{"id":"https://openalex.org/W4415018056","doi":"https://doi.org/10.1007/978-981-95-3072-4_1","title":"Research on\u00a0CAN Bus Intrusion Detection Method Based on\u00a0Feature Fusion of\u00a0Fourier Transform and\u00a0Wavelet Transform","display_name":"Research on\u00a0CAN Bus Intrusion Detection Method Based on\u00a0Feature Fusion of\u00a0Fourier Transform and\u00a0Wavelet Transform","publication_year":2025,"publication_date":"2025-10-10","ids":{"openalex":"https://openalex.org/W4415018056","doi":"https://doi.org/10.1007/978-981-95-3072-4_1"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-95-3072-4_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-3072-4_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114237950","display_name":"Z. L. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zixin Liu","raw_affiliation_strings":["School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109749109","display_name":"Xiangzhou Sun","orcid":"https://orcid.org/0009-0001-2440-3555"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangsen Sun","raw_affiliation_strings":["School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Qufu Normal University, Qufu, Shandong, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110134598","display_name":"Dingyi Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127530","display_name":"Jining University","ror":"https://ror.org/037rvh518","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210127530"]},{"id":"https://openalex.org/I51185872","display_name":"Jining Medical University","ror":"https://ror.org/03zn9gq54","country_code":"CN","type":"education","lineage":["https://openalex.org/I51185872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daohua Liu","raw_affiliation_strings":["Jining Internet Information Research Center, Jining, Shandong, China"],"affiliations":[{"raw_affiliation_string":"Jining Internet Information Research Center, Jining, Shandong, China","institution_ids":["https://openalex.org/I4210127530","https://openalex.org/I51185872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5114237950"],"corresponding_institution_ids":["https://openalex.org/I202126657"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46934281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.968999981880188,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5834000110626221},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.5698000192642212},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.554099977016449},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5390999913215637},{"id":"https://openalex.org/keywords/fourier-transform","display_name":"Fourier transform","score":0.4505000114440918},{"id":"https://openalex.org/keywords/short-time-fourier-transform","display_name":"Short-time Fourier transform","score":0.4146000146865845},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41359999775886536},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.40450000762939453},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.36550000309944153}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8862000107765198},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5834000110626221},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5702999830245972},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.5698000192642212},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.554099977016449},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5390999913215637},{"id":"https://openalex.org/C102519508","wikidata":"https://www.wikidata.org/wiki/Q6520159","display_name":"Fourier transform","level":2,"score":0.4505000114440918},{"id":"https://openalex.org/C166386157","wikidata":"https://www.wikidata.org/wiki/Q1477735","display_name":"Short-time Fourier transform","level":4,"score":0.4146000146865845},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41359999775886536},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.40450000762939453},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.36550000309944153},{"id":"https://openalex.org/C1109138","wikidata":"https://www.wikidata.org/wiki/Q3280930","display_name":"Harmonic wavelet transform","level":5,"score":0.3646000027656555},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3580999970436096},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3400999903678894},{"id":"https://openalex.org/C155777637","wikidata":"https://www.wikidata.org/wiki/Q2736187","display_name":"Wavelet packet decomposition","level":4,"score":0.32190001010894775},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.3176000118255615},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C95722684","wikidata":"https://www.wikidata.org/wiki/Q2622756","display_name":"Continuous wavelet transform","level":5,"score":0.30880001187324524},{"id":"https://openalex.org/C111350171","wikidata":"https://www.wikidata.org/wiki/Q7443700","display_name":"Second-generation wavelet transform","level":5,"score":0.29789999127388},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29739999771118164},{"id":"https://openalex.org/C76563020","wikidata":"https://www.wikidata.org/wiki/Q4817582","display_name":"Fractional Fourier transform","level":4,"score":0.29019999504089355},{"id":"https://openalex.org/C158525013","wikidata":"https://www.wikidata.org/wiki/Q2593739","display_name":"Fusion","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C199550912","wikidata":"https://www.wikidata.org/wiki/Q3238415","display_name":"Lifting scheme","level":5,"score":0.28060001134872437},{"id":"https://openalex.org/C73339587","wikidata":"https://www.wikidata.org/wiki/Q1375942","display_name":"Stationary wavelet transform","level":5,"score":0.27950000762939453},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C132736078","wikidata":"https://www.wikidata.org/wiki/Q338438","display_name":"Fast wavelet transform","level":5,"score":0.26499998569488525},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2624000012874603},{"id":"https://openalex.org/C75172450","wikidata":"https://www.wikidata.org/wiki/Q623950","display_name":"Fast Fourier transform","level":2,"score":0.26019999384880066}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-95-3072-4_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-3072-4_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2889068417","https://openalex.org/W2900068794","https://openalex.org/W2959120033","https://openalex.org/W2987793235","https://openalex.org/W3004207920","https://openalex.org/W3028335119","https://openalex.org/W3035990434","https://openalex.org/W3041766738","https://openalex.org/W3084487255","https://openalex.org/W3085008781","https://openalex.org/W3086419524","https://openalex.org/W3105105644","https://openalex.org/W3121116066","https://openalex.org/W4320002750","https://openalex.org/W4366377785","https://openalex.org/W4390241508","https://openalex.org/W4401845853"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
