{"id":"https://openalex.org/W4406457625","doi":"https://doi.org/10.1109/tits.2025.3525505","title":"Explainable Deep Learning-Enabled Malware Attack Detection for IoT-Enabled Intelligent Transportation Systems","display_name":"Explainable Deep Learning-Enabled Malware Attack Detection for IoT-Enabled Intelligent Transportation Systems","publication_year":2025,"publication_date":"2025-01-16","ids":{"openalex":"https://openalex.org/W4406457625","doi":"https://doi.org/10.1109/tits.2025.3525505"},"language":"en","primary_location":{"id":"doi:10.1109/tits.2025.3525505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2025.3525505","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004320904","display_name":"Mohammad Wazid","orcid":"https://orcid.org/0000-0001-9898-0921"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mohammad Wazid","raw_affiliation_strings":["Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071972877","display_name":"Jaskaran Singh","orcid":"https://orcid.org/0000-0001-9285-2048"},"institutions":[{"id":"https://openalex.org/I142263535","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58","country_code":"GB","type":"education","lineage":["https://openalex.org/I142263535"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jaskaran Singh","raw_affiliation_strings":["School of Computer Science, University of Nottingham, Nottingham, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Nottingham, Nottingham, U.K","institution_ids":["https://openalex.org/I142263535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109951118","display_name":"C.M. Pandey","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Charvi Pandey","raw_affiliation_strings":["Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002654622","display_name":"R. Simon Sherratt","orcid":"https://orcid.org/0000-0001-7899-4445"},"institutions":[{"id":"https://openalex.org/I71052956","display_name":"University of Reading","ror":"https://ror.org/05v62cm79","country_code":"GB","type":"education","lineage":["https://openalex.org/I71052956"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"R. Simon Sherratt","raw_affiliation_strings":["Department of Biomedical Engineering, University of Reading, Reading, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Biomedical Engineering, University of Reading, Reading, U.K","institution_ids":["https://openalex.org/I71052956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology at Hyderabad, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology at Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052380142","display_name":"Debasis Giri","orcid":"https://orcid.org/0000-0003-3033-3036"},"institutions":[{"id":"https://openalex.org/I99601430","display_name":"Maulana Abul Kalam Azad University of Technology, West Bengal","ror":"https://ror.org/030tcae29","country_code":"IN","type":"education","lineage":["https://openalex.org/I99601430"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debasis Giri","raw_affiliation_strings":["Department of Information Technology, Maulana Abul Kalam Azad University of Technology at West Bengal, Nadia, Haringhata, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Maulana Abul Kalam Azad University of Technology at West Bengal, Nadia, Haringhata, India","institution_ids":["https://openalex.org/I99601430"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100650746","display_name":"Youngho Park","orcid":"https://orcid.org/0000-0002-0406-6547"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngho Park","raw_affiliation_strings":["School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5004320904"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":33.9086,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.99856196,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"26","issue":"5","first_page":"7231","last_page":"7244"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7316521406173706},{"id":"https://openalex.org/keywords/intelligent-transportation-system","display_name":"Intelligent transportation system","score":0.6885219812393188},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6539552211761475},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6017560362815857},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5804212689399719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4890928864479065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39375877380371094},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22888299822807312},{"id":"https://openalex.org/keywords/transport-engineering","display_name":"Transport engineering","score":0.17302879691123962}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7316521406173706},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.6885219812393188},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6539552211761475},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6017560362815857},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5804212689399719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4890928864479065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39375877380371094},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22888299822807312},{"id":"https://openalex.org/C22212356","wikidata":"https://www.wikidata.org/wiki/Q775325","display_name":"Transport engineering","level":1,"score":0.17302879691123962}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tits.2025.3525505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2025.3525505","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},{"id":"pmh:oai:centaur.reading.ac.uk:121240","is_oa":false,"landing_page_url":"https://centaur.reading.ac.uk/view/creators/90000807.