{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T22:19:08Z","timestamp":1755037148785,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031314681"},{"type":"electronic","value":"9783031314698"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-31469-8_6","type":"book-chapter","created":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T16:01:50Z","timestamp":1682611310000},"page":"83-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Federated Learning for\u00a0the\u00a0Efficient Detection of\u00a0Steganographic Threats Hidden in\u00a0Image Icons"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9991-5021","authenticated-orcid":false,"given":"Nunziato","family":"Cassavia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6466-3354","authenticated-orcid":false,"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7711-9833","authenticated-orcid":false,"given":"Massimo","family":"Guarascio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9402-7375","authenticated-orcid":false,"given":"Angelica","family":"Liguori","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Surace","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6932-3199","authenticated-orcid":false,"given":"Marco","family":"Zuppelli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,28]]},"reference":[{"key":"6_CR1","first-page":"50","volume":"13","author":"N Cassavia","year":"2022","unstructured":"Cassavia, N., Caviglione, L., Guarascio, M., Manco, G., Zuppelli, M.: Detection of steganographic threats targeting digital images in heterogeneous ecosystems through machine learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 13, 50\u201367 (2022)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"issue":"5","key":"6_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MSEC.2022.3178205","volume":"20","author":"L Caviglione","year":"2022","unstructured":"Caviglione, L., Mazurczyk, W.: Never mind the malware, here\u2019s the stegomalware. IEEE Securi. Priv. 20(5), 101\u2013106 (2022)","journal-title":"IEEE Securi. Priv."},{"issue":"3","key":"6_CR3","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727\u2013752 (2010)","journal-title":"Signal Process."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Gibert, D., Mateu, C., Planes, J.: The rise of machine learning for detection and classification of malware: research developments, trends and challenges. J. Netw. Comput. Appl. 153, 102526 (2020)","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"6_CR5","first-page":"634","volume":"1\u20133","author":"M Guarascio","year":"2018","unstructured":"Guarascio, M., Manco, G., Ritacco, E.: Deep learning. Encycl. Bioinform. Comput. Biol.: ABC Bioinform. 1\u20133, 634\u2013647 (2018)","journal-title":"Encycl. Bioinform. Comput. Biol.: ABC Bioinform."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Guarascio, M., Zuppelli, M., Cassavia, N., Caviglione, L., Manco, G.: Revealing MageCart-like threats in favicons via artificial intelligence. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1\u20137 (2022)","DOI":"10.1145\/3538969.3544437"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/MWC.2015.7054729","volume":"22","author":"D He","year":"2015","unstructured":"He, D., Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22(1), 138\u2013144 (2015)","journal-title":"IEEE Wirel. Commun."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"6_CR9","first-page":"1929","volume":"15","author":"GE Hinton","year":"2014","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"6_CR10","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.R.: Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580 (2012)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Hsu, R.H., et al.: A privacy-preserving federated learning system for Android malware detection based on edge computing. In: 15th Asia Joint Conference on Information Security (AsiaJCIS), pp. 128\u2013136. IEEE (2020)","DOI":"10.1109\/AsiaJCIS50894.2020.00031"},{"issue":"7","key":"6_CR12","doi-asserted-by":"publisher","first-page":"919","DOI":"10.3390\/e24070919","volume":"24","author":"C Jiang","year":"2022","unstructured":"Jiang, C., Yin, K., Xia, C., Huang, W.: FedHGCDroid: an adaptive multi-dimensional federated learning for privacy-preserving Android malware classification. Entropy 24(7), 919 (2022)","journal-title":"Entropy"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Lin, K.Y., Huang, W.R.: Using federated learning on malware classification. In: 2020 22nd International Conference on Advanced Communication Technology (ICACT), pp. 585\u2013589. IEEE (2020)","DOI":"10.23919\/ICACT48636.2020.9061261"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/MSP.2015.33","volume":"13","author":"W Mazurczyk","year":"2015","unstructured":"Mazurczyk, W., Caviglione, L.: Information hiding as a challenge for malware detection. IEEE Secur. Priv. 13(2), 89\u201393 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Monika, A., Eswari, R.: Prevention of hidden information security attacks by neutralizing stego-malware. Comput. Electr. Eng. 101, 107990 (2022)","DOI":"10.1016\/j.compeleceng.2022.107990"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47\u201366 (2013)","journal-title":"Comput. Secur."