{"id":"https://openalex.org/W6922361147","doi":"https://doi.org/10.1186/s42400-024-00329-2","title":"Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks","display_name":"Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks","publication_year":2025,"publication_date":"2025-04-30","ids":{"openalex":"https://openalex.org/W6922361147","doi":"https://doi.org/10.1186/s42400-024-00329-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00329-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00329-2","pdf_url":null,"source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1186/s42400-024-00329-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yuan Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yuan Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Jiaru Song","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiaru Song","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Yongxiong Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yongxiong Sun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zhanheng Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhanheng Gao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zhe Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhe Hu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Minghui Sun","orcid":"https://orcid.org/0000-0002-1809-8187"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minghui Sun","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":109.3938,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.99957735,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T13459","display_name":"Public Administration and Political Analysis","score":0.06430000066757202,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13459","display_name":"Public Administration and Political Analysis","score":0.06430000066757202,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13135","display_name":"Communism, Protests, Social Movements","score":0.04820000007748604,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13484","display_name":"German History and Society","score":0.04010000079870224,"subfield":{"id":"https://openalex.org/subfields/1202","display_name":"History"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6728000044822693},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38429999351501465},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.3732999861240387},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.3720000088214874},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.34619998931884766},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.3440999984741211},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.3425000011920929},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.3359000086784363}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7698000073432922},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6728000044822693},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45509999990463257},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38429999351501465},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.3732999861240387},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36579999327659607},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.3440999984741211},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3425000011920929},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.3359000086784363},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.3109999895095825},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3100000023841858},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3068999946117401},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3037000000476837},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2919999957084656},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2775999903678894},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.27379998564720154},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2718000113964081},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.25130000710487366},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00329-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00329-2","pdf_url":null,"source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:965a17620dbb4559adf3b2daa649ef58","is_oa":true,"landing_page_url":"https://doaj.org/article/965a17620dbb4559adf3b2daa649ef58","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-19 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00329-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00329-2","pdf_url":null,"source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5379042625427246}],"awards":[{"id":"https://openalex.org/G3107299211","display_name":null,"funder_award_id":"61872164","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,127,141,157],"modern":[2],"vehicle":[3,189],"employs":[4,117],"the":[5,20,27,73,76,152,194],"Controller":[6],"Area":[7],"Network":[8],"(CAN)":[9],"to":[10,30,59,65,91,183,192],"facilitate":[11],"communication":[12],"among":[13],"its":[14],"electronic":[15],"control":[16],"units":[17],"(ECUs).":[18],"However,":[19],"absence":[21],"of":[22,87,154,198],"encryption":[23],"and":[24,84,188,191,217],"authentication":[25],"renders":[26],"CAN":[28,36,115],"vulnerable":[29],"various":[31,185],"attacks.":[32],"Existing":[33],"deep":[34,45],"learning-based":[35,110],"intrusion":[37,111,139],"detection":[38,112,215],"systems":[39],"face":[40],"several":[41],"challenges.":[42],"Firstly,":[43],"traditional":[44],"learning":[46,182],"models":[47,177],"are":[48,178],"inadequate":[49],"in":[50,54,213],"capturing":[51],"long-range":[52],"dependencies":[53],"message":[55],"sequences.":[56],"Secondly,":[57],"due":[58],"privacy":[60],"concerns,":[61],"it":[62],"is":[63,135,144,149,160],"challenging":[64],"aggregate":[66],"large":[67],"datasets":[68,205],"centrally":[69],"for":[70,114,138,151],"training.":[71],"At":[72],"same":[74],"time,":[75],"data":[77,174],"from":[78],"individual":[79],"providers":[80],"often":[81],"exhibit":[82],"imbalance":[83],"a":[85,97,107,123,131,145,168],"scarcity":[86],"anomalous":[88],"samples,":[89],"leading":[90],"suboptimal":[92],"model":[93],"performance":[94,216],"when":[95],"using":[96],"single":[98],"dataset.":[99],"To":[100,172],"address":[101,193],"these":[102],"issues,":[103],"this":[104],"paper":[105],"proposes":[106],"two-stage":[108],"federated":[109,181],"system":[113],"which":[116,134,148],"an":[118,163],"Encoder-only":[119,164],"Transformer":[120,165],"network":[121,166],"with":[122,167],"multi-head":[124,169],"self-attention":[125,170],"mechanism.":[126,171],"initial":[128],"stage":[129,143],"comprises":[130],"single-class":[132],"classifier,":[133,147],"specifically":[136],"designed":[137],"detection.":[140],"subsequent":[142],"multi-class":[146],"employed":[150],"classification":[153],"attack":[155],"types.":[156],"entire":[158],"architecture":[159],"based":[161],"on":[162,202],"protect":[173],"privacy,":[175],"generic":[176],"trained":[179],"by":[180],"cover":[184],"driving":[186],"scenarios":[187],"states,":[190],"non-independent-identical-distribution":[195],"(non-iid)":[196],"problem":[197],"crowdsourced":[199],"data.":[200],"Experiments":[201],"two":[203],"public":[204],"demonstrate":[206],"that":[207],"our":[208],"approach":[209],"outperforms":[210],"existing":[211],"methods":[212],"both":[214],"speed.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":9}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
