{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:32:15Z","timestamp":1768991535393,"version":"3.49.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T00:00:00Z","timestamp":1712102400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T00:00:00Z","timestamp":1712102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10586-024-04356-z","type":"journal-article","created":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T13:03:06Z","timestamp":1712149386000},"page":"7889-7914","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning"],"prefix":"10.1007","volume":"27","author":[{"given":"Tao","family":"Hai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4951-4729","authenticated-orcid":false,"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Muammer","family":"Aksoy","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Karmakar","sequence":"additional","affiliation":[]},{"given":"Sarbajit","family":"Manna","sequence":"additional","affiliation":[]},{"given":"Amrita","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"4356_CR1","doi-asserted-by":"crossref","first-page":"39982","DOI":"10.1109\/ACCESS.2020.2976452","volume":"8","author":"S Abbas","year":"2020","unstructured":"Abbas, S., Khan, M.A., Falcon-Morales, L.E., et al.: Modeling, simulation and optimization of power plant energy sustainability for IoT enabled smart cities empowered with deep extreme learning machine. IEEE Access 8, 39982\u201339997 (2020)","journal-title":"IEEE Access"},{"key":"4356_CR2","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","volume":"195","author":"S Agrawal","year":"2022","unstructured":"Agrawal, S., Sarkar, S., Aouedi, O., et al.: Federated Learning for intrusion detection system: concepts, challenges and future directions. Comput. Commun. 195, 346\u2013361 (2022). https:\/\/doi.org\/10.1016\/j.comcom.2022.09.012","journal-title":"Comput. Commun."},{"key":"4356_CR3","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1016\/j.apenergy.2019.01.091","volume":"238","author":"R Alam","year":"2019","unstructured":"Alam, R., St-Hilaire, M., Kunz, T.: Peer-to-peer energy trading among smart homes. Appl. Energy 238, 1434\u20131443 (2019)","journal-title":"Appl. Energy"},{"key":"4356_CR4","doi-asserted-by":"crossref","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi, O., Moustafa, N., Turnbull, B., et al.: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J. 8, 9463\u20139472 (2020)","journal-title":"IEEE Internet Things J."},{"key":"4356_CR5","doi-asserted-by":"crossref","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","volume":"8","author":"A Alwarafy","year":"2020","unstructured":"Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., et al.: A survey on security and privacy issues in edge computing-assisted internet of things. IEEE Internet Things J. 8, 4004\u20134022 (2020)","journal-title":"IEEE Internet Things J."},{"key":"4356_CR6","first-page":"102673","volume":"56","author":"S Bhavin","year":"2021","unstructured":"Bhavin, S., Tanwar, N., Sharma, S., et al.: Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications. J. Inf. Secur. Appl. 56, 102673 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"4356_CR7","first-page":"1","volume":"2021","author":"Y Chang","year":"2021","unstructured":"Chang, Y., Fang, C., Sun, W.: A blockchain-based federated learning method for smart healthcare. Comput. Intell. Neurosci. 2021, 1\u201312 (2021)","journal-title":"Comput. Intell. Neurosci."},{"key":"4356_CR8","first-page":"451","volume":"9339","author":"M Dolecki","year":"2015","unstructured":"Dolecki, M., Kozera, R.: The impact of the TPM weights distribution on network synchronization time. Comput. Inf. Syst. Ind. Manag. 9339, 451\u2013460 (2015)","journal-title":"Comput. Inf. Syst. Ind. Manag."},{"issue":"11","key":"4356_CR9","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong, T., Huang, T.: Neural cryptography based on complex-valued neural network. IEEE Trans. Neural Netw. Learn. Syst. 31(11), 4999\u20135004 (2020). https:\/\/doi.org\/10.1109\/TNNLS.2019.2955165","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"4356_CR10","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.glohj.2021.11.008","volume":"5","author":"E Mbunge","year":"2021","unstructured":"Mbunge, E., Muchemwa, B., Jiyane, S., et al.: Sensors and healthcare 5.0: transformative shift in virtual care through emerging digital health technologies. Glob. Health J. 5, 169\u2013177 (2021)","journal-title":"Glob. Health J."