{"id":"https://openalex.org/W4285813938","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824972","title":"A novel machine learning based intrusion detection method for 5G empowered CBTC systems","display_name":"A novel machine learning based intrusion detection method for 5G empowered CBTC systems","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813938","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824972"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9824972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824972","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100318272","display_name":"Wei Li","orcid":"https://orcid.org/0000-0002-7586-4829"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wei Li","raw_affiliation_strings":["Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300"],"affiliations":[{"raw_affiliation_string":"Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087052818","display_name":"Zengwei Yan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zengwei Yan","raw_affiliation_strings":["Beijing Funengtong Technology Co., Ltd.,Beijing,China,100070"],"affiliations":[{"raw_affiliation_string":"Beijing Funengtong Technology Co., Ltd.,Beijing,China,100070","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101181535","display_name":"Renwei He","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Renwei He","raw_affiliation_strings":["Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300"],"affiliations":[{"raw_affiliation_string":"Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031328682","display_name":"Liming Zong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liming Zong","raw_affiliation_strings":["Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300"],"affiliations":[{"raw_affiliation_string":"Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102724834","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-7456-8377"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300"],"affiliations":[{"raw_affiliation_string":"Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113579200","display_name":"Yanjun Zhan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yanjun Zhan","raw_affiliation_strings":["Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300"],"affiliations":[{"raw_affiliation_string":"Beijing Metro Operation Co., Ltd. operates the fourth branch,Beijing,China,101300","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100318272"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8648,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66219394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"211","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8013687133789062},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6821708679199219},{"id":"https://openalex.org/keywords/train","display_name":"Train","score":0.6077067852020264},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.478715181350708},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4673220217227936},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4159892201423645},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4150676429271698},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27342867851257324}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8013687133789062},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6821708679199219},{"id":"https://openalex.org/C190839683","wikidata":"https://www.wikidata.org/wiki/Q2448197","display_name":"Train","level":2,"score":0.6077067852020264},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.478715181350708},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4673220217227936},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4159892201423645},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4150676429271698},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27342867851257324},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9824972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824972","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2793674903","https://openalex.org/W2807998075","https://openalex.org/W2973861572","https://openalex.org/W2990149989","https://openalex.org/W2997737012","https://openalex.org/W3033644518","https://openalex.org/W3092235791","https://openalex.org/W3133480057","https://openalex.org/W3209932493","https://openalex.org/W4206325035"],"related_works":["https://openalex.org/W618248309","https://openalex.org/W2377336366","https://openalex.org/W1568097102","https://openalex.org/W4390419160","https://openalex.org/W1601203902","https://openalex.org/W2075798043","https://openalex.org/W2102464536","https://openalex.org/W4225671779","https://openalex.org/W2361332776","https://openalex.org/W2072323338"],"abstract_inverted_index":{"Wireless":[0],"communication":[1],"is":[2,142],"the":[3,7,38,90,103,131,140,160,164,170,173,179,182,188],"basis":[4,171],"for":[5],"ensuring":[6],"safe":[8],"and":[9,27,113,129,144,153],"efficient":[10],"operation":[11],"of":[12,18,40,78,150,172,181,195],"rail":[13,41],"transit":[14],"trains.":[15],"The":[16,58,98,184],"advantages":[17],"5G":[19,44],"technology":[20],"such":[21,53,108],"as":[22,54,109],"high":[23,25,114],"reliability,":[24],"speed":[26],"low":[28,110],"latency":[29],"make":[30],"it":[31,81],"a":[32,191],"very":[33],"broad":[34],"application":[35],"prospect":[36],"in":[37,51],"field":[39],"transit.":[42],"However,":[43],"networks":[45],"also":[46],"face":[47],"corresponding":[48],"security":[49],"threats":[50],"application,":[52],"various":[55],"network":[56,67,88,133,155,196],"attacks.":[57],"communication-based":[59],"train":[60,159],"control":[61],"(CBTC)":[62],"systems":[63,93,105],"are":[64,156,167],"vulnerable":[65],"to":[66,73,86,102,158],"attacks,":[68],"which":[69],"can":[70,95],"easily":[71],"lead":[72],"emergency":[74],"braking":[75],"or":[76],"collision":[77],"trains":[79],"when":[80],"was":[82],"attacked.":[83],"In":[84,162],"order":[85],"protect":[87],"security,":[89],"intrusion":[91,122],"detection":[92,111,123,193],"(IDS)":[94],"be":[96],"used.":[97],"IDS":[99],"currently":[100],"applied":[101],"CBTC":[104],"have":[106,190],"problems":[107],"rate":[112],"false":[115],"rate.":[116],"Therefore,":[117],"this":[118],"paper":[119],"proposes":[120],"an":[121],"system":[124],"based":[125],"on":[126,169],"machine":[127],"learning,":[128],"simulates":[130],"real":[132],"environment":[134],"by":[135],"using":[136],"KDD99":[137],"data.":[138],"First,":[139],"data":[141],"preprocessed":[143],"feature":[145],"extracted.":[146],"Then":[147],"two":[148],"methods":[149],"decision":[151],"tree":[152],"neural":[154],"used":[157],"classifiers.":[161,175,183],"addition,":[163],"multiple":[165],"classifiers":[166,189],"trained":[168],"binary":[174],"Finally,":[176],"we":[177],"test":[178],"performance":[180],"results":[185],"show":[186],"that":[187],"good":[192],"accuracy":[194],"traffic.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
