{"id":"https://openalex.org/W4207064815","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9682145","title":"Signature-Over-The-Air with Transfer Learning IDS for Intelligent Connected Vehicles (ICV)","display_name":"Signature-Over-The-Air with Transfer Learning IDS for Intelligent Connected Vehicles (ICV)","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4207064815","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9682145"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshps52748.2021.9682145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9682145","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014662198","display_name":"Yazan Otoum","orcid":"https://orcid.org/0000-0002-5500-3060"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Yazan Otoum","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of Ottawa, Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048076896","display_name":"Amiya Nayak","orcid":"https://orcid.org/0000-0002-4605-0500"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amiya Nayak","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of Ottawa, Canada","institution_ids":["https://openalex.org/I153718931"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014662198"],"corresponding_institution_ids":["https://openalex.org/I153718931"],"apc_list":null,"apc_paid":null,"fwci":3.696,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.9477482,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7564613819122314},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6152819991111755},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5625438094139099},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.5587509870529175},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5287584662437439},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.5048633217811584},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5046583414077759},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.501523494720459},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4805643856525421},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.44563719630241394},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.42071929574012756},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4173443019390106},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4121151268482208},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37807199358940125},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3256164789199829},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2583455443382263},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14774218201637268},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09300374984741211}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7564613819122314},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6152819991111755},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5625438094139099},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.5587509870529175},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5287584662437439},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.5048633217811584},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5046583414077759},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.501523494720459},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4805643856525421},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.44563719630241394},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.42071929574012756},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4173443019390106},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4121151268482208},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37807199358940125},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3256164789199829},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2583455443382263},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14774218201637268},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09300374984741211},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshps52748.2021.9682145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9682145","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2296701710","https://openalex.org/W2320855162","https://openalex.org/W2752900269","https://openalex.org/W2765274696","https://openalex.org/W2789828921","https://openalex.org/W2897929592","https://openalex.org/W2947832965","https://openalex.org/W2973024821","https://openalex.org/W2981094074","https://openalex.org/W2989230094","https://openalex.org/W2993017767","https://openalex.org/W3007690081","https://openalex.org/W3009513989","https://openalex.org/W3041133507","https://openalex.org/W3094068407","https://openalex.org/W3123346250","https://openalex.org/W3135091917","https://openalex.org/W4251386558"],"related_works":["https://openalex.org/W3172840274","https://openalex.org/W50122730","https://openalex.org/W2245533262","https://openalex.org/W3129811130","https://openalex.org/W2265547225","https://openalex.org/W3185731761","https://openalex.org/W4292158217","https://openalex.org/W4379616178","https://openalex.org/W2181543702","https://openalex.org/W1486231179"],"abstract_inverted_index":{"Intelligent":[0],"Connected":[1],"Vehicles":[2],"(ICV)":[3],"are":[4,69],"considered":[5],"the":[6,17,28,50,59,72,76,79,94,100,117,129,140,151,174],"promising":[7],"technology":[8],"that":[9,68,113,173],"will":[10,107],"replace":[11],"traditional":[12],"vehicles":[13,98],"soon,":[14],"especially":[15],"with":[16,164],"improvement":[18],"in":[19,58,71,85,180],"automation":[20],"and":[21,35,52,91,120,154,189],"network":[22,95],"technologies.":[23],"This":[24,39],"gives":[25],"rise":[26],"to":[27,48,93,115,123,138],"possibility":[29],"of":[30,78,96,142,182],"new":[31,80],"cyberattacks,":[32],"including":[33],"intra-":[34],"inter-vehicle":[36],"communication":[37],"attacks.":[38],"paper":[40],"proposed":[41,175],"an":[42],"infrastructure-independent,":[43],"Intrusion":[44],"Detection":[45,185],"System":[46],"(IDS)":[47],"secure":[49],"Intra-Vehicles":[51],"external":[53],"networks.":[54],"The":[55,162],"anomaly-based":[56],"IDS":[57],"model":[60,149,176],"is":[61,136],"assisted":[62],"by":[63],"a":[64,86,110,124,143,156],"blacklist":[65],"attacks":[66,81,118],"signatures":[67,77],"placed":[70],"connected":[73,97],"vehicles,":[74],"where":[75],"can":[82],"be":[83],"generated":[84],"cloud-based":[87],"security":[88],"management":[89],"system":[90],"updated":[92],"using":[99],"over-the-air-update":[101],"concept,":[102],"so":[103],"each":[104],"network-connected":[105],"vehicle":[106],"work":[108],"as":[109],"packet":[111],"inspector":[112],"helps":[114],"find":[116],"log":[119],"add":[121],"it":[122],"cloud":[125],"signature":[126],"database.":[127],"In":[128],"detection":[130],"engine,":[131],"Self-taught":[132],"Transfer":[133],"Learning":[134],"(STL)":[135],"used":[137],"transfer":[139],"knowledge":[141],"pre-trained":[144],"Deep":[145,158],"Belief":[146],"Network":[147,160],"(DBN)":[148],"from":[150],"source":[152],"domain":[153],"construct":[155],"feed-forward":[157],"Neural":[159],"(DNN).":[161],"comparison":[163],"baseline":[165],"machine":[166],"learning":[167,169],"(ML)/deep":[168],"(DL)":[170],"algorithms":[171],"shows":[172],"achieves":[177],"better":[178],"performance":[179],"terms":[181],"Accuracy,":[183],"Precision,":[184],"Rate":[186],"(DR),":[187],"F1-score,":[188],"Receiver":[190],"Operating":[191],"Characteristic":[192],"(ROC).":[193]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
