{"id":"https://openalex.org/W4407247885","doi":"https://doi.org/10.1109/wpmc63271.2024.10863691","title":"Big-Data Driven Anomaly Detection In Vehicular Social Networks Using Graph Autoencoders","display_name":"Big-Data Driven Anomaly Detection In Vehicular Social Networks Using Graph Autoencoders","publication_year":2024,"publication_date":"2024-11-17","ids":{"openalex":"https://openalex.org/W4407247885","doi":"https://doi.org/10.1109/wpmc63271.2024.10863691"},"language":"en","primary_location":{"id":"doi:10.1109/wpmc63271.2024.10863691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc63271.2024.10863691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Austin Hamilton","orcid":null},"institutions":[{"id":"https://openalex.org/I119443389","display_name":"East Tennessee State University","ror":"https://ror.org/05rfqv493","country_code":"US","type":"education","lineage":["https://openalex.org/I119443389"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Austin Hamilton","raw_affiliation_strings":["East Tennessee State University,Dept of Computing,Johnson City,USA"],"affiliations":[{"raw_affiliation_string":"East Tennessee State University,Dept of Computing,Johnson City,USA","institution_ids":["https://openalex.org/I119443389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014109840","display_name":"Mohammad S. Khan","orcid":"https://orcid.org/0000-0002-2224-3826"},"institutions":[{"id":"https://openalex.org/I119443389","display_name":"East Tennessee State University","ror":"https://ror.org/05rfqv493","country_code":"US","type":"education","lineage":["https://openalex.org/I119443389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad S. Khan","raw_affiliation_strings":["East Tennessee State University,Dept of Computing,Johnson City,USA"],"affiliations":[{"raw_affiliation_string":"East Tennessee State University,Dept of Computing,Johnson City,USA","institution_ids":["https://openalex.org/I119443389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009742150","display_name":"Simone Silvestri","orcid":"https://orcid.org/0000-0003-2357-3429"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simone Silvestri","raw_affiliation_strings":["University of Kentucky,Dept of Computer Science,Lexington,USA"],"affiliations":[{"raw_affiliation_string":"University of Kentucky,Dept of Computer Science,Lexington,USA","institution_ids":["https://openalex.org/I143302722"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111637520","display_name":"C. Scott","orcid":null},"institutions":[{"id":"https://openalex.org/I119443389","display_name":"East Tennessee State University","ror":"https://ror.org/05rfqv493","country_code":"US","type":"education","lineage":["https://openalex.org/I119443389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chandler Scott","raw_affiliation_strings":["East Tennessee State University,Dept of Computing,Johnson City,USA"],"affiliations":[{"raw_affiliation_string":"East Tennessee State University,Dept of Computing,Johnson City,USA","institution_ids":["https://openalex.org/I119443389"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I119443389"],"apc_list":null,"apc_paid":null,"fwci":0.5424,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66878086,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7602750658988953},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.727264940738678},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6163661479949951},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5311941504478455},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4874463379383087},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.48388490080833435},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3333429992198944},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.33096811175346375},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.18939602375030518}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7602750658988953},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.727264940738678},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6163661479949951},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5311941504478455},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4874463379383087},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.48388490080833435},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3333429992198944},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33096811175346375},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.18939602375030518},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wpmc63271.2024.10863691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc63271.2024.10863691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1545582357","https://openalex.org/W1985986451","https://openalex.org/W2603705452","https://openalex.org/W2728985065","https://openalex.org/W2774284322","https://openalex.org/W2951086007","https://openalex.org/W2983576094","https://openalex.org/W3002774406","https://openalex.org/W4322614756","https://openalex.org/W4388210537","https://openalex.org/W4390578843","https://openalex.org/W6730084236"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Vehicular":[0],"social":[1,51,134],"networks":[2],"exchange":[3],"a":[4,32,41,56,86,123,132],"vast":[5],"amount":[6],"of":[7,18,68,89,108,125,142,148,160],"data":[8,20,130],"between":[9,22],"vehicles":[10],"and":[11,61,144],"roadside":[12],"infrastructure.":[13],"To":[14],"check":[15],"the":[16,19,64,116,154,164],"validity":[17],"passed":[21],"vehicles,":[23],"machine":[24],"learning":[25,43],"can":[26,79],"be":[27,80,120],"used":[28,121],"to":[29,59,101],"determine":[30],"when":[31],"vehicle":[33],"is":[34,71],"anomalous.":[35],"Within":[36],"this":[37,69],"paper,":[38],"we":[39],"present":[40],"deep":[42],"model":[44,54,70,98,118,137,151],"for":[45,73],"identifying":[46],"anomalous":[47,77,105,156],"nodes":[48,78,106,157],"within":[49],"vehicular":[50,133],"networks.":[52],"The":[53,66,96,136,150],"employs":[55],"graph":[57],"auto-encoder":[58],"encode":[60],"then":[62],"rebuild":[63],"network.":[65,135],"output":[67],"tested":[72],"errors":[74],"so":[75],"that":[76,115],"identified.":[81],"Tests":[82],"were":[83],"run":[84],"on":[85,163],"dataset":[87],"consisting":[88],"over":[90],"three":[91,169],"thousand":[92,110],"vehicles\u2019":[93],"sensor":[94],"data.":[95],"proposed":[97,117],"was":[99],"able":[100],"accurately":[102],"identify":[103],"two":[104,155],"out":[107],"several":[109],"nodes.":[111],"These":[112],"results":[113],"show":[114],"could":[119],"as":[122],"way":[124],"filtering":[126],"faulty":[127],"or":[128],"malicious":[129],"from":[131],"provided":[138],"an":[139,145],"area-under-the-curve":[140],"score":[141],"0.91":[143],"average":[146,165],"precision":[147],"0.95.":[149],"successfully":[152],"identified":[153],"in":[158],"71%":[159],"cases,":[161],"based":[162],"detection":[166],"rate":[167],"across":[168],"separate":[170],"tests.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
