{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:59:00Z","timestamp":1774540740326,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10115-025-02586-0","type":"journal-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T14:22:46Z","timestamp":1758896566000},"page":"12079-12117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Securing healthcare data in mobile edge computing: a hybrid deep learning framework for privacy and anomaly detection"],"prefix":"10.1007","volume":"67","author":[{"given":"Anandh Sam Chandra","family":"Bose","sequence":"first","affiliation":[]},{"given":"M.","family":"Eliazer","sequence":"additional","affiliation":[]},{"given":"B. Uma","family":"Maheswari","sequence":"additional","affiliation":[]},{"given":"A.","family":"Sivaneshkumar","sequence":"additional","affiliation":[]},{"given":"M.","family":"Sumithra","sequence":"additional","affiliation":[]},{"given":"Shamimul","family":"Qamar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,26]]},"reference":[{"issue":"4","key":"2586_CR1","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1007\/s11227-023-05657-7","volume":"80","author":"S Shree","year":"2024","unstructured":"Shree S, Zhou C, Barati M (2024) Data protection in internet of medical things using blockchain and secret sharing method. J Supercomput 80(4):5108\u20135135","journal-title":"J Supercomput"},{"key":"2586_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103720","volume":"86","author":"AK Nair","year":"2023","unstructured":"Nair AK, Sahoo J, Raj ED (2023) Privacy preserving federated learning framework for IoMT based big data analysis using edge computing. Comput Stand Interfaces 86:103720","journal-title":"Comput Stand Interfaces"},{"key":"2586_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103827","volume":"89","author":"M Yang","year":"2024","unstructured":"Yang M, Guo T, Zhu T, Tjuawinata I, Zhao J, Lam KY (2024) Local differential privacy and its applications: a comprehensive survey. Comput Stand Interfaces 89:103827","journal-title":"Comput Stand Interfaces"},{"issue":"4","key":"2586_CR4","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/s10723-023-09695-6","volume":"21","author":"L Meng","year":"2023","unstructured":"Meng L, Li D (2023) Novel edge computing-based privacy-preserving approach for smart healthcare systems in the internet of medical things. J Grid Comput 21(4):66","journal-title":"J Grid Comput"},{"issue":"7","key":"2586_CR5","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.51594\/ijarss.v6i7.1334","volume":"6","author":"GT Igwama","year":"2024","unstructured":"Igwama GT, Olaboye JA, Maha CC, Ajegbile MD, Abdul S (2024) Big data analytics for epidemic forecasting: policy frameworks and technical approaches. Int J Appl Res Soc Sci 6(7):1449\u20131460","journal-title":"Int J Appl Res Soc Sci"},{"key":"2586_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103209","volume":"129","author":"K Sundarakantham","year":"2023","unstructured":"Sundarakantham K, Sivasankar E, Mercy Shalinie S (2023) A hybrid deep learning framework for privacy preservation in edge computing. Comput Secur 129:103209","journal-title":"Comput Secur"},{"issue":"1","key":"2586_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103167","volume":"60","author":"W Wang","year":"2023","unstructured":"Wang W, Li X, Qiu X, Zhang X, Brusic V, Zhao J (2023) A privacy preserving framework for federated learning in smart healthcare systems. Inf Process Manag 60(1):103167","journal-title":"Inf Process Manag"},{"key":"2586_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3414417","author":"J Liu","year":"2024","unstructured":"Liu J, Chang Z, Wang K, Zhao Z, H\u00e4m\u00e4l\u00e4inen T (2024) Energy-efficient and privacy-preserved incentive mechanism for mobile edge computing-assisted federated learning in healthcare system. IEEE Trans Netw Serv Manag. https:\/\/doi.org\/10.1109\/TNSM.2024.3414417","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2586_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2023.100702","volume":"35","author":"FT Materia","year":"2024","unstructured":"Materia FT, Smyth JM (2024) Acceptability and concerns about innovative wearable health sensors in persons with and without chronic disease diagnosis. Internet Interv 35:100702","journal-title":"Internet Interv"},{"key":"2586_CR10","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11036-020-01664-7","volume":"26","author":"MV