{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:20Z","timestamp":1774678340138,"version":"3.50.1"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05337-6","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:03:34Z","timestamp":1753884214000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion detection system based on federated learning using layer-based privacy obfuscation"],"prefix":"10.1007","volume":"28","author":[{"given":"Kapil","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Manju","family":"Khari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"5337_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104191","volume":"149","author":"S Shoukat","year":"2025","unstructured":"Shoukat, S., Gao, T., Javeed, D., Saeed, M.S., Adil, M.: Trust my IDS: An explainable AI integrated deep learning-based transparent threat detection system for industrial networks. Comput. Secur. 149, 104191 (2025)","journal-title":"Comput. Secur."},{"issue":"1","key":"5337_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3390\/technologies13010022","volume":"13","author":"A Awasthi","year":"2025","unstructured":"Awasthi, A., Krpalkova, L., Walsh, J.: Bridging the maturity gaps in industrial data science: navigating challenges in IoT-driven manufacturing. Technologies 13(1), 22 (2025)","journal-title":"Technologies"},{"key":"5337_CR3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.3390\/info15040212","volume":"15","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., Goh, K.W., Mir, M.S., Mohd Rosely, N.F.L., Mir, A.A., Chaimanee, M.: Blockchain-enhanced sensor-as-a-service (SEaaS) in IoT: Leveraging blockchain for efficient and secure sensing data transactions. Information 15, 212 (2024)","journal-title":"Information"},{"key":"5337_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/pr12091825","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., Goh, K.W., Khan, A.R., Zuhairi, M.F., Chaimanee, M.: Integrating AI and Blockchain for enhanced data security in IoT-driven smart cities. Processes (2024). https:\/\/doi.org\/10.3390\/pr12091825","journal-title":"Processes"},{"key":"5337_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2024.3523771","author":"BD Deebak","year":"2025","unstructured":"Deebak, B.D., Hwang, S.O.: Privacy-preserving learning model using lightweight encryption for visual sensing industrial IoT devices. IEEE Trans. Emerg. Topics Comput. Intell. (2025). https:\/\/doi.org\/10.1109\/TETCI.2024.3523771","journal-title":"IEEE Trans. Emerg. Topics Comput. Intell."},{"key":"5337_CR6","doi-asserted-by":"crossref","unstructured":"N. Anjum, Z. Latif, and H. Chen, 2025 Security and privacy of industrial big data: Motivation, opportunities, and challenges. Journal of Network and Computer Applications. 104130","DOI":"10.1016\/j.jnca.2025.104130"},{"key":"5337_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2025.3541560","author":"Z Cai","year":"2025","unstructured":"Cai, Z., Chen, J., Fan, Y., Zheng, Z., Li, K.: Blockchain-empowered federated learning: benefits, challenges, and solutions. IEEE Trans. Big Data (2025). https:\/\/doi.org\/10.1109\/TBDATA.2025.3541560","journal-title":"IEEE Trans. Big Data"},{"key":"5337_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3534469","author":"C Fu","year":"2025","unstructured":"Fu, C., Chen, H., Ruan, N.: Privacy for free: spy attack in vertical federated learning by both active and passive parties. IEEE Trans. Inform. Forens. Secur. (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3534469","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"key":"5337_CR9","volume":"25","author":"A Roy","year":"2025","unstructured":"Roy, A., Mahanta, D.R., Mahanta, L.B.: A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing. Res. Eng. 25, 103886 (2025)","journal-title":"Res. Eng."