},{"key":"4356_CR11","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.glohj.2021.11.008","volume":"5","author":"E Mbunge","year":"2021","unstructured":"Haider, A., Adnan Khan, M., Rehman, A., Ur Rahman, M. and Seok Kim, H.: A real-time sequential deep extreme learning machine cybersecurity intrusion detection system. Comput Mater Con. 66(2), 1785\u20131798 (2021)","journal-title":"Glob. Health J."},{"key":"4356_CR12","doi-asserted-by":"crossref","first-page":"737","DOI":"10.3389\/fbioe.2020.00737","volume":"8","author":"B He","year":"2020","unstructured":"He, B., Zhang, Y., Zhou, Z., et al.: A Neural network framework for predicting the tissue-of-origin of 15 common cancer types based on RNA-seq data. Front. Bioeng. Biotechnol. 8, 737 (2020)","journal-title":"Front. Bioeng. Biotechnol."},{"issue":"1","key":"4356_CR13","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1186\/s13643-022-01946-z","volume":"11","author":"S Hu","year":"2022","unstructured":"Hu, S., Chen, W., Hu, H., et al.: Coaching to develop leadership for healthcare managers: a mixed-method systematic review protocol. Syst. Rev. 11(1), 67 (2022)","journal-title":"Syst. Rev."},{"issue":"9","key":"4356_CR14","doi-asserted-by":"crossref","first-page":"6283","DOI":"10.1002\/int.22844","volume":"37","author":"H Huang","year":"2022","unstructured":"Huang, H., Wu, N., Liang, Y., et al.: SLNL: a novel method for gene selection and phenotype classification. Int. J. Intell. Syst. 37(9), 6283\u20136304 (2022)","journal-title":"Int. J. Intell. Syst."},{"key":"4356_CR15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4243700","volume":"2021","author":"H Ihnaini","year":"2011","unstructured":"Ihnaini, B., Khan, M. A., Khan, T.A., Abbas, S., Daoud, M.S., Ahmad, M., Khan, M.A.: A Smart Healthcare Recommendation System for Multidisciplinary Diabetes Patients with Data Fusion Based on Deep Ensemble Learning. Comput. Intell. Neurosci. 2021, 4243700, (2021). https:\/\/doi.org\/10.1155\/2021\/4243700","journal-title":"Comput. Intell. Neurosci"},{"key":"4356_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6680782","author":"S Jeong","year":"2021","unstructured":"Jeong, S., Park, C., Hong, D., et al.: Neural cryptography based on generalized tree parity machine for real-life systems. Secur. Commun. Netw. (2021). https:\/\/doi.org\/10.1155\/2021\/6680782","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"4356_CR17","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.1109\/TNET.2021.3084251","volume":"29","author":"H Jiang","year":"2021","unstructured":"Jiang, H., Wang, M., Zhao, P., et al.: A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE\/ACM Trans. Netw. 29(5), 2228\u20132241 (2021)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"4356_CR18","doi-asserted-by":"publisher","DOI":"10.34133\/2022\/9850832","author":"D Liu","year":"2022","unstructured":"Liu, D., Liu, X., Chen, Z., Zuo, Z., Tang, X., Huang, Q., Arai, T.: Magnetically driven soft continuum microrobot for intravascular operations in microscale. Cyborg Bionic Syst. (2022). https:\/\/doi.org\/10.34133\/2022\/9850832","journal-title":"Cyborg and Bionic Systems"},{"issue":"1","key":"4356_CR19","first-page":"467","volume":"66","author":"D Liu","year":"2022","unstructured":"Khan, M.A., Rehman, A., Khan, K.M., Ghamdi M.A. Al and Almotiri, S.H.: Enhance intrusion detection in computer networks based on deep extreme learning machine. Comput. Mater Con. 66(1), 467\u2013480 (2021)","journal-title":"Cyborg and Bionic Systems"},{"key":"4356_CR20","doi-asserted-by":"publisher","unstructured":"Khan, M.F., Ghazal, T.M., Said, R.A., Fatima, A., Abbas, S., Khan, M.A., Issa, G.F., Ahmad, M., Khan, M.A.: An IoMT-Enabled Smart Healthcare Model to Monitor Elderly People Using Machine Learning Technique. Comput. Intell. Neurosc. 