{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:26:34Z","timestamp":1752549994185,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_16","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"219-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Network Anomaly Detection Using Federated Learning and Transfer Learning"],"prefix":"10.1007","author":[{"given":"Ying","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Junjun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qianling","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Di","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"9","key":"16_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30086-1","volume":"2016","author":"R Brewer","year":"2016","unstructured":"Brewer, R.: Ransomware attacks: detection, prevention and cure. Network Secur. 2016(9), 5\u20139 (2016)","journal-title":"Network Secur."},{"issue":"2","key":"16_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSEC.2019.2920585","volume":"18","author":"D Carlin","year":"2019","unstructured":"Carlin, D., Burgess, J., O\u2019Kane, P., Sezer, S.: You could be mine (d): the rise of cryptojacking. IEEE Secur. Priv. 18(2), 16\u201322 (2019)","journal-title":"IEEE Secur. Priv."},{"issue":"6","key":"16_CR3","first-page":"1073","volume":"23","author":"Y Shui","year":"2011","unstructured":"Shui, Y., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discriminating ddos attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073\u20131080 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"16_CR4","first-page":"412","volume":"22","author":"Y Shui","year":"2010","unstructured":"Shui, Y., Zhou, W., Doss, R., Jia, W.: Traceback of ddos attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22(3), 412\u2013425 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"16_CR5","first-page":"1418","volume":"65","author":"Y Shui","year":"2015","unstructured":"Shui, Y., Zhou, W., Guo, S., Guo, M.: A feasible ip traceback framework through dynamic deterministic packet marking. IEEE Trans. Comput. 65(5), 1418\u20131427 (2015)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"16_CR6","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/TPDS.2013.181","volume":"25","author":"S Yu","year":"2013","unstructured":"Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat ddos attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245\u20132254 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"16_CR7","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2013","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303\u2013336 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR8","unstructured":"McMahan, HB., et al.: Communication-efficient learning of deep networks from decentralized data (2016). arXiv preprint arXiv:1602.05629"},{"key":"16_CR9","unstructured":"Kone\u010dn\u1ef3, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: Strategies for improving communication efficiency (2016). arXiv preprint arXiv:1610.05492"},{"key":"16_CR10","unstructured":"Lin, Z., Shi, Y., Xue, Z.: IDSGAN: Generative adversarial networks for attack generation against intrusion detection (2018). arXiv preprint arXiv:1809.02077"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Usama, M., et al.: Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 78\u201383. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766353"},{"issue":"1","key":"16_CR12","first-page":"139","volume":"64","author":"Y Shui","year":"2013","unstructured":"Shui, Y., Guo, S., Stojmenovic, I.: Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans. Comput. 64(1), 139\u2013151 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"Y Shui","year":"2016","unstructured":"Shui, Y.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"issue":"1","key":"16_CR14","first-page":"531","volume":"19","author":"Y Shui","year":"2016","unstructured":"Shui, Y., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutorials 19(1), 531\u2013549 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR15","unstructured":"Bakopoulou, E., Tillman, B., Markopoulou, A.: A federated learning approach for mobile packet classification (2019). arXiv preprint arXiv:1907.13113"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chen, J., Wu, D., Teng, J., Yu, S.: Multi-task network anomaly detection using federated learning. In: Proceedings of the Tenth International Symposium on Information and Communication Technology, pp. 273\u2013279 (2019)","DOI":"10.1145\/3368926.3369705"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss, K., Khoshgoftaar, T.M., Wang, D.D.: A survey of transfer learning. J. Big Data 3(1), 1\u201340 (2016). https:\/\/doi.org\/10.1186\/s40537-016-0043-6","journal-title":"J. Big Data"},{"issue":"10","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2009","unstructured":"Pan, S.J., Yang, Q., Sinno Jialin Pan and Qiang Yang: A survey on transfer learning. IEEE Transactions on knowledge and data engineering 22(10), 1345\u20131359 (2009)","journal-title":"IEEE Transactions on knowledge and data engineering"},{"key":"16_CR19","unstructured":"Chen, Y., Wang, J., Yu, C., Gao, W., Qin, X.: Fedhealth: A federated transfer learning framework for wearable healthcare (2019). arXiv preprint arXiv:1907.09173"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Wu, P., Guo, H., Buckland, R.: A transfer learning approach for network intrusion detection. In: 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), pp. 281\u2013285. IEEE (2019)","DOI":"10.1109\/ICBDA.2019.8713213"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Singla, A., Bertino, E., Verma, D.: Overcoming the lack of labeled data: Training intrusion detection models using transfer learning. In: 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 69\u201374. IEEE (2019)","DOI":"10.1109\/SMARTCOMP.2019.00031"},{"key":"16_CR22","unstructured":"Maas, A.L., Hannun, A.Y., Ng, A.Y.: Rectifier nonlinearities improve neural network acoustic models. In: Proceedings of the International Conference on Machine Learning, vol. 30, p. 3 (2013)"},{"key":"16_CR23","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/JIOT.2020.2977383","volume":"7","author":"Y Qu","year":"2020","unstructured":"Qu, Y., et al.: Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet Things J. 7, 6 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"16_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"16_CR26","unstructured":"Chollet, F., et al.: Keras (2015). https:\/\/github.com\/fchollet\/keras"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Tzeng, E., Hoffman, J., Saenko, K., Darrell, T.: Adversarial discriminative domain adaptation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7167\u20137176 (2017)","DOI":"10.1109\/CVPR.2017.316"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:26:54Z","timestamp":1619317614000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}