},{"key":"5337_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3530700","author":"S Wang","year":"2025","unstructured":"Wang, S., Gai, K., Yu, J., Zhang, Z., Zhu, L.: PravFed: practical heterogeneous vertical federated learning via representation learning. IEEE Trans. Inform. Forens. Secur. (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3530700","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"key":"5337_CR11","doi-asserted-by":"crossref","unstructured":"M. Arazzi, S. Nicolazzo, and A. Nocera, \"A defense mechanism against label inference attacks in vertical federated learning,\" Neurocomputing, p. 129476, 2025.","DOI":"10.1016\/j.neucom.2025.129476"},{"key":"5337_CR12","doi-asserted-by":"publisher","first-page":"2024017","DOI":"10.1051\/sands\/2024017","volume":"4","author":"Z Li","year":"2025","unstructured":"Li, Z., Zhang, Y.: Advancing membership inference attacks: the present and the future. Secur. Safety 4, 2024017 (2025)","journal-title":"Secur. Safety"},{"key":"5337_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3525731","author":"Z Li","year":"2025","unstructured":"Li, Z., Bao, H., Pan, H., Guan, M., Huang, C., Dai, H.N.: UEFL: universal and efficient privacy-preserving federated learning. IEEE Int. Things J. (2025). https:\/\/doi.org\/10.1109\/JIOT.2025.3525731","journal-title":"IEEE Int. Things J."},{"key":"5337_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2025.103761","volume":"170","author":"S Cao","year":"2025","unstructured":"Cao, S., Liu, S., Yang, Y., Du, W., Zhan, Z., Wang, D., Zhang, W.: A hybrid and efficient federated learning for privacy preservation in IoT devices. Ad Hoc Netw. 170, 103761 (2025)","journal-title":"Ad Hoc Netw."},{"key":"5337_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3532724","author":"X Kong","year":"2025","unstructured":"Kong, X., He, X., Ma, X., Yan, X., Wang, L., Shen, G., Liu, Z.: Oh-FedRec: one-shot and heterogeneous vertical federated recommendation system. IEEE Trans. Consum. Electron. (2025). https:\/\/doi.org\/10.1109\/TCE.2025.3532724","journal-title":"IEEE Trans. Consum. Electron."},{"key":"5337_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3536612","author":"J Zhou","year":"2025","unstructured":"Zhou, J., Wu, J., Ni, J., Wang, Y., Pan, Y., Su, Z.: Protecting your attention during distributed graph learning: Efficient privacy-preserving federated graph attention network. IEEE Trans. Inform. Forens. Secur. (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3536612","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"issue":"2","key":"5337_CR17","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/s10586-024-04834-4","volume":"28","author":"M Asad","year":"2025","unstructured":"Asad, M., Otoum, S.: BPPFL: a blockchain-based framework for privacy-preserving federated learning. Clust. Comput. 28(2), 126 (2025)","journal-title":"Clust. Comput."},{"key":"5337_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3531919","author":"J Chen","year":"2025","unstructured":"Chen, J., Jiang, H., Hu, Q.: Utility-enhanced personalized privacy preservation in hierarchical federated learning. IEEE Trans. Mob. Comput. (2025). https:\/\/doi.org\/10.1109\/TMC.2025.3531919","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"5337_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/sci7010018","volume":"7","author":"J B\u00e1skay","year":"2025","unstructured":"B\u00e1skay, J., Mezei, T., Banczerowski, P., Horv\u00e1th, A., Jo\u00f3, T., Pollner, P.: Censoring sensitivity analysis for benchmarking survival machine learning methods. Sci 7(1), 18 (2025)","journal-title":"Sci"},{"issue":"3","key":"5337_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10462-024-11082-w","volume":"58","author":"N Latif","year":"2025","unstructured":"Latif, N., Ma, W., Ahmad, H.B.: Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection. Artif. Intell. Rev. 58(3), 91 (2025)","journal-title":"Artif. Intell. Rev."