{"id":"https://openalex.org/W4415125565","doi":"https://doi.org/10.1109/jiot.2025.3620567","title":"Defense Against Adversarial Samples for Replay Attacks in Automotive AVTP Streams via a Novel Bidirectional Mamba-Based Intrusion Detection System","display_name":"Defense Against Adversarial Samples for Replay Attacks in Automotive AVTP Streams via a Novel Bidirectional Mamba-Based Intrusion Detection System","publication_year":2025,"publication_date":"2025-10-13","ids":{"openalex":"https://openalex.org/W4415125565","doi":"https://doi.org/10.1109/jiot.2025.3620567"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3620567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3620567","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065781673","display_name":"HaiHang Zhao","orcid":"https://orcid.org/0009-0008-2847-9136"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haihang Zhao","raw_affiliation_strings":["School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007042802","display_name":"Yi Wang","orcid":"https://orcid.org/0000-0003-2957-4203"},"institutions":[{"id":"https://openalex.org/I4210102879","display_name":"Applied Materials (Singapore)","ror":"https://ror.org/01c4r0z03","country_code":"SG","type":"company","lineage":["https://openalex.org/I193427800","https://openalex.org/I4210102879"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yi Wang","raw_affiliation_strings":["Aumovio Singapore Pte. Ltd., Singapore, Singapore","Aumovio Singapore Pte. Ltd, Singapore"],"affiliations":[{"raw_affiliation_string":"Aumovio Singapore Pte. Ltd., Singapore, Singapore","institution_ids":["https://openalex.org/I4210102879"]},{"raw_affiliation_string":"Aumovio Singapore Pte. Ltd, Singapore","institution_ids":["https://openalex.org/I4210102879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115604102","display_name":"Shanshan Wang","orcid":"https://orcid.org/0009-0004-9955-0199"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shanshan Wang","raw_affiliation_strings":["School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111890321","display_name":"Anyu Cheng","orcid":"https://orcid.org/0009-0005-8861-2793"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anyu Cheng","raw_affiliation_strings":["College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, China","College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100624121","display_name":"Changqing Li","orcid":"https://orcid.org/0000-0001-5260-0794"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changqing Li","raw_affiliation_strings":["College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, China","College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China","institution_ids":["https://openalex.org/I10535382"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065781673"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30525298,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"1","first_page":"487","last_page":"499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.7376000285148621},{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.6644999980926514},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6621999740600586},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4659000039100647},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.43970000743865967},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4390999972820282},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4352000057697296},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42260000109672546},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.38019999861717224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8841999769210815},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.7376000285148621},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.6644999980926514},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6621999740600586},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4659000039100647},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4456999897956848},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.43970000743865967},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4390999972820282},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4352000057697296},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42260000109672546},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.38019999861717224},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.36329999566078186},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.357699990272522},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3553999960422516},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.33239999413490295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3296000063419342},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.32600000500679016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31369999051094055},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.30809998512268066},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C201762086","wikidata":"https://www.wikidata.org/wiki/Q728183","display_name":"CAN