{"id":"https://openalex.org/W4410887632","doi":"https://doi.org/10.1109/syscon64521.2025.11014799","title":"RF Jamming BERT Intrusion Detection Systems for Vehicular Networks","display_name":"RF Jamming BERT Intrusion Detection Systems for Vehicular Networks","publication_year":2025,"publication_date":"2025-04-07","ids":{"openalex":"https://openalex.org/W4410887632","doi":"https://doi.org/10.1109/syscon64521.2025.11014799"},"language":"en","primary_location":{"id":"doi:10.1109/syscon64521.2025.11014799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon64521.2025.11014799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117770672","display_name":"Nujitha Wickramasurendra","orcid":null},"institutions":[{"id":"https://openalex.org/I186803428","display_name":"Brock University","ror":"https://ror.org/056am2717","country_code":"CA","type":"education","lineage":["https://openalex.org/I186803428"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Nujitha Wickramasurendra","raw_affiliation_strings":["Brock University,Department of Computer Science,St. Catharines,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Brock University,Department of Computer Science,St. Catharines,ON,Canada","institution_ids":["https://openalex.org/I186803428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003397713","display_name":"Robson E. De Grande","orcid":"https://orcid.org/0000-0001-9448-2036"},"institutions":[{"id":"https://openalex.org/I186803428","display_name":"Brock University","ror":"https://ror.org/056am2717","country_code":"CA","type":"education","lineage":["https://openalex.org/I186803428"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Robson E. De Grande","raw_affiliation_strings":["Brock University,Department of Computer Science,St. Catharines,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Brock University,Department of Computer Science,St. Catharines,ON,Canada","institution_ids":["https://openalex.org/I186803428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083508344","display_name":"Glaucio H. S. Carvalho","orcid":"https://orcid.org/0000-0003-1323-4650"},"institutions":[{"id":"https://openalex.org/I186803428","display_name":"Brock University","ror":"https://ror.org/056am2717","country_code":"CA","type":"education","lineage":["https://openalex.org/I186803428"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Glaucio H.S. Carvalho","raw_affiliation_strings":["Brock University,Department of Computer Science and Engineering,St. Catharines,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Brock University,Department of Computer Science and Engineering,St. Catharines,ON,Canada","institution_ids":["https://openalex.org/I186803428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5117770672"],"corresponding_institution_ids":["https://openalex.org/I186803428"],"apc_list":null,"apc_paid":null,"fwci":1.4856,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.83099933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7266226410865784},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6887610554695129},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6842505931854248},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4826353192329407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4659987688064575}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7266226410865784},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6887610554695129},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6842505931854248},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4826353192329407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4659987688064575},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon64521.2025.11014799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon64521.2025.11014799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2118939036","https://openalex.org/W2803807991","https://openalex.org/W2990644391","https://openalex.org/W3118521491","https://openalex.org/W3119223610","https://openalex.org/W3189888967","https://openalex.org/W3194126250","https://openalex.org/W4205635956","https://openalex.org/W4226279572","https://openalex.org/W4226346873","https://openalex.org/W4285115684","https://openalex.org/W4311988202","https://openalex.org/W4313378981","https://openalex.org/W4317600390","https://openalex.org/W4319079731","https://openalex.org/W4388756035","https://openalex.org/W4388948449","https://openalex.org/W4391582407","https://openalex.org/W4396667911","https://openalex.org/W4397000731","https://openalex.org/W4402811667","https://openalex.org/W6739901393","https://openalex.org/W6755207826","https://openalex.org/W6797674293"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1984793747","https://openalex.org/W4312547492","https://openalex.org/W3197729047","https://openalex.org/W3016692377","https://openalex.org/W1624160917","https://openalex.org/W2370486284","https://openalex.org/W2143847498"],"abstract_inverted_index":{"As":[0],"vehicular":[1,48],"networks":[2],"become":[3],"increasingly":[4],"complex":[5],"and":[6,22,85,92,128,154,157,160,165,180,200],"interconnected,":[7],"they":[8,38],"face":[9,40],"rising":[10],"security":[11],"threats,":[12],"particularly":[13],"Radio-Frequency":[14],"(RF)":[15],"jamming":[16,36],"attacks":[17],"that":[18,102,150],"can":[19],"disrupt":[20],"communication":[21],"compromise":[23],"safety.":[24],"While":[25],"existing":[26,114],"Artificial":[27],"Intelligence":[28],"(AI)":[29],"models":[30],"have":[31],"been":[32],"applied":[33],"for":[34,74,162],"RF":[35,192,202],"detection,":[37],"often":[39],"challenges":[41],"in":[42],"addressing":[43],"the":[44,79,103,108,187,190],"dynamic":[45],"nature":[46],"of":[47,81,124,176,189],"environments.":[49],"In":[50],"this":[51,118],"paper,":[52],"we":[53,83],"present":[54],"an":[55,174],"intrusion":[56],"detection":[57],"system":[58],"(IDS)":[59],"utilizing":[60],"Bidirectional":[61],"Encoder":[62],"Representations":[63],"from":[64,98],"Transformers":[65],"(BERT),":[66],"a":[67,121],"transformer-based":[68],"Large":[69],"Language":[70],"Model":[71],"(LLM)":[72],"renowned":[73],"its":[75],"contextual":[76],"understanding.":[77],"During":[78],"training":[80],"BERT,":[82],"incorporated":[84],"experimented":[86],"with":[87,107,195],"two":[88],"tokenizing":[89],"techniques:":[90],"WordPiece":[91,109,196],"Byte-Pair":[93],"Encoding":[94],"(BPE).":[95],"The":[96,168],"results":[97,185],"our":[99],"experiments":[100],"highlighted":[101],"BERT":[104,191],"model":[105],"fine-tuned":[106],"tokenization":[110,170,197],"method":[111],"significantly":[112],"outperformed":[113],"baseline":[115,138],"methods.":[116],"Specifically,":[117],"approach":[119],"achieved":[120,173],"high":[122],"accuracy":[123,175],"96.25%":[125],"at":[126,130,178,182],"25m/s":[127,179],"90.25%":[129],"15m/s":[131],"showcasing":[132],"strong":[133],"performance":[134],"gains":[135],"compared":[136],"to":[137,198],"methods:":[139],"K-Nearest":[140],"Neighbors":[141],"(KNN),":[142],"Random":[143],"Forest":[144],"(RaFo),":[145],"Long":[146],"Short-Term":[147],"Memory":[148],"(LSTM)":[149],"reached,":[151],"respectively,":[152],"94.46%":[153],"82.27%;":[155],"94.61%":[156],"80.04%;":[158],"95.17%":[159],"84.83%":[161],"25":[163],"m/s":[164],"15":[166],"m/s.":[167],"BPE":[169],"IDS":[171,194],"version":[172],"85.00%":[177],"80.25%":[181],"15m/s.":[183],"Our":[184],"demonstrate":[186],"effectiveness":[188],"Jamming":[193],"detect":[199],"classify":[201],"threats":[203],"on":[204],"vehicle":[205],"networks.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