},{"key":"5337_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3526840","author":"G Chen","year":"2025","unstructured":"Chen, G., Wang, W., Wu, Y., Li, C., Xu, G., Ji, S., Han, Y.: RobustPFL: robust personalized federated learning. IEEE Trans. Depend. Secure Comput. (2025). https:\/\/doi.org\/10.1109\/TDSC.2025.3526840","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"5337_CR22","doi-asserted-by":"publisher","first-page":"98481","DOI":"10.1109\/ACCESS.2020.2997711","volume":"8","author":"BUI Khan","year":"2020","unstructured":"Khan, B.U.I., Anwar, F., Olanrewaju, R.F., Pampori, B.R., Mir, R.N.: A novel multi-agent and multilayered game formulation for intrusion detection in Internet of Things (IoT). IEEE Access 8, 98481\u201398490 (2020)","journal-title":"IEEE Access"},{"key":"5337_CR23","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.procs.2025.01.034","volume":"252","author":"T Sowmya","year":"2025","unstructured":"Sowmya, T.: A novel stable feature selection algorithm for machine learning-based intrusion detection system. Procedia Comput. Sci. 252, 738\u2013747 (2025)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"5337_CR24","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1038\/s41598-025-85866-7","volume":"15","author":"U Ahmed","year":"2025","unstructured":"Ahmed, U., Nazir, M., Sarwar, A., Ali, T., Aggoune, E.H.M., Shahzad, T., Khan, M.A.: Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering. Sci. Rep. 15(1), 1726 (2025)","journal-title":"Sci. Rep."},{"key":"5337_CR25","volume":"89","author":"J Ouyang","year":"2025","unstructured":"Ouyang, J., Han, R., Zuo, X., Cheng, Y., Liu, C.H.: Accuracy-aware differential privacy in federated learning of large transformer models. J. Inform. Secur. Appl. 89, 103986 (2025)","journal-title":"J. Inform. Secur. Appl."},{"key":"5337_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3546777","author":"B Zhang","year":"2025","unstructured":"Zhang, B., Mao, Y., He, X., Ping, P., Huang, H., Wu, J.: Exploring the privacy-accuracy trade-off using adaptive gradient clipping in federated learning. IEEE Trans. Net. Sci. Eng. (2025). https:\/\/doi.org\/10.1109\/TNSE.2025.3546777","journal-title":"IEEE Trans. Net. Sci. Eng."},{"issue":"5","key":"5337_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3708982","volume":"57","author":"W Ali","year":"2025","unstructured":"Ali, W., Zhou, X., Shao, J.: Privacy-preserved and responsible recommenders: from conventional defense to federated learning and blockchain. ACM Comput. Surv. 57(5), 1\u201335 (2025)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"5337_CR28","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/jsan14010009","volume":"14","author":"E Dritsas","year":"2025","unstructured":"Dritsas, E., Trigka, M.: Federated learning for IoT: a survey of techniques, challenges, and applications. J. Sens. Actuator Netw. 14(1), 9 (2025)","journal-title":"J. Sens. Actuator Netw."},{"key":"5337_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3545786","author":"A Alamer","year":"2025","unstructured":"Alamer, A., Basudan, S.: A privacy-preserving federated learning with a feature of detecting forged and duplicated gradient model in autonomous vehicle. IEEE Access (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3545786","journal-title":"IEEE Access"},{"key":"5337_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2025.110078","volume":"143","author":"Z Alebouyeh","year":"2025","unstructured":"Alebouyeh, Z., Bidgoly, A.J.: Privacy-preserving federated learning compatible with robust aggregators. Eng. Appl. Artif. Intell. 143, 110078 (2025)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"5337_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3545599","author":"S Tian","year":"2025","unstructured":"Tian, S., Tan, Y., Wang, H., Liu, H., Li, Z.: ASDIA: an adversarial sample to preserve privacy program in federated learning. IEEE Trans. Depend. Secure Comput. (2025). https:\/\/doi.org\/10.1109\/TDSC.2025.3545599","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"1","key":"5337_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100235","volume":"5","author":"D Yu","year":"2025","unstructured":"Yu, D., Zhang, H., Huang, Y., Xie, Z.: Data distribution inference attack in federated learning via reinforcement learning support. High-Conf. Comput. 