{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:05:26Z","timestamp":1748664326720,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031935015","type":"print"},{"value":"9783031935022","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-93502-2_11","type":"book-chapter","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:15:31Z","timestamp":1748582131000},"page":"160-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of\u00a0a Hierarchical Federated Generative Learning Based Smart Home System"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Drefahl","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Kostage","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Peppers","sequence":"additional","affiliation":[]},{"given":"Wenbin","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Mazzola","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7936-4813","authenticated-orcid":false,"given":"Chengyi","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"issue":"8","key":"11_CR1","doi-asserted-by":"publisher","first-page":"6247","DOI":"10.1109\/JIOT.2020.3024800","volume":"8","author":"PF de Araujo-Filho","year":"2020","unstructured":"de Araujo-Filho, P.F., Kaddoum, G., Campelo, D.R., Santos, A.G., Mac\u00eado, D., Zanchettin, C.: Intrusion detection for cyber-physical systems using generative adversarial networks in fog environment. IEEE Internet Things J. 8(8), 6247\u20136256 (2020)","journal-title":"IEEE Internet Things J."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Ashraf, A., Zhu, X., Liu, J., Rauf, Q., Firdaus, R.: Usability evaluation framework of smart home applications for senior citizens. In: 2022 12th International Conference on Software Technology and Engineering (ICSTE), pp. 29\u201339. IEEE (2022)","DOI":"10.1109\/ICSTE57415.2022.00012"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"He, P., et al.: A survey of internet of medical things: technology, application and future directions. Digital Communications and Networks (2024)","DOI":"10.1016\/j.dcan.2024.11.013"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Kostage, K., et al.: Federated learning-enabled network incident anomaly detection optimization for drone swarms. In: ICDCN \u201925: Proceedings of the 26th International Conference on Distributed Computing and Networking, pp. 104\u2013114. ACM (2025). https:\/\/doi.org\/10.1145\/3700838.3700857, https:\/\/doi.org\/10.1145\/3700838.3700857","DOI":"10.1145\/3700838.3700857"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Kostage, K., West, D., Meinert, T., Qu, C., Calyam, P., Mazzola, L.: Enhancing autonomous intrusion detection system with generative adversarial networks. In: 2024 IEEE 20th International Conference on e-Science (e-Science), pp. 1\u201310 (2024). https:\/\/doi.org\/10.1109\/e-Science62913.2024.10678662","DOI":"10.1109\/e-Science62913.2024.10678662"},{"key":"11_CR6","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data (2023). https:\/\/arxiv.org\/abs\/1602.05629"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/COMST.2023.3280465","volume":"25","author":"N Moustafa","year":"2023","unstructured":"Moustafa, N., Koroniotis, N., Keshk, M., Zomaya, A.Y., Tari, Z.: Explainable intrusion detection for cyber defences in the internet of things: opportunities and solutions. IEEE Commun. Surv. Tutorials 25(3), 1775\u20131807 (2023). https:\/\/doi.org\/10.1109\/COMST.2023.3280465","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"13","key":"11_CR8","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"E Neto","year":"2023","unstructured":"Neto, E., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: Ciciot 2023: a real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"},{"issue":"10","key":"11_CR9","doi-asserted-by":"publisher","first-page":"13775","DOI":"10.1109\/TVT.2023.3274513","volume":"72","author":"X Pu","year":"2023","unstructured":"Pu, X., Lei, T., Wen, W., Feng, W., Wang, Z., Chen, Q., Jin, S.: Incentive mechanism and resource allocation for collaborative task offloading in energy-efficient mobile edge computing. IEEE Trans. Veh. Technol. 72(10), 13775\u201313780 (2023)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Sadotra, P., Thakur, G., Chouksey, P., Nayak, M.H., Chopra, M.: Intrusion detection in smart homes: a comprehensive review. Environment 4, 11 (2024)","DOI":"10.1109\/ICPIDS65698.2024.00018"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Wickramasinghe, C.I.: Best-practice-based framework for user-centric privacy-preserving solutions in smart home environments. In: International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, pp. 101\u2013120. Springer (2022)","DOI":"10.1007\/978-3-031-34776-4_6"},{"issue":"4","key":"11_CR12","first-page":"29","volume":"6","author":"Z Yu","year":"2024","unstructured":"Yu, Z., Xiangting, L., Yalin, S., Aidi, X., Yi, Z., Hailong, J., Weizheng, S.: Real-time monitoring method for cow rumination behavior based on edge computing and improved mobilenet v3. Smart Agriculture 6(4), 29 (2024)","journal-title":"Smart Agriculture"}],"container-title":["Lecture Notes in Computer Science","Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-93502-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:15:34Z","timestamp":1748582134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-93502-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031935015","9783031935022"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-93502-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}