{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:29:49Z","timestamp":1772198989130,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_11","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:02:37Z","timestamp":1760364157000},"page":"202-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Federated Intrusion Detection Under Non-IID Traffic"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7870-2917","authenticated-orcid":false,"given":"Ziang","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4621-3407","authenticated-orcid":false,"given":"Xiuheng","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6720-5850","authenticated-orcid":false,"given":"Buzhen","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5107-7070","authenticated-orcid":false,"given":"Shuai","family":"Shang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5854-034X","authenticated-orcid":false,"given":"Tianhui","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6461-9684","authenticated-orcid":false,"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"issue":"10","key":"11_CR1","doi-asserted-by":"publisher","first-page":"10611","DOI":"10.1007\/s11227-023-05073-x","volume":"79","author":"A Abdelkhalek","year":"2023","unstructured":"Abdelkhalek, A., Mashaly, M.: Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning. J. Supercomput. 79(10), 10611\u201310644 (2023)","journal-title":"J. Supercomput."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","volume":"195","author":"S Agrawal","year":"2022","unstructured":"Agrawal, S., et al.: Federated learning for intrusion detection system: concepts, challenges and future directions. Comput. Commun. 195, 346\u2013361 (2022)","journal-title":"Comput. Commun."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Almeida, L., Rodrigues, P., Teixeira, R., Antunes, M., Aguiar, R.L.: Privacy-preserving defense: intrusion detection in IoT using federated learning. In: 2024 IEEE 22nd Mediterranean Electrotechnical Conference (MELECON), pp. 908\u2013913. IEEE (2024)","DOI":"10.1109\/MELECON56669.2024.10608461"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Byrd, D., Polychroniadou, A.: Differentially private secure multi-party computation for federated learning in financial applications. In: Proceedings of the First ACM International Conference on AI in Finance, pp.\u00a01\u20139 (2020)","DOI":"10.1145\/3383455.3422562"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100\u2013123 (2014)","DOI":"10.1016\/j.cose.2014.05.011"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/TCSS.2022.3232192","volume":"10","author":"A Gupta","year":"2023","unstructured":"Gupta, A., Misra, S., Pathak, N., Das, D.: Fedcare: federated learning for resource-constrained healthcare devices in iomt system. IEEE Trans. Comput. Soc. Syst. 10(4), 1587\u20131596 (2023)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Herwig, S., Harvey, K., Hughey, G., Roberts, R., Levin, D.: Measurement and analysis of hajime, a peer-to-peer iot botnet. In: Network and Distributed Systems Security (NDSS) Symposium (2019)","DOI":"10.14722\/ndss.2019.23488"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"670","DOI":"10.26599\/TST.2023.9010091","volume":"30","author":"Z Hu","year":"2024","unstructured":"Hu, Z., Li, D., Yang, K., Xu, Y., Peng, B.: Optimizing data distributions based on Jensen-Shannon divergence for federated learning. Tsinghua Sci. Technol. 30(2), 670\u2013681 (2024)","journal-title":"Tsinghua Sci. Technol."},{"issue":"1","key":"11_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s00779-019-01332-y","volume":"25","author":"J Lee","year":"2021","unstructured":"Lee, J., Park, K.: Gan-based imbalanced data intrusion detection system. Pers. Ubiquit. Comput. 25(1), 121\u2013128 (2021)","journal-title":"Pers. Ubiquit. Comput."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Liu, T., Li, P., Gu, Y.: Glint: decentralized federated graph learning with traffic throttling and flow scheduling. In: 2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS), pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/IWQOS52092.2021.9521331"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TGCN.2022.3187149","volume":"7","author":"T Liu","year":"2022","unstructured":"Liu, T., Li, P., Gu, Y., Su, Z.: S-glint: secure federated graph learning with traffic throttling and flow scheduling. IEEE Trans. Green Commun. Network. 7(2), 894\u2013903 (2022)","journal-title":"IEEE Trans. Green Commun. Network."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Liu, T., Pan, S., Li, P.: Exploring server-side data in federated learning: an empirical study. In: 2024 IEEE\/CIC International Conference on Communications in China (ICCC), pp. 1379\u20131384. IEEE (2024)","DOI":"10.1109\/ICCC62479.2024.10681848"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-030-86130-8_16","volume-title":"Wireless Algorithms, Systems, and Applications","author":"W Mou","year":"2021","unstructured":"Mou, W., Fu, C., Lei, Y., Hu, C.: A verifiable federated learning scheme based on secure multi-party computation. In: Liu, Z., Wu, F., Das, S.K. (eds.) WASA 2021. LNCS, vol. 12938, pp. 198\u2013209. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86130-8_16"},{"issue":"6","key":"11_CR14","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/MWC.001.2100102","volume":"28","author":"DC Nguyen","year":"2021","unstructured":"Nguyen, D.C., et al.: Federated learning for industrial internet of things in future industries. IEEE Wirel. Commun. 28(6), 192\u2013199 (2021)","journal-title":"IEEE Wirel. Commun."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Qiu, C., Wu, Z., Wang, H., Yang, Q., Wang, Y., Su, C.: Hierarchical aggregation for federated learning in heterogeneous iot scenarios: enhancing privacy and communication efficiency. Future Internet 17(1) (2025)","DOI":"10.3390\/fi17010018"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Rahma, F., Rachmadi, R.F., Pratomo, B.A., Purnomo, M.H.: Assessing the effectiveness of oversampling and undersampling techniques for intrusion detection on an imbalanced dataset. In: 2023 IEEE Industrial Electronics and Applications Conference (IEACon), pp. 92\u201397. IEEE (2023)","DOI":"10.1109\/IEACon57683.2023.10370430"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Raza, M., Saeed, M.J., Riaz, M.B., Sattar, M.A.: Federated learning for privacy preserving intrusion detection in software defined networks. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3395997"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Singla, A., Bertino, E., Verma, D.: Preparing network intrusion detection deep learning models with minimal data using adversarial domain adaptation. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 127\u2013140 (2020)","DOI":"10.1145\/3320269.3384718"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"4488","DOI":"10.1109\/TIFS.2023.3293417","volume":"18","author":"K Wei","year":"2023","unstructured":"Wei, K., et al.: Personalized federated learning with differential privacy and convergence guarantee. IEEE Trans. Inf. Forensics Secur. 18, 4488\u20134503 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"49730","DOI":"10.1109\/ACCESS.2020.2980136","volume":"8","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Bian, N.: An intrusion detection method using few-shot learning. IEEE Access 8, 49730\u201349740 (2020)","journal-title":"IEEE Access"},{"key":"11_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775","volume":"216","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Xie, Y., Bai, H., Yu, B., Li, W., Gao, Y.: A survey on federated learning. Knowl.-Based Syst. 216, 106775 (2021)","journal-title":"Knowl.-Based Syst."}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:00Z","timestamp":1772196480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}