484\u20131494. https:\/\/doi.org\/10.1109\/TVT.2019.2961344","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"365_CR28","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1109\/TVT.2019.2961344","volume":"69","author":"H Olufowobi","year":"2020","unstructured":"Olufowobi H, Young C, Zambreno J, Bloom G (2020) Saiducant: specification-based automotive intrusion detection using controller area network (can) timing. IEEE Trans Veh Technol 69(2):1484\u20131494. https:\/\/doi.org\/10.1109\/TVT.2019.2961344","journal-title":"IEEE Trans Veh Technol"},{"key":"365_CR29","doi-asserted-by":"publisher","unstructured":"Qin G, Zhou Y, Yan J, Chen J, Rao B, Li P (2022) Intrusion detection framework for in-vehicle network combining time features and data features. In: 2022 IEEE\/CIC international conference on communications in China (ICCC), pp. 985\u2013990 . https:\/\/doi.org\/10.1109\/ICCC55456.2022.9880704","DOI":"10.1109\/ICCC55456.2022.9880704"},{"key":"365_CR30","doi-asserted-by":"publisher","unstructured":"Refat RUD, Elkhail AA, Malik H (2022) A lightweight intrusion detection system for can protocol using neighborhood similarity. In: 2022 7th International conference on data science and machine learning applications (CDMA), pp. 121\u2013126 . https:\/\/doi.org\/10.1109\/CDMA54072.2022.00025","DOI":"10.1109\/CDMA54072.2022.00025"},{"key":"365_CR31","unstructured":"Ruff L, G\u00f6rnitz N, Deecke L, Siddiqui SA, Vandermeulen RA, Binder A, M\u00fcller E, Kloft M (2018) Deep one-class classification. In: International conference on machine learning . https:\/\/api.semanticscholar.org\/CorpusID:49312162"},{"key":"365_CR32","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/TCBB.2022.3225234","volume":"21","author":"H Saadat","year":"2022","unstructured":"Saadat H, Shah B, Halim Z, Anwar S (2022) Knowledge graph-based convolutional network coupled with sentiment analysis towards enhanced drug recommendation. IEEE\/ACM Trans Comput Biol Bioinf 21:983\u2013994","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"issue":"7","key":"365_CR33","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443\u20131471. https:\/\/doi.org\/10.1162\/089976601750264965","journal-title":"Neural Comput"},{"key":"365_CR34","doi-asserted-by":"publisher","unstructured":"Seo E, Song HM, Kim HK (2018) Gids: Gan based intrusion detection system for in-vehicle network. In: 2018 16th annual conference on privacy, security and trust (PST), pp. 1\u20136 . https:\/\/doi.org\/10.1109\/PST.2018.8514157","DOI":"10.1109\/PST.2018.8514157"},{"issue":"2","key":"365_CR35","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TVT.2021.3051026","volume":"70","author":"HM Song","year":"2021","unstructured":"Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098\u20131108. https:\/\/doi.org\/10.1109\/TVT.2021.3051026","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"365_CR36","doi-asserted-by":"publisher","first-page":"11540","DOI":"10.1109\/TVT.2022.3190721","volume":"71","author":"D Stabili","year":"2022","unstructured":"Stabili D, Ferretti L, Andreolini M, Marchetti M (2022) Daga: Detecting attacks to in-vehicle networks via n-gram analysis. IEEE Trans Veh Technol 71(11):11540\u201311554. https:\/\/doi.org\/10.1109\/TVT.2022.3190721","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"365_CR37","doi-asserted-by":"publisher","first-page":"10880","DOI":"10.1109\/TVT.2021.3106940","volume":"70","author":"H Sun","year":"2021","unstructured":"Sun H, Chen M, Weng J, Liu Z, Geng G (2021) Anomaly detection for in-vehicle network using cnn-lstm with attention mechanism. IEEE Trans Veh Technol 70(10):10880\u201310893. https:\/\/doi.org\/10.1109\/TVT.2021.3106940","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"365_CR38","doi-asserted-by":"publisher","first-page":"10426","DOI":"10.1109\/TVT.2022.3185111","volume":"71","author":"H Sun","year":"2022","unstructured":"Sun H, Sun M, Weng J, Liu Z (2022) Analysis of id sequences similarity using dtw in intrusion detection for can bus. IEEE Trans Veh Technol 71(10):10426\u201310441. https:\/\/doi.org\/10.1109\/TVT.2022.3185111","journal-title":"IEEE Trans Veh Technol"},{"key":"365_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DMJ Tax","year":"2004","unstructured":"Tax DMJ, Duin RPW (2004) Support vector data description. Mach Learn 54:45\u201366","journal-title":"Mach Learn"},{"key":"365_CR40","doi-asserted-by":"publisher","unstructured":"Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International conference on data science and advanced analytics (DSAA), pp. 130\u2013139 . https:\/\/doi.org\/10.1109\/DSAA.2016.20","DOI":"10.1109\/DSAA.2016.20"},{"key":"365_CR41","unstructured":"Upstream Auto (2021) Upstream security\u2019s 2021 global automotive cybersecurity report. [Online]. Available: https:\/\/upstream.auto\/2021report\/"},{"key":"365_CR42","unstructured":"Vaswani A, Shazeer NM, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. In: Neural information processing systems . https:\/\/api.semanticscholar.org\/CorpusID:13756489"},{"key":"365_CR43","doi-asserted-by":"publisher","unstructured":"Wang H, Xue Y, Qu Y, Mu X, Ma H (2022) Multidimensional bose quantum error correction based on neural network decoder. npj Quantum Information 8(1), 134 