{"id":"https://openalex.org/W7143344475","doi":"https://doi.org/10.48550/arxiv.2603.25763","title":"CANGuard: A Spatio-Temporal CNN-GRU-Attention Hybrid Architecture for Intrusion Detection in In-Vehicle CAN Networks","display_name":"CANGuard: A Spatio-Temporal CNN-GRU-Attention Hybrid Architecture for Intrusion Detection in In-Vehicle CAN Networks","publication_year":2026,"publication_date":"2026-03-26","ids":{"openalex":"https://openalex.org/W7143344475","doi":"https://doi.org/10.48550/arxiv.2603.25763"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.25763","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.25763","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.25763","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130992955","display_name":"Rakib Hossain Sajib","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sajib, Rakib Hossain","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119761654","display_name":"Md. Rokon Mia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mia, Md. Rokon","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049607460","display_name":"Prodip Kumar Sarker","orcid":"https://orcid.org/0009-0003-4411-3816"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sarker, Prodip Kumar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035298652","display_name":"Md. Abdullah Al Noman","orcid":"https://orcid.org/0000-0001-9093-922X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Noman, Abdullah Al","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5130996676","display_name":"Md Arifur Rahman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rahman, Md Arifur","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5130992955"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.010200000368058681,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10524","display_name":"Traffic control and management","score":0.002899999963119626,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6363000273704529},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6327999830245972},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5460000038146973},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5051000118255615},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4366999864578247},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4221999943256378},{"id":"https://openalex.org/keywords/systems-architecture","display_name":"Systems architecture","score":0.3684000074863434},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3675999939441681}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6869999766349792},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6363000273704529},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6327999830245972},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5460000038146973},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5051000118255615},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.483599990606308},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4366999864578247},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4221999943256378},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4196000099182129},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.3684000074863434},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3675999939441681},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36169999837875366},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3538999855518341},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.32089999318122864},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.31709998846054077},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.31520000100135803},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2806999981403351},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25589999556541443},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.25763","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.25763","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.25763","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.25763","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.5659506916999817,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,115,182],"Internet":[1],"of":[2,10,67,75,149,167],"Vehicles":[3],"(IoV)":[4],"has":[5,25],"become":[6],"an":[7,107],"essential":[8],"component":[9],"smart":[11],"transportation":[12,36],"systems,":[13],"enabling":[14],"seamless":[15],"interaction":[16],"among":[17],"vehicles":[18],"and":[19,35,48,106,119,132,134,146,153,170,190,201],"infrastructure.":[20],"In":[21],"recent":[22],"years,":[23],"it":[24],"played":[26],"a":[27,68,90,157],"progressively":[28],"significant":[29,177],"role":[30],"in":[31,194],"enhancing":[32],"mobility,":[33],"safety,":[34],"efficiency.":[37],"However,":[38],"this":[39,84,86],"connectivity":[40],"introduces":[41],"severe":[42],"security":[43,192],"vulnerabilities,":[44],"particularly":[45],"Denial-of-Service":[46],"(DoS)":[47],"spoofing":[49],"attacks":[50],"targeting":[51],"the":[52,64,122,144,150,164,168,175],"Controller":[53],"Area":[54],"Network":[55],"(CAN)":[56],"bus,":[57],"which":[58,172],"could":[59],"severely":[60],"inhibit":[61],"communication":[62],"between":[63],"critical":[65],"components":[66],"vehicle,":[69],"leading":[70],"to":[71,110,162],"system":[72],"malfunctions,":[73],"loss":[74],"control,":[76],"or":[77],"even":[78],"endangering":[79],"passengers'":[80],"safety.":[81],"To":[82],"address":[83],"problem,":[85],"paper":[87],"presents":[88],"CANGuard,":[89],"novel":[91],"spatio-temporal":[92],"deep":[93],"learning":[94],"architecture":[95],"that":[96],"combines":[97],"Convolutional":[98],"Neural":[99],"Networks":[100],"(CNN),":[101],"Gated":[102],"Recurrent":[103],"Units":[104],"(GRU),":[105],"attention":[108,154],"mechanism":[109],"effectively":[111],"identify":[112],"such":[113],"attacks.":[114],"model":[116,169],"is":[117,160],"trained":[118],"evaluated":[120],"on":[121,179],"CICIoV2024":[123],"dataset,":[124],"achieving":[125],"competitive":[126],"performance":[127],"across":[128],"accuracy,":[129],"precision,":[130],"recall,":[131],"F1-score":[133],"outperforming":[135],"existing":[136],"state-of-the-art":[137],"methods.":[138],"A":[139],"comprehensive":[140],"ablation":[141],"study":[142],"confirms":[143],"individual":[145],"combined":[147],"contributions":[148],"CNN,":[151],"GRU,":[152],"components.":[155],"Additionally,":[156],"SHAP":[158],"analysis":[159],"conducted":[161],"interpret":[163],"decision-making":[165],"process":[166],"determine":[171],"features":[173],"have":[174],"most":[176],"impact":[178],"intrusion":[180],"detection.":[181],"proposed":[183],"approach":[184],"demonstrates":[185],"strong":[186],"potential":[187],"for":[188],"practical":[189],"scalable":[191],"enhancements":[193],"modern":[195],"IoV":[196],"environments,":[197],"thereby":[198],"ensuring":[199],"safer":[200],"more":[202],"secure":[203],"CAN":[204],"bus":[205],"communications.":[206]},"counts_by_year":[],"updated_date":"2026-03-31T06:07:48.031334","created_date":"2026-03-31T00:00:00"}
