{"id":"https://openalex.org/W7147904711","doi":"https://doi.org/10.1109/cnml68938.2026.11452324","title":"A Multimodal Intrusion Detection Method for Vehicular Networks Based on MobileNet V3 and Transformer","display_name":"A Multimodal Intrusion Detection Method for Vehicular Networks Based on MobileNet V3 and Transformer","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147904711","doi":"https://doi.org/10.1109/cnml68938.2026.11452324"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11452324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107951384","display_name":"JunYi Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I18570673","display_name":"Guangxi University of Science and Technology","ror":"https://ror.org/02fj6b627","country_code":"CN","type":"education","lineage":["https://openalex.org/I18570673"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junyi Deng","raw_affiliation_strings":["Guangxi University of Science and Technology; Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing,Department of Computer Science and Technology,Liuzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangxi University of Science and Technology; Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing,Department of Computer Science and Technology,Liuzhou,China","institution_ids":["https://openalex.org/I18570673"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108969248","display_name":"Zhengzhi Ni","orcid":null},"institutions":[{"id":"https://openalex.org/I18570673","display_name":"Guangxi University of Science and Technology","ror":"https://ror.org/02fj6b627","country_code":"CN","type":"education","lineage":["https://openalex.org/I18570673"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengzhi Ni","raw_affiliation_strings":["Guangxi University of Science and Technology; Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing,Department of Computer Science and Technology,Liuzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangxi University of Science and Technology; Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing,Department of Computer Science and Technology,Liuzhou,China","institution_ids":["https://openalex.org/I18570673"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056909078","display_name":"Jiayan Wen","orcid":"https://orcid.org/0000-0001-6905-8030"},"institutions":[{"id":"https://openalex.org/I18570673","display_name":"Guangxi University of Science and Technology","ror":"https://ror.org/02fj6b627","country_code":"CN","type":"education","lineage":["https://openalex.org/I18570673"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayan Wen","raw_affiliation_strings":["Guangxi University of Science and Technology; Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing,School of Automation; Research Center for Intelligent Cooperation and Cross-Application,Liuzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangxi University of Science and Technology; Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing,School of Automation; Research Center for Intelligent Cooperation and Cross-Application,Liuzhou,China","institution_ids":["https://openalex.org/I18570673"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5107951384"],"corresponding_institution_ids":["https://openalex.org/I18570673"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.93892476,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"234","last_page":"237"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.32409998774528503,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.32409998774528503,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.1995999962091446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.09929999709129333,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6575000286102295},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6532999873161316},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6362000107765198},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5264000296592712},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4016999900341034},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.3528999984264374},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3522999882698059},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3398999869823456}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7468000054359436},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6575000286102295},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6532999873161316},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6362000107765198},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5264000296592712},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4016999900341034},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.396699994802475},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.3528999984264374},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3522999882698059},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3465000092983246},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3398999869823456},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.3285999894142151},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3240000009536743},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.3125999867916107},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28450000286102295},{"id":"https://openalex.org/C84119951","wikidata":"https://www.wikidata.org/wiki/Q3498530","display_name":"Vehicle tracking system","level":3,"score":0.27570000290870667},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C104122410","wikidata":"https://www.wikidata.org/wiki/Q1416406","display_name":"Network model","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C79487989","wikidata":"https://www.wikidata.org/wiki/Q934680","display_name":"Vehicle dynamics","level":2,"score":0.2624000012874603}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11452324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2759891682","https://openalex.org/W2963000651","https://openalex.org/W2973454102","https://openalex.org/W2979202956","https://openalex.org/W4290996239","https://openalex.org/W4290996887","https://openalex.org/W4312767306","https://openalex.org/W4389298228","https://openalex.org/W4397000731","https://openalex.org/W4401246761","https://openalex.org/W4412862330"],"related_works":[],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,26,34,50,61,97,104],"internal":[3],"and":[4,12,30,90,99,118,124,131],"external":[5,128],"network":[6,20,46],"attack":[7,65],"threats":[8],"faced":[9],"by":[10],"intelligent":[11],"connected":[13],"vehicles,":[14],"this":[15],"paper":[16],"proposes":[17],"a":[18,74,79],"vehicular":[19,129],"intrusion":[21,133],"detection":[22,122],"method":[23,106],"based":[24],"on":[25,96],"combination":[27],"of":[28,63,88,115],"Transformer":[29,51],"MobileNet":[31,35],"V3.":[32],"Specifically,":[33],"V3":[36],"architecture":[37],"is":[38,53,82],"introduced":[39],"to":[40,55,68,84],"effectively":[41],"capture":[42],"spatial":[43,89],"features":[44],"from":[45],"traffic":[47],"data,":[48],"while":[49],"model":[52,56],"employed":[54],"temporal":[57,91],"dependencies,":[58],"thereby":[59],"enhancing":[60],"perception":[62],"dynamic":[64],"behaviors.":[66],"Furthermore,":[67],"fully":[69],"exploit":[70],"multi-source":[71],"feature":[72,75],"information,":[73],"fusion":[76],"module":[77],"with":[78],"weight-guided":[80],"mechanism":[81],"designed":[83],"achieve":[85],"collaborative":[86],"modeling":[87],"features.":[92],"Experimental":[93],"results":[94],"conducted":[95],"CICIDS-2017":[98],"Car-Hacking":[100],"datasets":[101],"demonstrate":[102],"that":[103],"proposed":[105],"outperforms":[107],"existing":[108],"mainstream":[109],"deep":[110],"learning":[111],"models":[112],"in":[113],"terms":[114],"accuracy,":[116],"recall,":[117],"F1-score,":[119],"indicating":[120],"superior":[121],"performance":[123],"robustness":[125],"across":[126],"both":[127],"networks":[130],"in-vehicle":[132],"scenarios.":[134]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