Babu","year":"2021","unstructured":"Babu MV, Alzubi JA, Sekaran R, Patan R, Ramachandran M, Gupta D (2021) An improved IDAF-FIT clustering based ASLPP-RR routing with secure data aggregation in wireless sensor network. Mob Netw Appl 26:1059\u20131067","journal-title":"Mob Netw Appl"},{"key":"2586_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107077","volume":"150","author":"JA Alzubi","year":"2020","unstructured":"Alzubi JA, Manikandan R, Alzubi OA, Qiqieh I, Rahim R, Gupta D, Khanna A (2020) Hashed Needham Schroeder industrial IoT based cost optimized deep secured data transmission in cloud. Measurement 150:107077","journal-title":"Measurement"},{"key":"2586_CR12","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.csbj.2023.11.038","volume":"23","author":"A Hennebelle","year":"2024","unstructured":"Hennebelle A, Ismail L, Materwala H, Al Kaabi J, Ranjan P, Janardhanan R (2024) Secure and privacy-preserving automated machine learning operations into end-to-end integrated IoT-edge-artificial intelligence-blockchain monitoring system for diabetes mellitus prediction. Comput Struct Biotechnol J 23:212\u2013233","journal-title":"Comput Struct Biotechnol J"},{"key":"2586_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03401-5","author":"AM Hilal","year":"2023","unstructured":"Hilal AM, Alohali MA, Al-Wesabi FN, Nemri N, Alyamani HJ, Gupta D (2023) Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-021-03401-5","journal-title":"Cluster Comput"},{"key":"2586_CR14","doi-asserted-by":"crossref","unstructured":"Xu L, Liu X, Jiang F, Xu Y, Yao A, Xu J, Li X (2023) Multi-featured anomaly detection for mobile edge computing based UAV delivery systems. In\u00a0Proceedings of the 2023 Australasian Computer Science Week\u00a058\u201365.","DOI":"10.1145\/3579375.3579383"},{"key":"2586_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3351648","author":"Q Lin","year":"2024","unstructured":"Lin Q, Jiang S, Zhen Z, Chen T, Wei C, Lin H (2024) Fed-PEMC: a privacy-enhanced federated deep learning algorithm for consumer electronics in mobile edge computing. IEEE Trans Consum Electron. https:\/\/doi.org\/10.1109\/TCE.2024.3351648","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"2586_CR16","doi-asserted-by":"publisher","first-page":"4026","DOI":"10.1109\/TCE.2024.3357115","volume":"70","author":"S Datta","year":"2024","unstructured":"Datta S, Namasudra S (2024) Blockchain-based smart contract model for securing healthcare transactions by using consumer electronics and mobile edge computing. IEEE Trans Consum Electron 70(1):4026\u20134036","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"2586_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1186\/s13677-024-00602-2","volume":"13","author":"M Humayun","year":"2024","unstructured":"Humayun M, Alsirhani A, Alserhani F, Shaheen M, Alwakid G (2024) Transformative synergy: SSEHCET\u2014bridging mobile edge computing and AI for enhanced eHealth security and efficiency. J Cloud Comput 13(1):37","journal-title":"J Cloud Comput"},{"issue":"5","key":"2586_CR18","doi-asserted-by":"publisher","first-page":"2240","DOI":"10.1002\/nem.2240","volume":"33","author":"JA Alzubi","year":"2023","unstructured":"Alzubi JA, Alzubi OA, Singh A, MahmodAlzubi T (2023) A blockchain-enabled security management framework for mobile edge computing. Int J Network Manage 33(5):2240","journal-title":"Int J Network Manage"},{"issue":"4","key":"2586_CR19","doi-asserted-by":"publisher","first-page":"5798","DOI":"10.1109\/JIOT.2023.3308568","volume":"11","author":"H Lee","year":"2023","unstructured":"Lee H, Ryu J, Won D (2023) Secure and anonymous authentication scheme for mobile edge computing environments. IEEE Internet Things J 11(4):5798\u20135815","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2586_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s00607-024-01393-9","volume":"107","author":"I Qiqieh","year":"2025","unstructured":"Qiqieh I, Alzubi J, Alzubi O (2025) DNA cryptography based security framework for health-cloud data. Computing 107(1):35","journal-title":"Computing"},{"issue":"1","key":"2586_CR21","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TII.2022.3189170","volume":"19","author":"JA Alzubi","year":"2022","unstructured":"Alzubi JA, Alzubi OA, Singh A, Ramachandran M (2022) Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated learning. IEEE Trans Ind Inform 19(1):1080\u20131087","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"2586_CR22","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1080\/0952813X.2022.2135611","volume":"36","author":"G Verma","year":"2024","unstructured":"Verma G (2024) Blockchain-based privacy preservation framework for healthcare data in cloud environment. J Exp Theor Artif Intell 36(1):147\u2013160","journal-title":"J Exp Theor Artif Intell"},{"issue":"5","key":"2586_CR23","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1007\/s11276-023-03234-7","volume":"29","author":"S Kumar","year":"2023","unstructured":"Kumar S, Banka H, Kaushik B (2023) Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. Wirel Netw 29(5):2105\u20132126","journal-title":"Wirel Netw"},{"key":"2586_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103464","volume":"158","author":"Q Zhang","year":"2024","unstructured":"Zhang Q, Wang T, Tao Y, Xu N, Chen F, Xie D (2024) Location privacy protection method based on differential privacy in crowdsensing task allocation. Ad Hoc Netw 158:103464","journal-title":"Ad Hoc Netw"},{"key":"2586_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2024.117668","volume":"302","author":"P Han","year":"2024","unstructured":"Han P, Liu Z, Sun Z, Yan C (2024) A novel prediction model for ship fuel consumption considering shipping data privacy: an XGBoost-IGWO-LSTM-based personalized federated learning approach. Ocean Eng 302:117668","journal-title":"Ocean Eng"},{"key":"2586_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2021.101878","volume":"104","author":"T Li","year":"2022","unstructured":"Li T, Wang Z, Lu W, Zhang Q, Li D (2022) Electronic health records based reinforcement learning for treatment optimizing. Inf Syst 104:101878","journal-title":"Inf Syst"},{"key":"2586_CR27","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.1007\/s11227-020-03347-2","volume":"77","author":"N Deepa","year":"2021","unstructured":"Deepa N, Prabadevi B, Maddikunta PK, Gadekallu TR, Baker T, Khan MA, Tariq U (2021) An AI-based intelligent system for healthcare analysis using Ridge-Adaline stochastic gradient descent classifier. J Supercomput 77:1998\u20132017","journal-title":"J Supercomput"},{"issue":"5","key":"2586_CR28","doi-asserted-by":"publisher","first-page":"237","DOI":"10.3390\/systems11050237","volume":"11","author":"QI Ahmed","year":"2023","unstructured":"Ahmed QI, Attar H, Amer A, Deif MA, Solyman AA (2023) Development of a hybrid support vector machine with grey wolf optimization algorithm for detection of the solar power plants anomalies. Systems 11(5):237","journal-title":"Systems"},{"issue":"8","key":"2586_CR29","doi-asserted-by":"publisher","first-page":"2633","DOI":"10.3390\/s24082633","volume":"24","author":"M Ba\u0142dyga","year":"2024","unstructured":"Ba\u0142dyga M, Bara\u0144ski K, Belter J, Kalinowski M, Weichbroth P (2024) Anomaly detection in railway sensor data environments: state-of-the-art methods and empirical performance evaluation. Sensors 24(8):2633","journal-title":"Sensors"},{"key":"2586_CR30","doi-asserted-by":"crossref","unstructured":"Belay MA, Rasheed A, Rossi PS (2024) Sparse non-linear vector autoregressive networks for multivariate time series anomaly detection.\u00a0IEEE Signal Process Lett","DOI":"10.1109\/LSP.2024.3520019"},{"key":"2586_CR31","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.isatra.2023.12.005","volume":"145","author":"AK Mishra","year":"2024","unstructured":"Mishra AK, Paliwal S, Srivastava G (2024) Anomaly detection using deep convolutional generative adversarial networks in the internet of things. ISA Trans 145:493\u2013504","journal-title":"ISA Trans"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02586-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-025-02586-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02586-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:06:53Z","timestamp":1763701613000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-025-02586-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,26]]},"references-count":31,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["2586"],"URL":"https:\/\/doi.org\/10.1007\/s10115-025-02586-0","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,26]]},"assertion":[{"value":"22 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}