{"id":"https://openalex.org/W4405232519","doi":"https://doi.org/10.1109/tits.2024.3510584","title":"AILL-IDS: An Automatic Incremental Lifetime Learning Intrusion Detection System for Vehicular Ad Hoc Networks","display_name":"AILL-IDS: An Automatic Incremental Lifetime Learning Intrusion Detection System for Vehicular Ad Hoc Networks","publication_year":2024,"publication_date":"2024-12-11","ids":{"openalex":"https://openalex.org/W4405232519","doi":"https://doi.org/10.1109/tits.2024.3510584"},"language":"en","primary_location":{"id":"doi:10.1109/tits.2024.3510584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2024.3510584","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110558832","display_name":"Yunfan Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Yunfan Huang","raw_affiliation_strings":["Faculty of Engineering, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["College of Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110558832"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":null,"apc_paid":null,"fwci":2.4949,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90324223,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"26","issue":"2","first_page":"2669","last_page":"2678"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7693866491317749},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6691408157348633},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5995723605155945},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5261625647544861},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4583645761013031},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.381428599357605},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37895816564559937},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09670349955558777},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.07768517732620239}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7693866491317749},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6691408157348633},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5995723605155945},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5261625647544861},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4583645761013031},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.381428599357605},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37895816564559937},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09670349955558777},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.07768517732620239},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tits.2024.3510584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2024.3510584","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2062789233","https://openalex.org/W2142838865","https://openalex.org/W2343620495","https://openalex.org/W2964314709","https://openalex.org/W3015791395","https://openalex.org/W3039887298","https://openalex.org/W3045657906","https://openalex.org/W3134483124","https://openalex.org/W3156129242","https://openalex.org/W3205117227","https://openalex.org/W3207020565","https://openalex.org/W4210622103","https://openalex.org/W4281896562","https://openalex.org/W4285820203","https://openalex.org/W4307483008","https://openalex.org/W4312210066","https://openalex.org/W4323795756","https://openalex.org/W4380986761","https://openalex.org/W4392208696","https://openalex.org/W4392405759","https://openalex.org/W4394586627","https://openalex.org/W4396521014","https://openalex.org/W4403182783","https://openalex.org/W6609415898","https://openalex.org/W6637131181","https://openalex.org/W6801980779"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W2163664197","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W2771454953","https://openalex.org/W3046762796","https://openalex.org/W3202102306","https://openalex.org/W3046260513","https://openalex.org/W2998294818","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Vehicular":[0],"Ad":[1],"Hoc":[2],"Networks":[3],"(VANETs)":[4],"play":[5],"a":[6,108,167],"critical":[7],"role":[8],"in":[9,158],"enabling":[10,70],"communication":[11],"among":[12],"intelligent":[13],"vehicles,":[14],"yet":[15],"their":[16],"dynamic":[17],"and":[18,94,134,156,173,189],"decentralized":[19],"nature":[20],"makes":[21],"them":[22],"highly":[23],"vulnerable":[24],"to":[25,65,130],"cyber-attacks.":[26],"Traditional":[27],"Intrusion":[28],"Detection":[29],"Systems":[30],"(IDSs)":[31],"provide":[32],"limited":[33],"defense":[34],"against":[35,195],"these":[36],"evolving":[37],"threats,":[38],"as":[39],"they":[40],"rely":[41],"on":[42,81],"static":[43],"rules":[44],"or":[45],"machine":[46],"learning":[47,72],"(ML)":[48],"models":[49],"that":[50,112,164],"lack":[51],"the":[52,89,101,115,149],"capacity":[53],"for":[54,117,192],"real-time":[55],"updates.":[56],"The":[57],"Incremental":[58,103],"Lifetime":[59,104],"Learning":[60,105],"IDS":[61,106,110],"(ILL-IDS)":[62],"was":[63],"introduced":[64],"address":[66],"this":[67,98],"limitation":[68],"by":[69],"adaptive":[71],"of":[73,84,171,178],"new":[74],"attack":[75],"types.":[76],"However,":[77],"ILL-IDS":[78],"depends":[79],"heavily":[80],"large":[82],"volumes":[83],"high-quality":[85],"labeled":[86,118,141,183],"data,":[87,184],"making":[88],"model":[90,137,150],"update":[91,151],"process":[92],"costly":[93],"labor-intensive.":[95],"In":[96],"response,":[97],"study":[99],"proposes":[100],"Automatic":[102],"(AILL-IDS),":[107],"novel":[109],"framework":[111],"significantly":[113],"reduces":[114],"need":[116],"data":[119,142],"through":[120],"incremental":[121],"semi-supervised":[122],"learning.":[123],"This":[124],"approach":[125],"not":[126],"only":[127,181],"enables":[128],"AILL-IDS":[129,165],"detect":[131],"unknown":[132],"attacks":[133],"adapt":[135],"its":[136],"dynamically":[138],"with":[139],"minimal":[140],"but":[143],"also":[144],"ensures":[145],"continuous":[146],"detection":[147,169],"during":[148],"process,":[152],"enhancing":[153],"both":[154],"speed":[155],"accuracy":[157],"threat":[159],"detection.":[160],"Experimental":[161],"results":[162],"demonstrate":[163],"achieves":[166],"high":[168],"rate":[170],"0.97":[172],"an":[174,187],"average":[175],"F1":[176],"score":[177],"0.90,":[179],"using":[180],"5.5%":[182],"thereby":[185],"offering":[186],"efficient":[188],"scalable":[190],"solution":[191],"securing":[193],"VANETs":[194],"emerging":[196],"cyber":[197],"threats.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