5(1), 100235 (2025)","journal-title":"High-Conf. Comput."},{"key":"5337_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2024.115209","volume":"329","author":"V Agarwal","year":"2025","unstructured":"Agarwal, V., Ardakanian, O., Pal, S.: Robust peer-to-peer federated learning for non-intrusive load monitoring in smart homes. Energy Build. 329, 115209 (2025)","journal-title":"Energy Build."},{"key":"5337_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108487","volume":"105","author":"SNG Aryavalli","year":"2023","unstructured":"Aryavalli, S.N.G., Kumar, H.: Top 12 layer-wise security challenges and a secure architectural solution for Internet of Things. Comput. Electr. Eng. 105, 108487 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"5337_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-10820-7","author":"D Dhingra","year":"2025","unstructured":"Dhingra, D., Dua, M.: Novel multiple video encryption scheme using two-chaotic-map-based two-level permutation and diffusion. Nonlinear Dyn. (2025). https:\/\/doi.org\/10.1007\/s11071-024-10820-7","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"5337_CR36","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1186\/s13677-024-00711-y","volume":"13","author":"VS Naresh","year":"2024","unstructured":"Naresh, V.S.: PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach. J. Cloud Comput. 13(1), 149 (2024)","journal-title":"J. Cloud Comput."},{"issue":"13","key":"5337_CR37","doi-asserted-by":"publisher","first-page":"40147","DOI":"10.1007\/s11042-023-16853-1","volume":"83","author":"C Pradeepthi","year":"2024","unstructured":"Pradeepthi, C., Maheswari, B.U.: Network intrusion detection and prevention strategy with data encryption using hybrid detection classifier. Multimed. Tools Appl. 83(13), 40147\u201340178 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"5337_CR38","doi-asserted-by":"crossref","unstructured":"B. Yalavarthi, A. R. Kaushik, T. Sharma, C. Jutla, and N. Ratha, 2025 \"Secure sleep apnea detection with FHE and deep learning on ECG signals,\" in International Conference on Pattern Recognition, Cham: Springer. pp. 49\u201364.","DOI":"10.1007\/978-3-031-78354-8_4"},{"issue":"6","key":"5337_CR39","doi-asserted-by":"publisher","first-page":"2913","DOI":"10.3390\/app15062913","volume":"15","author":"A Kokaj","year":"2025","unstructured":"Kokaj, A., Mollakuqe, E.: Mathematical proposal for securing split learning using homomorphic encryption and zero-knowledge proofs. Appl. Sci. 15(6), 2913 (2025)","journal-title":"Appl. Sci."},{"key":"5337_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-025-02552-w","author":"L Deng","year":"2025","unstructured":"Deng, L., Li, L., Ou, Y., Xiang, J., Xia, S.: Tripm: a multi-label deep learning SCA model for multi-byte attacks. Int. J. Mach. Learn. Cybernet. (2025). https:\/\/doi.org\/10.1007\/s13042-025-02552-w","journal-title":"Int. J. Mach. Learn. Cybernet."},{"key":"5337_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3539964","author":"M Xhemrishi","year":"2025","unstructured":"Xhemrishi, M., \u00d6stman, J., Wachter-Zeh, A.: FedGT: identification of malicious clients in federated learning with secure aggregation. IEEE Trans. Inform. Forens. Secur. (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3539964","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"key":"5337_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3533087","author":"H Pan","year":"2025","unstructured":"Pan, H., Bao, H., Guan, M., Li, Z., Huang, C., Dai, H.N.: DualGuard: Obfuscated federated learning with two-party secure robust aggregation. IEEE Int. Things J. (2025). https:\/\/doi.org\/10.1109\/JIOT.2025.3533087","journal-title":"IEEE Int. Things J."