2021, 2487759 (2021). https:\/\/doi.org\/10.1155\/2021\/2487759","DOI":"10.1155\/2021\/2487759"},{"key":"4356_CR21","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1109\/COMST.2014.2320093","volume":"16","author":"N Komninos","year":"2014","unstructured":"Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 16, 1933\u20131954 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4356_CR22","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/THC-181306","volume":"27","author":"H Kuresan","year":"2019","unstructured":"Kuresan, H., Samiappan, D., Masunda, S.: Fusion of wpt and mfcc feature extraction in Parkinsons disease diagnosis. Technol. Health Care 27, 363\u2013372 (2019)","journal-title":"Technol. Health Care"},{"key":"4356_CR23","doi-asserted-by":"crossref","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","volume":"8","author":"S Latif","year":"2020","unstructured":"Latif, S., Zou, Z., Idrees, Z., et al.: A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8, 89337\u201389350 (2020)","journal-title":"IEEE Access"},{"key":"4356_CR24","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/TIFS.2022.3224308","volume":"18","author":"H Li","year":"2023","unstructured":"Li, H., Huang, Q., Huang, J., et al.: Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Trans. Inf. Forensics Secur. 18, 396\u2013410 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4356_CR25","doi-asserted-by":"crossref","first-page":"1233341","DOI":"10.3389\/fphys.2023.1233341","volume":"14","author":"J Li","year":"2023","unstructured":"Li, J., Li, J., Wang, C., et al.: Outlier detection using iterative adaptive mini-minimum spanning tree generation with applications on medical data. Front. Physiol. 14, 1233341 (2023)","journal-title":"Front. Physiol."},{"key":"4356_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3336330","author":"J Li","year":"2023","unstructured":"Li, Q., You, T., Chen, J., Zhang, Y., & Du, C.: LI-EMRSQL: Linking Information Enhanced Text2SQL Parsing on Complex Electronic Medical Records. IEEE Trans. Reliab. (2023). https:\/\/doi.org\/10.1109\/TR.2023.3336330","journal-title":"IEEE Trans. Reliab."},{"issue":"8","key":"4356_CR27","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.001.2200809","volume":"61","author":"J Liu","year":"2023","unstructured":"Liu, Y., Fang, Z., Cheung, M. H., Cai, W., Huang, J.: Mechanism design for blockchain storage sustainability. IEEE Commun. Mag. 61(8), 102\u2013107 (2023). https:\/\/doi.org\/10.1109\/MCOM.001.2200809","journal-title":"Front. Physiol."},{"key":"4356_CR28","doi-asserted-by":"crossref","first-page":"1255524","DOI":"10.3389\/fneur.2023.1255524","volume":"14","author":"D Liang","year":"2023","unstructured":"Liang, D., Guan, Q., Huang, M., et al.: Changing trends of disease burden of stroke from 1990 to 2019 and its predictions among the Chinese population. Front. Neurol. 14, 1255524 (2023)","journal-title":"Front. Neurol."},{"key":"4356_CR29","unstructured":"Lichman, M.: UCI machine learning repository: breast cancer Wisconsin (Diagnostic) data set (2014). http:\/\/archive.ics.uci.edu\/ml.Accessed"},{"key":"4356_CR30","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.1109\/COMST.2020.2986024","volume":"22","author":"WY Lim","year":"2020","unstructured":"Lim, W.Y., Luong, N.C., Hoang, D.T., et al.: Federated learning in mobile edge networks: a comprehensive survey. IEEE Commun. Surv. Tutor. 22, 2031\u20132063 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.2986024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4356_CR31","doi-asserted-by":"crossref","first-page":"105608","DOI":"10.1016\/j.engappai.2022.105608","volume":"117","author":"H Liu","year":"2023","unstructured":"Liu, H., Xu, Y., Chen, F.: Sketch2Photo: synthesizing photo-realistic images from sketches via global contexts. Eng. Appl. Artif. Intell. 117, 105608 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"4356_CR32","doi-asserted-by":"publisher","first-page":"e1755","DOI":"10.7717\/peerj-cs.1755","volume":"10","author":"W Zheng","year":"2024","unstructured":"Zheng, W., Lu, S., Yang, Y., Yin, Z., Yin, L., Ali, H.: Lightweight transformer image feature extraction network. PeerJ Comput. Sci. 10, e1755 (2024). https:\/\/doi.org\/10.7717\/peerj-cs.1755","journal-title":"PeerJ Computer Science"},{"key":"4356_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2024.01.002","author":"S Lu","year":"2024","unstructured":"Lu, S., Yang, J., Yang, B., Li, X., Yin, Z., Yin, L., Zheng, W.: Surgical instrument posture estimation and tracking based on