{"id":"https://openalex.org/W3161155084","doi":"https://doi.org/10.1109/wcnc49053.2021.9417552","title":"WSG-InV: Weighted State Graph Model for Intrusion Detection on In-Vehicle Network","display_name":"WSG-InV: Weighted State Graph Model for Intrusion Detection on In-Vehicle Network","publication_year":2021,"publication_date":"2021-03-29","ids":{"openalex":"https://openalex.org/W3161155084","doi":"https://doi.org/10.1109/wcnc49053.2021.9417552","mag":"3161155084"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc49053.2021.9417552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc49053.2021.9417552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045419713","display_name":"Yuan Linghu","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Linghu","raw_affiliation_strings":["School of Software Engineering, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015211192","display_name":"Xiangxue Li","orcid":"https://orcid.org/0000-0002-1779-6178"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangxue Li","raw_affiliation_strings":["School of Software Engineering, East China Normal University, Shanghai, China","Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China","Westone Cryptologic Research Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China","institution_ids":["https://openalex.org/I4210139618"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045419713"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.4048,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.59768831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.6010434627532959},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.583936870098114},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.571761429309845},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5583671927452087},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4950994551181793},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4905669093132019},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4348812699317932},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42125582695007324},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.419039785861969},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27325743436813354},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2644919455051422},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19562244415283203},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.12230947613716125}],"concepts":[{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.6010434627532959},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.583936870098114},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.571761429309845},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5583671927452087},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4950994551181793},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4905669093132019},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4348812699317932},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42125582695007324},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.419039785861969},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27325743436813354},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2644919455051422},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19562244415283203},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.12230947613716125},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc49053.2021.9417552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc49053.2021.9417552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2113242816","https://openalex.org/W2116520617","https://openalex.org/W2133854595","https://openalex.org/W2148974412","https://openalex.org/W2464037380","https://openalex.org/W2545810962","https://openalex.org/W2561208905","https://openalex.org/W2739928414","https://openalex.org/W2759891682","https://openalex.org/W2792633639","https://openalex.org/W2891642265","https://openalex.org/W2897929592","https://openalex.org/W2959120033","https://openalex.org/W2977724618","https://openalex.org/W2987238340","https://openalex.org/W3105105644","https://openalex.org/W3208688400","https://openalex.org/W6677144717","https://openalex.org/W6719536112"],"related_works":["https://openalex.org/W2087922528","https://openalex.org/W2736040673","https://openalex.org/W2379539044","https://openalex.org/W2355809385","https://openalex.org/W2363105058","https://openalex.org/W2377356555","https://openalex.org/W2357512932","https://openalex.org/W2372958843","https://openalex.org/W2979259617","https://openalex.org/W2358796822"],"abstract_inverted_index":{"The":[0,63],"paper":[1],"presents":[2],"WSG-InV,":[3],"a":[4,33,73,120,127,140,146],"novel":[5],"weighted":[6,34,128],"state":[7,35,57,129],"graph":[8,36],"(WSG)":[9],"model":[10,105],"for":[11,132],"lightweight":[12],"IDS":[13],"on":[14,19],"in-vehicle":[15,21,68],"network.":[16],"By":[17],"capitalizing":[18],"historical":[20],"data":[22,28,69,98,117],"of":[23,47,59,66,75,96,122,134,171],"timestamps,":[24],"message":[25,41],"identifiers,":[26],"and":[27,49,101,125,155],"field,":[29],"WSG-InV":[30,112,150,166],"constructs":[31],"offline":[32],"G=(V,":[37],"E)":[38],"where":[39],"distinct":[40],"identifiers":[42],"constitute":[43],"the":[44,50,55,60,86,91,102,115,152,158,173],"set":[45],"V":[46],"vertices":[48],"edges":[51,87],"in":[52,88],"E":[53],"define":[54],"time-varying":[56],"transitions":[58],"CAN":[61],"frames.":[62],"iconic":[64],"constituents":[65],"given":[67],"are":[70,82,99],"condensed":[71],"into":[72,119],"collection":[74],"ordered":[76],"triples":[77],"(the":[78],"vectorized":[79],"weight)":[80],"that":[81],"further":[83],"assigned":[84],"to":[85,108],"E.":[89],"In":[90],"mean":[92],"time,":[93],"several":[94],"kinds":[95],"intrusion":[97,110],"evoked":[100],"random":[103],"forest":[104],"is":[106],"deployed":[107],"conduct":[109],"classification.":[111],"then":[113],"segments":[114],"online":[116],"stream":[118],"slice":[121],"sliding":[123],"windows":[124],"extracts":[126],"subgraph":[130,153],"S":[131,154],"each":[133],"them.":[135],"Bv":[136],"consulting":[137],"G":[138],"as":[139,142,144,161],"benchmarking":[141],"well":[143],"optimizing":[145],"particular":[147],"3-variable":[148],"programming,":[149],"assesses":[151],"thereby":[156],"recognizes":[157],"corresponding":[159],"traffic":[160],"normal":[162],"or":[163],"anomaly.":[164],"Besides,":[165],"can":[167],"distinguish":[168],"which":[169],"type":[170],"attack":[172],"anomaly":[174],"gears":[175],"toward.":[176],"Experimental":[177],"results":[178],"demonstrate":[179],"almost":[180],"optimal":[181],"performance.":[182]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