},{"issue":"1","key":"5337_CR43","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1186\/s40537-025-01099-5","volume":"12","author":"MM Orabi","year":"2025","unstructured":"Orabi, M.M., Emam, O., Fahmy, H.: Adapting security and decentralized knowledge enhancement in federated learning using blockchain technology: literature review. J. Big Data 12(1), 55 (2025)","journal-title":"J. Big Data"},{"issue":"4","key":"5337_CR44","doi-asserted-by":"publisher","first-page":"680","DOI":"10.3390\/electronics14040680","volume":"14","author":"W Gao","year":"2025","unstructured":"Gao, W., Ren, S., Liu, Z., Qin, B., Dong, X., Zhao, Z.: Lattice-based group signature with VLR for anonymous medical service evaluation system. Electronics 14(4), 680 (2025)","journal-title":"Electronics"},{"key":"5337_CR45","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/OAJPE.2024.3365747","volume":"11","author":"RR Tiferes","year":"2024","unstructured":"Tiferes, R.R., Manassero, G., Pellini, E.L., di Santo, S.G.: Biweight midcorrelation based transmission line pilot protection algorithm. IEEE Open Access J. Power Energy 11, 68\u201382 (2024)","journal-title":"IEEE Open Access J. Power Energy"},{"issue":"1","key":"5337_CR46","doi-asserted-by":"publisher","first-page":"bbae681","DOI":"10.1093\/bib\/bbae681","volume":"26","author":"R Galindo-Hern\u00e1ndez","year":"2025","unstructured":"Galindo-Hern\u00e1ndez, R., Rodr\u00edguez-V\u00e1zquez, K., Gal\u00e1n-V\u00e1squez, E., Hern\u00e1ndez Castellanos, C.I.: Online-adjusted evolutionary biclustering algorithm to identify significant modules in gene expression data. Brief. Bioinfor. 26(1), bbae681 (2025)","journal-title":"Brief. Bioinfor."},{"key":"5337_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2025.3539738","author":"H Liang","year":"2025","unstructured":"Liang, H., Yang, X., Han, X., Liu, B., Hu, C., Wang, D., Cheng, D.: Spread+: Scalable model aggregation in federated learning with non-IID data. IEEE Trans. Parallel Distrib. Syst. (2025). https:\/\/doi.org\/10.1109\/TPDS.2025.3539738","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"5337_CR48","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/asi8020028","volume":"8","author":"A Milan Kummaya","year":"2025","unstructured":"Milan Kummaya, A., Joseph, A., Rajamani, K., Ghinea, G.: Fed-Hetero: a self-evaluating federated learning framework for data heterogeneity. Appl. Syst. Innovat. 8(2), 28 (2025)","journal-title":"Appl. Syst. Innovat."},{"key":"5337_CR49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3538891","author":"W Zhou","year":"2025","unstructured":"Zhou, W., Zhang, D., Wang, H., Li, J., Jiang, M.: A meta-reinforcement learning-based poisoning attack framework against federated learning. IEEE Access (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3538891","journal-title":"IEEE Access"},{"key":"5337_CR50","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2025.3540030","author":"MT Hossain","year":"2025","unstructured":"Hossain, M.T., Badsha, S., La, H., Islam, S., Khalil, I.: Exploiting Gaussian noise variance for dynamic differential poisoning in federated learning. IEEE Trans. Artif. Intell (2025). https:\/\/doi.org\/10.1109\/TAI.2025.3540030","journal-title":"IEEE Trans. Artif. Intell"},{"key":"5337_CR51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3533899","author":"S Huang","year":"2025","unstructured":"Huang, S., Li, Y., Yan, X., Gao, Y., Chen, C., Shi, L., Ng, W.W.: Scope: On detecting constrained backdoor attacks in federated learning. IEEE Trans. Inform. Foren. Secur. (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3533899","journal-title":"IEEE Trans. Inform. Foren. Secur."