LSTM. ICT Express (2024). https:\/\/doi.org\/10.1016\/j.icte.2024.01.002","journal-title":"ICT Express"},{"issue":"10","key":"4356_CR34","first-page":"55356","volume":"11","author":"AV Maritta","year":"2021","unstructured":"Maritta, A.V., Tella, L., Kirsi, H., et al.: Measured and perceived impacts of evidence-based leadership in nursing: a mixed-methods systematic review protocol. BMJ Open 11(10), 55356 (2021)","journal-title":"BMJ Open"},{"key":"4356_CR35","doi-asserted-by":"publisher","first-page":"15025","DOI":"10.1088\/2632-2153\/ad2492","volume":"5","author":"J Li","year":"2024","unstructured":"Li, J., Li, J., Wang, C., Verbeek, F.J., Schultz, T., Liu, H.: MS2OD: outlier detection using minimum spanning tree and medoid selection. Mach. Learn. Sci. Technol. 5(1), 15025. (2024). https:\/\/doi.org\/10.1088\/2632-2153\/ad2492","journal-title":"Machine Learning: Science and Technology"},{"issue":"8","key":"4356_CR36","doi-asserted-by":"publisher","first-page":"5628","DOI":"10.1109\/TII.2022.3144016","volume":"18","author":"J Liu","year":"2022","unstructured":"Liu, X., Zhao, J., Li, J., Cao, B., Lv, Z.: Federated neural architecture search for medical data security. IEEE Trans. Ind. Inform. 18(8), 5628\u20135636 (2022). https:\/\/doi.org\/10.1109\/TII.2022.3144016","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4356_CR37","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/MNET.011.2000514","volume":"35","author":"J Khan","year":"2021","unstructured":"Khan, A., Abbas, S., Rehman, A., et al.: A machine learning approach for blockchain-based smart home networks security. IEEE Netw. 35, 223\u2013229 (2021)","journal-title":"IEEE Netw."},{"key":"4356_CR38","doi-asserted-by":"crossref","unstructured":"Mittal, Y., Toshniwal, P., Sharma, S., et al.: A voicecontrolled multi-functional smart home automation system. In: 12th IEEE Int. Conf. Electron. Energy, Environ. Commun. Comput. Control (E3-C3) (2015)","DOI":"10.1109\/INDICON.2015.7443538"},{"key":"4356_CR39","doi-asserted-by":"crossref","unstructured":"Mohanta, B., Das, P., Patnaik, S.: Healthcare 5.0: a paradigm shift in digital healthcare system using artificial intelligence, IOT and 5G communication. Proc - 2019 Int (2019)","DOI":"10.1109\/ICAML48257.2019.00044"},{"issue":"5","key":"4356_CR40","first-page":"8428","volume":"7","author":"C Nan","year":"2022","unstructured":"Nan, C., Jay, P.: The causal effect of delivery volume on severe maternal morbidity: an instrumental variable analysis in Sichuan, China. BMJ Glob. Health 7(5), 8428 (2022)","journal-title":"BMJ Glob. Health"},{"key":"4356_CR41","doi-asserted-by":"publisher","unstructured":"Perez-Guagnelli, E., Jones, J., & D. Damian, D. Hyperelastic Membrane Actuators: Analysis of Toroidal and Helical Multifunctional Configurations. Cyborg Bionic Syst. 2022, (2022). https:\/\/doi.org\/10.34133\/2022\/9786864","DOI":"10.34133\/2022\/9786864"},{"key":"4356_CR42","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Rieger, P., Miettinen, M., et al.: Poisoning attacks on federated learning-based iot intrusion detection system, 23\u201326 (2020)","DOI":"10.14722\/diss.2020.23003"},{"key":"4356_CR43","doi-asserted-by":"publisher","DOI":"10.34133\/2022\/9842169","author":"M Sander","year":"2022","unstructured":"Sander, I.L., Dvorak, N., Stebbins, J.A., Carr, A.J., & Mouthuy, P.: Advanced robotics to address the translational gap in tendon engineering. Cyborg Bionic Syst. (2022). https:\/\/doi.org\/10.34133\/2022\/9842169","journal-title":"Cyborg. bionic. syst."},{"key":"4356_CR44","doi-asserted-by":"crossref","first-page":"67189","DOI":"10.1109\/ACCESS.2018.2874539","volume":"6","author":"M Rahouti","year":"2018","unstructured":"Rahouti, M., Xiong, K., Ghani, N.: Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access. 6, 67189\u201367205 (2018)","journal-title":"IEEE Access"},{"key":"4356_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1200\/CCI.20.00060","volume":"5","author":"S Rajendran","year":"2021","unstructured":"Rajendran, S., Obeid, J.S., Binol, H., et al.: Cloud-based federated learning implementation across medical centers. JCO Clin. Cancer Inform. 5, 1\u201311 (2021)","journal-title":"JCO Clin. Cancer Inform."