{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:19:42Z","timestamp":1773325182835,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031624940","type":"print"},{"value":"9783031624957","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62495-7_21","type":"book-chapter","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T20:19:24Z","timestamp":1719001164000},"page":"274-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Support Vector Based Anomaly Detection in\u00a0Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1483-5021","authenticated-orcid":false,"given":"Massimo","family":"Frasson","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7574-697X","authenticated-orcid":false,"given":"Dario","family":"Malchiodi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,22]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","unstructured":"Albuquerque\u00a0Filho, J.E.D., Brand\u00e3o, L.C.P., Fernandes, B.J.T., Maciel, A.M.A.: A review of neural networks for anomaly detection. IEEE Access 10, 112342\u2013112367 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3216007","DOI":"10.1109\/ACCESS.2022.3216007"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1162\/15324430260185565","volume":"2","author":"A Ben-Hur","year":"2001","unstructured":"Ben-Hur, A., Horn, D., Siegelmann, H., Vapnik, V.: Support vector clustering. J. Mach. Learn. Res. 2, 125\u2013137 (2001). https:\/\/doi.org\/10.1162\/15324430260185565","journal-title":"J. Mach. Learn. Res."},{"key":"21_CR3","doi-asserted-by":"publisher","unstructured":"Boukerche, A., Zheng, L., Alfandi, O.: Outlier detection: methods, models, and classification. ACM Comput. Surv. 53(3) (2020). https:\/\/doi.org\/10.1145\/3381028","DOI":"10.1145\/3381028"},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LoF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD 2000, pp. 93\u2013104. Association for Computing Machinery, New York (2000). https:\/\/doi.org\/10.1145\/342009.335388","DOI":"10.1145\/342009.335388"},{"issue":"17","key":"21_CR5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2024789118","volume":"118","author":"M Chen","year":"2021","unstructured":"Chen, M., Shlezinger, N., Poor, H.V., Eldar, Y.C., Cui, S.: Communication-efficient federated learning. Proc. Natl. Acad. Sci. 118(17), e2024789118 (2021)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Das, A., Kwon, Y.D., Chauhan, J., Mascolo, C.: Enabling on-device smartphone GPU based training: Lessons learned. In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 533\u2013538 (2022). https:\/\/doi.org\/10.1109\/PerComWorkshops53856.2022.9767442","DOI":"10.1109\/PerComWorkshops53856.2022.9767442"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"issue":"3\u20134","key":"21_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014). https:\/\/doi.org\/10.1561\/0400000042","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"21_CR9","unstructured":"Goldstein, M., Dengel, A.: Histogram-based outlier score (HBOS): a fast unsupervised anomaly detection algorithm. In: KI-2012: Poster and Demo Track, vol. 1, pp. 59\u201363 (2012)"},{"issue":"4","key":"21_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE 11(4), 1\u201331 (2016). https:\/\/doi.org\/10.1371\/journal.pone.0152173","journal-title":"PLoS ONE"},{"key":"21_CR11","unstructured":"Gurobi Optimization, LLC: Gurobi Optimizer Reference Manual (2023). https:\/\/www.gurobi.com"},{"key":"21_CR12","unstructured":"Hard, A., et al.: Federated learning for mobile keyboard prediction. arXiv preprint arXiv:1811.03604 (2018)"},{"issue":"9","key":"21_CR13","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He, Z., Xu, X., Deng, S.: Discovering cluster-based local outliers. Pattern Recogn. Lett. 24(9), 1641\u20131650 (2003). https:\/\/doi.org\/10.1016\/S0167-8655(03)00003-5","journal-title":"Pattern Recogn. Lett."},{"key":"21_CR14","unstructured":"Kone\u010dn\u1ef3, J., McMahan, H.B., Ramage, D., Richt\u00e1rik, P.: Federated optimization: distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527 (2016)"},{"key":"21_CR15","unstructured":"Kone\u010dn\u1ef3, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)"},{"issue":"4","key":"21_CR16","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","volume":"9","author":"V Mothukuri","year":"2022","unstructured":"Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., Srivastava, G.: Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 9(4), 2545\u20132554 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3077803","journal-title":"IEEE Internet Things J."},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Nardi, M., Valerio, L., Passarella, A.: Anomaly detection through unsupervised federated learning (2022)","DOI":"10.1109\/MSN57253.2022.00085"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"78658","DOI":"10.1109\/ACCESS.2021.3083060","volume":"9","author":"AB Nassif","year":"2021","unstructured":"Nassif, A.B., Talib, M.A., Nasir, Q., Dakalbab, F.M.: Machine learning for anomaly detection: a systematic review. IEEE Access 9, 78658\u201378700 (2021)","journal-title":"IEEE Access"},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.ins.2022.10.075","volume":"619","author":"J Park","year":"2023","unstructured":"Park, J., Choi, Y., Byun, J., Lee, J., Park, S.: Efficient differentially private kernel support vector classifier for multi-class classification. Inf. Sci. 619, 889\u2013907 (2023). https:\/\/doi.org\/10.1016\/j.ins.2022.10.075","journal-title":"Inf. Sci."},{"key":"21_CR20","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Sater, R.A., Hamza, A.B.: A federated learning approach to anomaly detection in smart buildings (2021)","DOI":"10.1145\/3467981"},{"issue":"7","key":"21_CR22","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"issue":"11\u201313","key":"21_CR23","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1016\/S0167-8655(99)00087-2","volume":"20","author":"DM Tax","year":"1999","unstructured":"Tax, D.M., Duin, R.P.: Support vector domain description. Pattern Recogn. Lett. 20(11\u201313), 1191\u20131199 (1999)","journal-title":"Pattern Recogn. Lett."},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"14663","DOI":"10.1007\/s10462-023-10513-4","volume":"56","author":"D Thakur","year":"2023","unstructured":"Thakur, D., Saini, J.K., Srinivasan, S.: Deepthink IoT: the strength of deep learning in internet of things. Artif. Intell. Rev. 56, 14663\u201314730 (2023). https:\/\/doi.org\/10.1007\/s10462-023-10513-4","journal-title":"Artif. Intell. Rev."},{"key":"21_CR25","doi-asserted-by":"publisher","unstructured":"Thudumu, S., Branch, P., Jin, J., Singh, J.J.: A comprehensive survey of anomaly detection techniques for high dimensional big data. J. Big Data 7(42) (2020). https:\/\/doi.org\/10.1186\/s40537-020-00320-x","DOI":"10.1186\/s40537-020-00320-x"},{"key":"21_CR26","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-57959-7_7","volume-title":"The EU General Data Protection Regulation (GDPR)","author":"P Voigt","year":"2017","unstructured":"Voigt, P., von dem Bussche, A.: Enforcement and fines under the GDPR. In: Voigt, P., von dem Bussche, A. (eds.) The EU General Data Protection Regulation (GDPR), pp. 201\u2013217. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57959-7_7"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62495-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T20:22:19Z","timestamp":1719001339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62495-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031624940","9783031624957"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62495-7_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Corfu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eannconf.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}