},{"key":"6_CR17","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on International Conference on Machine Learning (ICML), Haifa, Israel, pp. 807\u2013814 (2010)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Oz, H., Aris, A., Levi, A., Uluagac, A.S.: A survey on ransomware: evolution, taxonomy, and defense solutions. ACM Comput. Surv. 54(11s), 1\u201337 (2022)","DOI":"10.1145\/3514229"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","volume":"6","author":"A Papageorgiou","year":"2018","unstructured":"Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390\u20139403 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"6_CR20","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MTS.2020.3031848","volume":"39","author":"A Pawlicka","year":"2020","unstructured":"Pawlicka, A., Jaroszewska-Choras, D., Choras, M., Pawlicki, M.: Guidelines for stego\/malware detection tools: achieving GDPR compliance. IEEE Technol. Soc. Mag. 39(4), 60\u201370 (2020)","journal-title":"IEEE Technol. Soc. Mag."},{"issue":"6","key":"6_CR21","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/MNET.011.2000286","volume":"34","author":"SA Rahman","year":"2020","unstructured":"Rahman, S.A., Tout, H., Talhi, C., Mourad, A.: Internet of things intrusion detection: centralized, on-device, or federated learning? IEEE Netw. 34(6), 310\u2013317 (2020)","journal-title":"IEEE Netw."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Shamili, A.S., Bauckhage, C., Alpcan, T.: Malware detection on mobile devices using distributed machine learning. In: 20th International Conference on Pattern Recognition, pp. 4348\u20134351. IEEE (2010)","DOI":"10.1109\/ICPR.2010.1057"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-319-16745-9_27","volume-title":"Information Security and Cryptology","author":"G Suarez-Tangil","year":"2015","unstructured":"Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P.: Stegomalware: playing hide and seek with malicious components in smartphone apps. In: Lin, D., Yung, M., Zhou, J. (eds.) Inscrypt 2014. LNCS, vol. 8957, pp. 496\u2013515. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16745-9_27"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Tian, P., Chen, Z., Yu, W., Liao, W.: Towards asynchronous federated learning based threat detection: a DC-Adam approach. Comput. Secur. 108, 102344 (2021)","DOI":"10.1016\/j.cose.2021.102344"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Wang, H., Li, H., Guo, Y.: Understanding the evolution of mobile app ecosystems: a longitudinal measurement study of Google Play. In: The World Wide Web conference, pp. 1988\u20131999 (2019)","DOI":"10.1145\/3308558.3313611"},{"key":"6_CR26","unstructured":"Wortsman, M., et al.: Model soups: averaging weights of multiple fine-tuned models improves accuracy without increasing inference time. In: Chaudhuri, K., Jegelka, S., Song, L., Szepesvari, C., Niu, G., Sabato, S. (eds.) Proceedings of the 39th International Conference on Machine Learning, vol. 162, pp. 23965\u201323998. PMLR (2022)"},{"issue":"2","key":"6_CR27","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1109\/TNSE.2020.2996612","volume":"8","author":"H Yang","year":"2020","unstructured":"Yang, H., He, H., Zhang, W., Cao, X.: FedSteg: a federated transfer learning framework for secure image steganalysis. IEEE Trans. Netw. Sci. Eng. 8(2), 1084\u20131094 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"6_CR28","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: DroidDetector: Android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114\u2013123 (2016)","journal-title":"Tsinghua Sci. Technol."},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 317\u2013326 (2012)","DOI":"10.1145\/2133601.2133640"},{"key":"6_CR30","unstructured":"Zuppelli, M., Manco, G., Caviglione, L., Guarascio, M.: Sanitization of images containing stegomalware via machine learning approaches. In: Proceedings of the Italian Conference on Cybersecurity (ITASEC), vol. 2940, pp. 374\u2013386 (2021)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Pervasive Knowledge and Collective Intelligence on Web and Social Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-31469-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T16:05:58Z","timestamp":1682611558000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-31469-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031314681","9783031314698"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-31469-8_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PerSOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pervasive Knowledge and Collective Intelligence on Web and Social Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Messina","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"persom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}