},{"key":"4356_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.106019","volume":"150","author":"A Rehman","year":"2022","unstructured":"Rehman, A., Abbas, S., Khan, M.A., et al.: A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique. Comput. Biol. Med. 150, 106019 (2022). https:\/\/doi.org\/10.1016\/j.compbiomed.2022.106019","journal-title":"Comput. Biol. Med."},{"key":"4356_CR47","unstructured":"Repository UIML: Oxford Parkinson\u2019s disease detection dataset (2023). https:\/\/archive.ics.uci.edu\/dataset\/174\/parkinsons"},{"key":"4356_CR48","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11063-021-10443-8","volume":"53","author":"A Sarkar","year":"2021","unstructured":"Sarkar, A.: Deep learning guided double hidden layer neural synchronization through mutual learning. Neural Process. Lett. 53, 1355\u20131384 (2021). https:\/\/doi.org\/10.1007\/s11063-021-10443-8","journal-title":"Neural Process. Lett."},{"issue":"4","key":"4356_CR49","doi-asserted-by":"crossref","first-page":"221","DOI":"10.4103\/jmss.JMSS_57_18","volume":"9","author":"R Sheibani","year":"2019","unstructured":"Sheibani, R., Nikookar, E., Alavi, S.: An ensemble method for diagnosis of Parkinson\u2019s disease based on voice measurements. J. Med. Signals Sens. 9(4), 221\u2013226 (2019)","journal-title":"J. Med. Signals Sens."},{"key":"4356_CR50","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.ins.2018.04.048","volume":"453","author":"J Shen","year":"2018","unstructured":"Shen, J., Wang, C., Li, T., et al.: Secure data uploading scheme for a smart home system. Inf. Sci. 453, 186\u2013197 (2018)","journal-title":"Inf. Sci."},{"key":"4356_CR51","doi-asserted-by":"publisher","first-page":"28","DOI":"10.34133\/cbsystems.0028","volume":"4","author":"J Bao","year":"2023","unstructured":"Bao, C., Hu, X., Zhang, D., Lv, Z., &amp; Chen, J.: Predicting moral elevation conveyed in danmaku comments using EEGs. Cyborg Bionic Syst. 4, 28 (2023). https:\/\/doi.org\/10.34133\/cbsystems.0028","journal-title":"Cyborg. bionic. syst"},{"issue":"1","key":"4356_CR52","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.32604\/cmc.2021.013952","volume":"67","author":"SY Siddiqui","year":"2021","unstructured":"Siddiqui, S.Y., Naseer, I., Khan, M.A., et al.: Intelligent breast cancer prediction empowered with fusion and deep learning. Comput. Mater. Continua (CMC) 67(1), 1033\u20131049 (2021)","journal-title":"Comput. Mater. Continua (CMC)"},{"key":"4356_CR53","doi-asserted-by":"crossref","unstructured":"Sun, L., Zhang, M., Wang, B., et al.: Few-shot class-incremental learning for medical time series classification. IEEE J. Biomed. Health Inform. (2023)","DOI":"10.1109\/JBHI.2023.3247861"},{"key":"4356_CR54","doi-asserted-by":"crossref","unstructured":"Sztaho, D., Valalik, I., Vicsi, K.: Parkinson\u2019s disease severity estimation on Hungarian speech using various speech tasks. In: 10th Int. Conf. Speech Technol. Human-Computer Dialogue, pp 2019 (2019)","DOI":"10.1109\/SPED.2019.8906277"},{"key":"4356_CR55","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/ACCESS.2021.3137364","volume":"10","author":"N Taimoor","year":"2021","unstructured":"Taimoor, N., Rehman, S.: Reliable and resilient AI and IoT-based personalised healthcare services: a survey. IEEE Access 10, 535\u2013563 (2021)","journal-title":"IEEE Access"},{"key":"4356_CR56","unstructured":"Tavallaee, A.G.M., Bagheri, E., Lu, W.: Canadian Institute for Cybersecurity, UNB, NSL-KDD Dataset (2018)"},{"issue":"1","key":"4356_CR57","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1186\/s12939-021-01391-9","volume":"20","author":"F Tian","year":"2004","unstructured":"Tian, F., Pan, J.: Hospital bed supply and inequality as determinants of maternal mortality in China between. Int. J. Equity Health 20(1), 51 (2004)","journal-title":"Int. J. Equity Health"},{"key":"4356_CR58","doi-asserted-by":"crossref","DOI":"10.1016\/j.jbi.2019.103362","volume":"104","author":"JM Tracy","year":"2020","unstructured":"Tracy, J.M., Ozkanca, Y., Atkins, D.C., et al.: Investigating voice as a biomarker: deep phenotyping methods for early detection of Parkinson\u2019s disease. J. Biomed. Inf. 104, 103362 (2020)","journal-title":"J. Biomed. Inf."