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306402273","display_name":"CentAUR (University of Reading)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71052956","host_organization_name":"University of Reading","host_organization_lineage":["https://openalex.org/I71052956"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4295124530","display_name":null,"funder_award_id":"RS-2024-00450915","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2576765166","https://openalex.org/W2594536436","https://openalex.org/W2792944932","https://openalex.org/W2800426337","https://openalex.org/W2806697149","https://openalex.org/W2902209387","https://openalex.org/W2907164519","https://openalex.org/W2962802821","https://openalex.org/W2965372741","https://openalex.org/W2990127528","https://openalex.org/W3004777721","https://openalex.org/W3007394313","https://openalex.org/W3087990969","https://openalex.org/W3088854313","https://openalex.org/W3110603219","https://openalex.org/W3119729076","https://openalex.org/W3162883843","https://openalex.org/W3168771234","https://openalex.org/W3172909833","https://openalex.org/W4293812121","https://openalex.org/W4296079218","https://openalex.org/W4312841610","https://openalex.org/W4312843593","https://openalex.org/W4312847977","https://openalex.org/W4323312375","https://openalex.org/W4366492996","https://openalex.org/W4376618688","https://openalex.org/W4378194869","https://openalex.org/W4379986344","https://openalex.org/W4382281941","https://openalex.org/W4382865033","https://openalex.org/W4385486439","https://openalex.org/W4387010514","https://openalex.org/W4387146071","https://openalex.org/W4388763427","https://openalex.org/W4388966623","https://openalex.org/W4390483481","https://openalex.org/W4390493776","https://openalex.org/W4390913672","https://openalex.org/W4391071388","https://openalex.org/W4391514861","https://openalex.org/W4392397286","https://openalex.org/W4392667285","https://openalex.org/W4392902309","https://openalex.org/W4393253184","https://openalex.org/W4401357201","https://openalex.org/W4401878915","https://openalex.org/W4403407913"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"The":[0,23,38,80,109,169,203],"Internet":[1],"of":[2,12,51,55,64,82,137,148,171,183,189,207,221,232],"Things":[3],"(IoT)":[4],"has":[5,41,88,176],"the":[6,10,19,43,48,61,83,86,135,144,149,180,190,212,230,233],"potential":[7,201],"to":[8,71,93,96,195,225],"improve":[9,72,97],"complementary":[11],"communication,":[13],"control,":[14,99],"and":[15,35,57,68,77,105,113,132,146,237],"information":[16],"processing":[17],"within":[18],"public":[20],"transportation":[21,32,44,73,107],"system.":[22],"IoT-enabled":[24,39,110,164,234],"Intelligent":[25],"Transportation":[26],"System":[27],"(ITS)":[28],"ensures":[29],"that":[30],"automated":[31],"is":[33,193,209,223],"networked":[34,65],"operated":[36],"collaboratively.":[37],"ITS":[40,87,111,165,235],"revolutionized":[42],"industry":[45],"by":[46],"enabling":[47],"seamless":[49],"integration":[50],"a":[52,156,218],"wide":[53],"range":[54],"devices":[56,114],"systems.":[58],"It":[59],"makes":[60],"strategic":[62],"use":[63],"devices,":[66],"sensors,":[67],"data":[69],"analytics":[70],"network":[74],"efficiency,":[75],"safety,":[76],"environmental":[78],"friendliness.":[79],"usage":[81],"IoT":[84,152],"in":[85,90],"grown":[89],"popularity":[91],"due":[92],"its":[94,197,227],"capacity":[95],"traffic":[98],"reduce":[100],"congestion,":[101],"facilitate":[102],"live":[103],"monitoring,":[104],"optimize":[106],"operations.":[108],"systems":[112,236],"must":[115],"be":[116],"protected":[117],"from":[118],"cyber-attacks":[119],"for":[120,163,179],"various":[121,200],"reasons,":[122],"including":[123],"preserving":[124],"sensitive":[125],"data,":[126],"guaranteeing":[127],"privacy,":[128],"preventing":[129],"unauthorized":[130],"access,":[131],"protecting":[133],"against":[134,199],"risk":[136],"interruptions":[138],"or":[139],"manipulations.":[140],"Malware":[141],"attacks":[142],"affect":[143],"working":[145],"performance":[147,205],"deployed":[150],"smart":[151],"devices.":[153,238],"We":[154],"propose":[155],"secure":[157],"deep":[158,186],"learning-enabled":[159],"malware":[160],"attack":[161],"detection":[162,182],"(in":[166],"short,":[167],"SDLMA-IITS).":[168],"approach":[170],"explainable":[172],"artificial":[173],"intelligence":[174],"(XAI)":[175],"been":[177],"utilized":[178],"effective":[181],"malware.":[184],"A":[185],"security":[187,198,231],"analysis":[188,206],"proposed":[191],"SDLMA-IITS":[192,208,222],"presented":[194],"prove":[196],"attacks.":[202],"comparative":[204],"given":[210],"with":[211],"other":[213],"similar":[214],"existing":[215],"schemes.":[216],"Finally,":[217],"practical":[219],"implementation":[220],"provided":[224],"measure":[226],"impact":[228],"on":[229]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":17}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
