{"id":"https://openalex.org/W7139076781","doi":"https://doi.org/10.1109/globecom59602.2025.11431806","title":"HyFIDS: Hybrid Frequency-Aware Lightweight Intrusion Detection for Internet of Vehicles","display_name":"HyFIDS: Hybrid Frequency-Aware Lightweight Intrusion Detection for Internet of Vehicles","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7139076781","doi":"https://doi.org/10.1109/globecom59602.2025.11431806"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11431806","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431806","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102699803","display_name":"Jie Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jie Cao","raw_affiliation_strings":["Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023378727","display_name":"Z. Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Zeling Zhang","raw_affiliation_strings":["Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033931001","display_name":"Jianbing Ni","orcid":"https://orcid.org/0000-0002-5639-0883"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129933981","display_name":"Mohammad Zulkernine","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Zulkernine","raw_affiliation_strings":["Queen&#x2019;s University,School of Computing,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,School of Computing,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102699803"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.68096621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"6069","last_page":"6074"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.7803999781608582,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.7803999781608582,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.07039999961853027,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.01889999955892563,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8095999956130981},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6087999939918518},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5695000290870667},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5439000129699707},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5321999788284302},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5005000233650208},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4884999990463257},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4115999937057495}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8095999956130981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7760999798774719},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6087999939918518},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5695000290870667},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5439000129699707},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5321999788284302},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5005000233650208},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4884999990463257},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4284999966621399},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4221000075340271},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4115999937057495},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41019999980926514},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3903999924659729},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3427000045776367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3107999861240387},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3034000098705292},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2976999878883362},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.29260000586509705},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.2784999907016754},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.26159998774528503},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.26080000400543213},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11431806","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431806","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2959120033","https://openalex.org/W3164317619","https://openalex.org/W4200347975","https://openalex.org/W4220775946","https://openalex.org/W4224315052","https://openalex.org/W4294860585","https://openalex.org/W4308605894","https://openalex.org/W4312648203","https://openalex.org/W4320002750","https://openalex.org/W4393371881","https://openalex.org/W4396707597","https://openalex.org/W4397000731","https://openalex.org/W4399268473","https://openalex.org/W4401507702"],"related_works":[],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDSs)":[3],"play":[4],"a":[5,66,85,137,144],"crucial":[6],"role":[7],"in":[8],"the":[9,23,44,153],"Internet":[10],"of":[11,49,99,141,156],"Vehicles":[12],"(IoV)":[13],"by":[14],"safeguarding":[15],"against":[16],"reliability":[17],"and":[18,26,52,96,103,128,151],"security":[19],"threats":[20],"arising":[21],"from":[22],"growing":[24],"complexity":[25],"interconnectivity.":[27],"However,":[28],"existing":[29],"deep":[30],"learning":[31],"(DL)-based":[32],"IDSs,":[33],"particularly":[34],"those":[35],"relying":[36],"on":[37,121],"resource-intensive":[38],"architectures,":[39],"often":[40],"fail":[41],"to":[42,54,93],"meet":[43],"limited":[45],"computational":[46,112],"resource":[47],"constraints":[48],"IoV":[50,74],"gateways":[51],"tend":[53],"overlook":[55],"real-world":[56],"deployment":[57],"considerations.":[58],"To":[59,114],"address":[60],"these":[61],"challenges,":[62],"we":[63,118],"propose":[64],"HyFIDS,":[65],"hybrid":[67],"frequency-aware":[68,87],"lightweight":[69,145],"intrusion":[70],"detection":[71,139],"system,":[72],"for":[73],"ecosystems.":[75],"HyFIDS":[76,92,120,135],"integrates":[77],"raw":[78],"packet":[79],"representations":[80,83],"with":[81,147],"frequency-domain":[82],"through":[84],"novel":[86],"module.":[88],"This":[89],"design":[90],"enables":[91],"extract":[94],"temporal":[95],"spectral":[97],"features":[98],"both":[100,126],"CAN":[101],"frames":[102],"IP":[104],"packets,":[105],"thereby":[106],"enhancing":[107],"representational":[108],"efficiency":[109],"while":[110],"maintaining":[111],"lightweightness.":[113],"validate":[115],"its":[116],"performance,":[117],"implement":[119],"four":[122],"benchmark":[123],"datasets":[124],"encompassing":[125],"inter-vehicle":[127],"intra-vehicle":[129],"scenarios.":[130],"Extensive":[131],"experiments":[132],"demonstrate":[133],"that":[134],"achieves":[136],"high":[138],"accuracy":[140],"99.98%,":[142],"maintains":[143],"model":[146],"only":[148],"20K":[149],"MACs,":[150],"obtains":[152],"highest":[154],"throughput":[155],"8.9":[157],"Mbps.":[158]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