},{"issue":"1","key":"4356_CR59","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1186\/s12913-022-08610-1","volume":"22","author":"N Wang","year":"2022","unstructured":"Wang, N., Chen, J., Chen, W., et al.: The effectiveness of case management for cancer patients: an umbrella review. BMC Health Serv. Res. 22(1), 1247 (2022)","journal-title":"BMC Health Serv. Res."},{"key":"4356_CR60","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MCOM.2018.1701217","volume":"56","author":"P Wang","year":"2018","unstructured":"Wang, P., Ye, F., Chen, X.: A smart home gateway platform for data collection and awareness. IEEE Commun. Mag. 56, 87\u201393 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"4356_CR61","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/JSAC.2019.2904348","volume":"37","author":"S Wang","year":"2019","unstructured":"Wang, S., Tuor, T., Salonidis, T., et al.: Adaptive federated learning in resource constrained edge computing systems. IEEE J. Sel. Areas Commun. 37, 1205\u20131221 (2019)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"4356_CR62","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.enpol.2016.12.047","volume":"103","author":"C Wilson","year":"2017","unstructured":"Wilson, C., Hargreaves, T., Hauxwell-Baldwin, R.: Benefits and risks of smart home technologies. Energy Policy 103, 72\u201383 (2017)","journal-title":"Energy Policy"},{"issue":"4","key":"4356_CR63","doi-asserted-by":"crossref","first-page":"2346","DOI":"10.1109\/TCYB.2021.3117705","volume":"53","author":"Z Xiao","year":"2023","unstructured":"Xiao, Z., Fang, H., Jiang, H., et al.: Understanding Private car aggregation effect via Spatio-temporal analysis of trajectory data. IEEE Trans. Cybern. 53(4), 2346\u20132357 (2023)","journal-title":"IEEE Trans. Cybern."},{"key":"4356_CR64","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.jnca.2016.04.013","volume":"87","author":"B Xiong","year":"2017","unstructured":"Xiong, B., Yang, K., Zhao, J., et al.: Robust dynamic network traffic partitioning against malicious attacks. J. Netw. Comput. Appl. 87, 20\u201331 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"4356_CR65","doi-asserted-by":"crossref","DOI":"10.1016\/j.mehy.2019.109483","volume":"135","author":"O Yaman","year":"2020","unstructured":"Yaman, O., Ertam, F., Tuncer, T.: Automated Parkinson\u2019s disease recognition based on statistical pooling method using acoustic features. Med. Hypotheses 135, 109483 (2020)","journal-title":"Med. Hypotheses"},{"key":"4356_CR66","doi-asserted-by":"crossref","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"J Yin","year":"2018","unstructured":"Yin, J., Xi, R., Sun, J., et al.: Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans. Ind. Inf. 14, 3628\u20133636 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4356_CR67","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2024.3356651","author":"H Liu","year":"2024","unstructured":"Liu, H., Zhang, S., Gamboa, H., Xue, T., Zhou, C., Schultz, T.: Taxonomy and real-time classification of artifacts during biosignal acquisition: A starter study and dataset of ECG. IEEE Sens. J. (2024). https:\/\/doi.org\/10.1109\/JSEN.2024.3356651","journal-title":"IEEE Sens. J"},{"key":"4356_CR68","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chen, J., Wu, D., et al.: Multi-task network anomaly detection using federated learning. In: Proceedings of the Tenth International Symposium on Information and Communication Technology, pp 4\u20136 (2019)","DOI":"10.1145\/3368926.3369705"},{"key":"4356_CR69","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.N., et al.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14, 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04356-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04356-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04356-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:50:32Z","timestamp":1725454232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04356-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,3]]},"references-count":69,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["4356"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04356-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,3]]},"assertion":[{"value":"2 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No interests of a financial or personal nature.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}