},{"key":"5337_CR52","doi-asserted-by":"crossref","unstructured":"A. A. Wardana, G. Ko\u0142aczek, and P. Sukarno, 2025 \"CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulation,\" Data in Brief, p. 111354","DOI":"10.1016\/j.dib.2025.111354"},{"key":"5337_CR53","doi-asserted-by":"crossref","unstructured":"H. M. Son, M. H. Kim, T. M. Chung, C. Huang, and X. Liu, 2024 FedUV: Uniformity and variance for heterogeneous federated learning, in Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR). pp. 5863\u20135872.","DOI":"10.1109\/CVPR52733.2024.00560"},{"key":"5337_CR54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3541399","author":"S Hariharan","year":"2025","unstructured":"Hariharan, S., Jerusha, Y.A., Suganeshwari, G., Ibrahim, S.S., Tupakula, U., Varadharajan, V.: A hybrid deep learning model for network intrusion detection system using Seq2Seq and ConvLSTM-subnets. IEEE Access (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3541399","journal-title":"IEEE Access"},{"key":"5337_CR55","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3385385","author":"G Singh","year":"2024","unstructured":"Singh, G., Sood, K., Rajalakshmi, P., Nguyen, D.D.N., Xiang, Y.: Evaluating federated learning-based intrusion detection scheme for next-generation networks. IEEE Trans. Net. Serv. Manag. (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3385385","journal-title":"IEEE Trans. Net. Serv. Manag."},{"key":"5337_CR56","unstructured":"D. Kalaivani, 2025 An intrusion detection system using the NSL-KDD dataset's convolutional neural network and data analytics,\" in Leveraging Artificial Intelligence (AI) Competencies for Next-Generation Cybersecurity Solutions, Apple Academic Press. pp. 487\u2013513."},{"issue":"1","key":"5337_CR57","first-page":"23","volume":"3","author":"M Malik","year":"2024","unstructured":"Malik, M., Ghous, H., Mubeen, M., Munir, A.M., Ahmad, N.: Intelligent intrusion detection system for internet of things using machine learning techniques. Int. J. Inf. Syst. Comput. Technol. 3(1), 23\u201339 (2024)","journal-title":"Int. J. Inf. Syst. Comput. Technol."},{"key":"5337_CR58","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.isprsjprs.2024.02.019","volume":"209","author":"CQ Zhang","year":"2024","unstructured":"Zhang, C.Q., Deng, Y., Chong, M.Z., Zhang, Z.W., Tan, Y.H.: Entropy-based re-sampling method on SAR class imbalance target detection. ISPRS J. Photogramm. Remote Sens. 209, 432\u2013447 (2024)","journal-title":"ISPRS J. Photogramm. Remote Sens."},{"issue":"4","key":"5337_CR59","doi-asserted-by":"publisher","first-page":"948","DOI":"10.26599\/TST.2023.9010032","volume":"29","author":"AEM Eljialy","year":"2024","unstructured":"Eljialy, A.E.M., Uddin, M.Y., Ahmad, S.: Novel framework for an intrusion detection system using multiple feature selection methods based on deep learning. Tsinghua Sci. Technol. 29(4), 948\u2013958 (2024)","journal-title":"Tsinghua Sci. Technol."},{"issue":"2","key":"5337_CR60","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10207-023-00767-y","volume":"23","author":"H Zouhri","year":"2024","unstructured":"Zouhri, H., Idri, A., Ratnani, A.: Evaluating the impact of filter-based feature selection in intrusion detection systems. Int. J. Inf. Secur. 23(2), 759\u2013785 (2024)","journal-title":"Int. J. Inf. Secur."},{"key":"5337_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101492","volume":"30","author":"S Srivastav","year":"2025","unstructured":"Srivastav, S., Shukla, A.K., Kumar, S., Muhuri, P.K.: HYRIDE: HYbrid and Robust Intrusion DEtection approach for enhancing cybersecurity in Industry 4.0. Int. Things 30, 101492 (2025)","journal-title":"Int. Things"},{"key":"5337_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2024.3525074","volume":"13","author":"JJ Shirley","year":"2025","unstructured":"Shirley, J.J., Priya, M.: An adaptive intrusion detection system for evolving IoT threats: an autoencoder-FNN fusion. IEEE Access 13, 1\u201317 (2025)","journal-title":"IEEE Access"},{"issue":"2","key":"5337_CR63","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13726","volume":"42","author":"QA Al-Haija","year":"2025","unstructured":"Al-Haija, Q.A., Droos, A.: A comprehensive survey on deep learning-based intrusion detection systems in Internet of Things (IoT). Expert. Syst. 42(2), e13726 (2025)","journal-title":"Expert. Syst."