Federated graph neural networks: Overview, techniques, and challenges

R Liu, P Xing, Z Deng, A Li, C Guan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Graph neural networks (GNNs) have attracted extensive research attention in recent years
due to their capability to progress with graph data and have been widely used in practical …

A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges

M Zhong, M Lin, C Zhang, Z Xu - Computers & Security, 2024 - Elsevier
Intrusion detection systems (IDS) play a crucial role in maintaining network security. With the
increasing sophistication of cyber attack methods, traditional detection approaches are …

Many-objective optimization based intrusion detection for in-vehicle network security

J Zhang, B Gong, M Waqas, S Tu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In-vehicle network security plays a vital role in ensuring the secure information transfer
between vehicle and Internet. The existing research is still facing great difficulties in …

Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks

M Almehdhar, A Albaseer, MA Khan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
The rapid evolution of modern automobiles into intelligent and interconnected entities
presents new challenges in cybersecurity, particularly in Intrusion Detection Systems (IDS) …

A novel self-supervised learning-based anomalous node detection method based on an autoencoder for wireless sensor networks

M Ye, Q Zhang, X Xue, Y Wang, Q Jiang… - IEEE Systems …, 2024 - ieeexplore.ieee.org
To address the issue that existing wireless sensor network (WSN)-based anomaly detection
methods only consider and analyze temporal features, in this article, a self-supervised …

Channel Prediction-Based Security Authentication for Artificial Intelligence of Things

X Qiu, J Yu, W Zhuang, G Li, X Sun - Sensors, 2023 - mdpi.com
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are
capable of outperforming traditional isolated approaches, with the advantage of having …

Detecting Generated Images by Real Images Only

X Bi, B Liu, F Yang, B Xiao, W Li, G Huang… - arXiv preprint arXiv …, 2023 - arxiv.org
As deep learning technology continues to evolve, the images yielded by generative models
are becoming more and more realistic, triggering people to question the authenticity of …

[HTML][HTML] Reconfigurable can intrusion detection and response system

R Saini, R Islam - Electronics, 2024 - mdpi.com
The controller area network (CAN) remains the de facto standard for intra-vehicular
communication. CAN enables reliable communication between various microcontrollers and …

Application-Layer Anomaly Detection Leveraging Time-Series Physical Semantics in CAN-FD Vehicle Networks

R Zhao, C Luo, F Gao, Z Gao, L Li, D Zhang, W Yang - Electronics, 2024 - mdpi.com
The Controller Area Network with Flexible Data-Rate (CAN-FD) bus is the predominant in-
vehicle network protocol, responsible for transmitting crucial application semantic signals …

DGIDS: Dynamic graph-based intrusion detection system for CAN

J Song, G Qin, Y Liang, J Yan, M Sun - Computers & Security, 2024 - Elsevier
Abstract The Controller Area Network (CAN) is widely used in automobiles to interconnect
safety-critical electronic control units (ECUs). Unfortunately, CAN does not have inherent …