https:\/\/doi.org\/10.1038\/s41534-022-00650-z","DOI":"10.1038\/s41534-022-00650-z"},{"issue":"12","key":"365_CR44","doi-asserted-by":"publisher","first-page":"14051","DOI":"10.1109\/TITS.2023.3294349","volume":"24","author":"CS Wickramasinghe","year":"2023","unstructured":"Wickramasinghe CS, Marino DL, Mavikumbure HS, Cobilean V, Pennington TD, Varghese BJ, Rieger C, Manic M (2023) Rx-ads: Interpretable anomaly detection using adversarial ml for electric vehicle can data. IEEE Trans Intell Transp Syst 24(12):14051\u201314063. https:\/\/doi.org\/10.1109\/TITS.2023.3294349","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"3","key":"365_CR45","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TITS.2019.2908074","volume":"21","author":"W Wu","year":"2020","unstructured":"Wu W, Li R, Xie G, An J, Bai Y, Zhou J, Li K (2020) A survey of intrusion detection for in-vehicle networks. IEEE Trans Intell Transp Syst 21(3):919\u2013933. https:\/\/doi.org\/10.1109\/TITS.2019.2908074","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"365_CR46","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2021","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Yu PS (2021) A comprehensive survey on graph neural networks. IEEE Transa Neural Netw Learn Sys 32(1):4\u201324. https:\/\/doi.org\/10.1109\/TNNLS.2020.2978386","journal-title":"IEEE Transa Neural Netw Learn Sys"},{"key":"365_CR47","doi-asserted-by":"publisher","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","volume":"10","author":"Z Wu","year":"2022","unstructured":"Wu Z, Zhang H, Wang P, Sun Z (2022) Rtids: a robust transformer-based approach for intrusion detection system. IEEE Access 10:64375\u201364387. https:\/\/doi.org\/10.1109\/ACCESS.2022.3182333","journal-title":"IEEE Access"},{"issue":"1","key":"365_CR48","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/JSYST.2023.3337091","volume":"18","author":"J Xiao","year":"2024","unstructured":"Xiao J, Chen H, Zhong F (2024) A novel feature extraction framework using graph node attention network for in-vehicle networks intrusion detection. IEEE Syst J 18(1):150\u2013161. https:\/\/doi.org\/10.1109\/JSYST.2023.3337091","journal-title":"IEEE Syst J"},{"issue":"3","key":"365_CR49","doi-asserted-by":"publisher","first-page":"2124","DOI":"10.1109\/JIOT.2021.3090397","volume":"9","author":"Y Xun","year":"2022","unstructured":"Xun Y, Zhao Y, Liu J (2022) Vehicleeids: a novel external intrusion detection system based on vehicle voltage signals. IEEE Internet Things J 9(3):2124\u20132133. https:\/\/doi.org\/10.1109\/JIOT.2021.3090397","journal-title":"IEEE Internet Things J"},{"key":"365_CR50","doi-asserted-by":"crossref","unstructured":"Yang J, Hu J, Yu T (2022) Federated ai-enabled in-vehicle network intrusion detection for internet of vehicles. Electronics","DOI":"10.3390\/electronics11223658"},{"issue":"2","key":"365_CR51","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1109\/TII.2022.3202539","volume":"19","author":"Z Yu","year":"2023","unstructured":"Yu Z, Liu Y, Xie G, Li R, Liu S, Yang LT (2023) Tce-ids: time interval conditional entropy- based intrusion detection system for automotive controller area networks. IEEE Trans Industr Inf 19(2):1185\u20131195. https:\/\/doi.org\/10.1109\/TII.2022.3202539","journal-title":"IEEE Trans Industr Inf"},{"key":"365_CR52","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.future.2021.05.039","volume":"125","author":"H Yu","year":"2021","unstructured":"Yu H, Yang Z, Waqas MM, Tu S, Han Z, Halim Z, Sinnott RO, Udaya P (2021) Efficient dynamic multi-replica auditing for the cloud with geographic location. Future Gener. Comput. Syst. 125:285\u2013298","journal-title":"Future Gener. Comput. Syst."},{"key":"365_CR53","doi-asserted-by":"publisher","unstructured":"Yu T, Hua G, Wang H, Yang J, Hu J (2022) Federated-lstm based network intrusion detection method for intelligent connected vehicles. In: ICC 2022 - IEEE international conference on communications, pp. 4324\u20134329 . https:\/\/doi.org\/10.1109\/ICC45855.2022.9838655","DOI":"10.1109\/ICC45855.2022.9838655"},{"key":"365_CR54","doi-asserted-by":"publisher","unstructured":"Zhang H, Zeng K, Lin S (2023) Federated graph neural network for fast anomaly detection in controller area networks. In: IEEE transactions on information forensics and security 18, 1566\u20131579 https:\/\/doi.org\/10.1109\/TIFS.2023.3240291","DOI":"10.1109\/TIFS.2023.3240291"},{"key":"365_CR55","doi-asserted-by":"publisher","unstructured":"Zhang M, Parsch P, Hoffmann H, Masrur A (2022) Analyzing can\u2019s timing under periodically authenticated encryption. In: 2022 design, automation & test in europe conference & exhibition (DATE), pp. 620\u2013623 . https:\/\/doi.org\/10.23919\/DATE54114.2022.9774712","DOI":"10.23919\/DATE54114.2022.9774712"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00365-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00365-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00365-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:02:16Z","timestamp":1755738136000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00365-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,21]]},"references-count":55,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["365"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00365-6","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,21]]},"assertion":[{"value":"25 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"62"}}