},{"issue":"1","key":"5337_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3696012","volume":"6","author":"QH Nguyen","year":"2025","unstructured":"Nguyen, Q.H., Hore, S., Shah, A., Le, T., Bastian, N.D.: FedNIDS: a federated learning framework for packet-based network intrusion detection system. Digital Threats: Res. Pract. 6(1), 1\u201323 (2025)","journal-title":"Digital Threats: Res. Pract."},{"key":"5337_CR65","volume":"89","author":"M Wen","year":"2025","unstructured":"Wen, M., Zhang, Y., Zhang, P., Chen, L.: IDS-DWKAFL: an intrusion detection scheme based on dynamic weighted K-asynchronous federated learning for smart grid. J. Inform. Secur. Appl. 89, 103993 (2025)","journal-title":"J. Inform. Secur. Appl."},{"key":"5337_CR66","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-025-02416-0","author":"A Thaljaoui","year":"2025","unstructured":"Thaljaoui, A.: Intelligent network intrusion detection system using optimized deep CNN-LSTM with UNSW-NB15. Int. J. Inform. Technol. (2025). https:\/\/doi.org\/10.1007\/s41870-025-02416-0","journal-title":"Int. J. Inform. Technol."},{"key":"5337_CR67","doi-asserted-by":"publisher","DOI":"10.31449\/inf.v49i13.7358","author":"Y Chen","year":"2025","unstructured":"Chen, Y., Yang, Y., Liang, Y., Zhu, T., Huang, D.: Federated learning with privacy preservation in large-scale distributed systems using differential privacy and homomorphic encryption. Informatica (2025). https:\/\/doi.org\/10.31449\/inf.v49i13.7358","journal-title":"Informatica"},{"key":"5337_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104146","volume":"148","author":"SS Bamber","year":"2025","unstructured":"Bamber, S.S., Katkuri, A.V.R., Sharma, S., Angurala, M.: A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system. Comput. Secur. 148, 104146 (2025)","journal-title":"Comput. Secur."},{"issue":"2","key":"5337_CR69","doi-asserted-by":"publisher","first-page":"37","DOI":"10.4236\/jcc.2025.132004","volume":"13","author":"SG Thomas","year":"2025","unstructured":"Thomas, S.G., Myakala, P.K.: Beyond the cloud: federated learning and edge AI for the next decade. J. Comput. Commun. 13(2), 37\u201350 (2025)","journal-title":"J. Comput. Commun."},{"key":"5337_CR70","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3540868","author":"H Fang","year":"2025","unstructured":"Fang, H., Xu, L., Nan, G., Zheng, D., Zhao, H., Wang, X.: Accountable distributed access control with privacy preservation for blockchain-enabled internet of things systems: a zero-trust security scheme. IEEE Int. Things J. (2025). https:\/\/doi.org\/10.1109\/JIOT.2025.3540868","journal-title":"IEEE Int. Things J."},{"issue":"2","key":"5337_CR71","first-page":"88","volume":"17","author":"AA Alshdadi","year":"2025","unstructured":"Alshdadi, A.A., Almazroi, A.A., Ayub, N., Lytras, M.D., Alsolami, E., Alsubaei, F.S., Alharbey, R.: Federated deep learning for scalable and privacy-preserving distributed denial-of-service attack detection in internet of things networks. Fut. Int. 17(2), 88 (2025)","journal-title":"Fut. Int."},{"issue":"2","key":"5337_CR72","doi-asserted-by":"publisher","first-page":"655","DOI":"10.3390\/app15020655","volume":"15","author":"A Asperti","year":"2025","unstructured":"Asperti, A., Raciti, G., Ronchieri, E., Cesini, D.: Machine learning-based anomaly prediction for proactive monitoring in data centers: a case study on INFN-CNAF. Appl. Sci. 15(2), 655 (2025)","journal-title":"Appl. Sci."},{"key":"5337_CR73","doi-asserted-by":"crossref","unstructured":"F. Pelekoudas-Oikonomou, P. H. Mirzaee, W. Hathal, G. Mantas, J. Rodriguez, H. Cruickshank, and Z. Sun, 2025 Federated learning-based intrusion detection systems for massive IoT,\u201d in Security and Privacy for 6G Massive IoT, pp. 101\u2013128","DOI":"10.1002\/9781119988007.ch4"},{"issue":"2","key":"5337_CR74","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-2283-x","volume":"18","author":"S Lu","year":"2024","unstructured":"Lu, S., Li, R., Liu, W.: FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack. Front. Comput. Sci. 18(2), 182307 (2024)","journal-title":"Front. Comput. Sci."