bus","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.25529998540878296},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3620567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3620567","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1981491391","https://openalex.org/W2099111195","https://openalex.org/W2118561568","https://openalex.org/W2762158083","https://openalex.org/W2798302089","https://openalex.org/W2973798619","https://openalex.org/W3006210468","https://openalex.org/W3027378069","https://openalex.org/W3095459720","https://openalex.org/W3128979643","https://openalex.org/W3152523620","https://openalex.org/W4207051345","https://openalex.org/W4229547726","https://openalex.org/W4286285588","https://openalex.org/W4290988769","https://openalex.org/W4296426140","https://openalex.org/W4311080744","https://openalex.org/W4315783889","https://openalex.org/W4323966633","https://openalex.org/W4386297618","https://openalex.org/W4388201655","https://openalex.org/W4393352831","https://openalex.org/W4404118847","https://openalex.org/W4405360462","https://openalex.org/W4405845755","https://openalex.org/W4405933860","https://openalex.org/W4408750104","https://openalex.org/W4409507952","https://openalex.org/W4410856645","https://openalex.org/W4413155710","https://openalex.org/W4413886657"],"related_works":[],"abstract_inverted_index":{"As":[0],"the":[1,112,138,161,213,231,238,242,245,254,258,269,273,281,305,318],"core":[2],"protocol":[3],"for":[4,58,82,317],"transmitting":[5],"Advanced":[6],"Driver":[7],"Assistance":[8],"Systems":[9],"(ADAS)":[10],"perception":[11],"video":[12],"streams":[13],"over":[14],"automotive":[15,65],"Ethernet,":[16],"Audio":[17],"Video":[18],"Transport":[19],"Protocol":[20],"(AVTP)":[21],"is":[22,91,141,157,284,308,347],"vulnerable":[23],"to":[24,29,119,211,229,289],"replay":[25,47],"attacks":[26],"[1]":[27],"due":[28],"its":[30],"lack":[31],"of":[32,114,137,164,215,244,261,276,327,342],"authentication":[33],"and":[34,60,97,189,247,251,263,266,299,313,331,335],"integrity":[35],"protection":[36],"mechanisms.":[37],"The":[38,134],"existing":[39],"supervised":[40],"deep":[41],"learning":[42],"methods":[43,291],"primarily":[44],"target":[45],"conventional":[46],"attack":[48],"detection,":[49],"but":[50],"their":[51],"large":[52],"model":[53,217,240,282,306,323],"sizes":[54],"make":[55],"them":[56],"unsuitable":[57],"resource-constrained":[59],"real-time":[61],"deployment":[62],"in":[63,86,218],"embedded":[64],"systems.":[66],"To":[67],"address":[68],"these":[69],"issues,":[70],"we":[71,102,122,221],"propose":[72,123],"a":[73,124,223,339],"novel":[74],"intrusion":[75],"detection":[76,126,320,340],"system":[77],"(IDS)":[78],"against":[79],"Adversarial":[80,226],"Samples":[81],"Replay":[83],"Attacks":[84],"(AdvRA)":[85],"Automotive":[87],"AVTP":[88],"Streams,":[89],"which":[90,156],"based":[92,128],"on":[93,129],"Frame-Difference,":[94],"Time-Shared":[95],"Convolution":[96],"Bidirectional":[98],"Mamba":[99,132],"(FD-TSConv-BiMamba).":[100],"Specifically,":[101],"first":[103],"construct":[104,222],"an":[105,130,325],"efficient":[106],"feature":[107],"engineering":[108],"pipeline":[109],"that":[110,237],"reduces":[111],"number":[113],"dimensional":[115],"features":[116],"from":[117],"438":[118],"40.":[120],"Second,":[121],"lightweight":[125],"algorithm":[127,140],"improved":[131],"structure.":[133],"parameter":[135,162],"complexity":[136,163],"proposed":[139,239],"<italic":[142,153,172,184,199,205],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[143,145,148,150,154,167,169,173,175,179,181,185,187,192,194,196,200,202,206,208],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>(<italic":[144,193],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">d</i>":[146],"\u00b7<italic":[147],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">m</i>+<italic":[149],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>":[151],"\u00b7":[152,198,204],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">d</i>),":[155],"significantly":[158],"lower":[159],"than":[160],"GRU":[165,330],"(<italic":[166,178,191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>(3(<italic":[168],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">nd</i>":[170,182],"+":[171,183],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i><sup":[174,186],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>))),":[176],"LSTM":[177,332],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>(4(<italic":[180],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>)))":[188],"CNN":[190],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">f</i><sup":[195],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[197],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">c</i><sub":[201,207],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">in</sub>":[203],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">out</sub>)).":[209],"Finally,":[210],"validate":[212],"effectiveness":[214],"our":[216,322],"detecting":[219],"AdvRA,":[220],"conditional":[224],"Generative":[225],"Network":[227],"(cGAN)":[228],"generate":[230],"AdvRA":[232,319],"dataset.":[233],"Experimental":[234],"results":[235],"show":[236],"achieves":[241,324],"parameters":[243],"accuracy":[246],"F1-score":[248,326],"with":[249,264,338],"0.9974":[250],"0.9970":[252],"under":[253,268],"indoor":[255],"scenario":[256,271],"using":[257,272],"window":[259,274],"size":[260,275,283,307],"114,":[262],"1.0000":[265],"0.9999":[267],"driving":[270],"108,":[277],"respectively.":[278,315],"In":[279],"addition,":[280],"only":[285],"1.17":[286],"MB.":[287],"Compared":[288],"advanced":[290],"such":[292],"as":[293],"TOW-IDS":[294],"[2]":[295],"at":[296,302],"11.30":[297],"MB":[298],"CNN-IDS":[300],"[3]":[301],"3.58":[303],"MB,":[304],"reduced":[309],"by":[310,333],"approximately":[311],"89.6%":[312],"67.3%,":[314],"Furthermore,":[316],"task,":[321],"0.9917,":[328],"outperforming":[329],"7.15%":[334],"6.27%,":[336],"respectively,":[337],"speed":[341],"3155":[343],"samples/s.":[344],"Our":[345],"code":[346],"available":[348],"at:":[349],"https://github.com/Haihang-Zhao/FD_TSConv_Mamba.":[350]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-14T00:00:00"}
