2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Sma 2023
DOI: 10.1109/bigdatasecurity-hpsc-ids58521.2023.00031
|View full text |Cite
|
Sign up to set email alerts
|

ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…The publicly accessible VeReMi dataset was explicitly developed for analyzing mechanisms to detect misbehavior in VANETs. The authors of [16,58,60] employed the Car-Hacking dataset derived from the "Car Hacking: Attack & Defense Challenge" competition held in 2020. Additionally, some papers used simulated datasets, such as [54], where a simulated dataset was employed to evaluate the effectiveness of their proposed approach in vehicle-to-vehicle and ve-hicle-to-infrastructure scenarios.…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…The publicly accessible VeReMi dataset was explicitly developed for analyzing mechanisms to detect misbehavior in VANETs. The authors of [16,58,60] employed the Car-Hacking dataset derived from the "Car Hacking: Attack & Defense Challenge" competition held in 2020. Additionally, some papers used simulated datasets, such as [54], where a simulated dataset was employed to evaluate the effectiveness of their proposed approach in vehicle-to-vehicle and ve-hicle-to-infrastructure scenarios.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…• Attacks detected: Within the domain of FL-based IDSs for IoV, numerous research papers have put forth methodologies to identify a diverse range of cyber threats. DoS attacks [47,52,[57][58][59][60]63] and constant attacks [53,55,61] are the most frequently discussed types of attacks in the literature. In addition, some authors emphasized specific attacks, such as the Sybil assault [56] and the black hole attack [54].…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 3 more Smart Citations