},{"key":"5337_CR75","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101532","volume":"31","author":"J Bai","year":"2025","unstructured":"Bai, J., Cao, L., Li, J., Wan, J., Du, X.: FedWDP: a Wasserstein-distance-based federated learning for privacy and heterogeneous data in IoT. Int. Things 31, 101532 (2025)","journal-title":"Int. Things"},{"key":"5337_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103108","volume":"150","author":"S Jiang","year":"2024","unstructured":"Jiang, S., Wang, X., Que, Y., Lin, H.: Fed-MPS: Federated learning with local differential privacy using model parameter selection for resource-constrained CPS. J. Syst. Archit. 150, 103108 (2024)","journal-title":"J. Syst. Archit."},{"issue":"1","key":"5337_CR77","doi-asserted-by":"publisher","first-page":"7291","DOI":"10.1038\/s41598-025-89612-x","volume":"15","author":"ST Mehedi","year":"2025","unstructured":"Mehedi, S.T., Abdulrazak, L.F., Ahmed, K., Uddin, M.S., Bui, F.M., Chen, L., Al-Zahrani, F.A.: A privacy-preserving dependable deep federated learning model for identifying new infections from genome sequences. Sci. Rep. 15(1), 7291 (2025)","journal-title":"Sci. Rep."},{"key":"5337_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.107927","volume":"133","author":"R Zhang","year":"2024","unstructured":"Zhang, R., Luo, W., Luo, Y., Zhang, H., Wang, J.: AFL-DCS: an asynchronous federated learning framework with dynamic client scheduling. Eng. Appl. Artif. Intell. 133, 107927 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"5337_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104169","volume":"148","author":"PA Mathina","year":"2025","unstructured":"Mathina, P.A., Valarmathi, K.: Advancing IoT security: a novel intrusion detection system for evolving threats in Industry 4.0 using optimized convolutional sparse Ficks law graph point trans-Net. Comput. Secur. 148, 104169 (2025)","journal-title":"Comput. Secur."},{"key":"5337_CR80","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.aej.2024.12.057","volume":"116","author":"M Alotaibi","year":"2025","unstructured":"Alotaibi, M., Mengash, H.A., Alqahtani, H., Al-Sharafi, A.M., Yahya, A.E., Alotaibi, S.R., Yafoz, A.: Hybrid GWQBBA model for optimized classification of attacks in intrusion detection system. Alex. Eng. J. 116, 9\u201319 (2025)","journal-title":"Alex. Eng. J."},{"key":"5337_CR81","doi-asserted-by":"crossref","unstructured":"V. Kumar, K. Kumar, M. Singh, and N. Kumar, 2025 NIDS-DA: Detecting functionally preserved adversarial examples for network intrusion detection system using deep autoencoders. Expert Systems with Applications. 126513","DOI":"10.1016\/j.eswa.2025.126513"},{"key":"5337_CR82","doi-asserted-by":"crossref","unstructured":"X. Wu, Z. Jin, X. Chen, J. Zhou, and K. Liu, 2025 Boosting incremental intrusion detection system with adversarial samples. Expert Systems with Applications. 126632","DOI":"10.1016\/j.eswa.2025.126632"},{"key":"5337_CR83","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103163","volume":"152","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Jia, Z., Jiang, Z., Lin, X., Liu, J., Wu, Q., Susilo, W.: BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. J. Syst. Architect. 152, 103163 (2024)","journal-title":"J. Syst. Architect."},{"key":"5337_CR84","unstructured":"J. Wang, Q. Li, L. Lyu, and F. Ma, 2024 pFedClub: Controllable Heterogeneous Model Aggregation for Personalized Federated Learning.\" in The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)"},{"key":"5337_CR85","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3373822","author":"Y Shi","year":"2024","unstructured":"Shi, Y., Fan, P., Zhu, Z., Peng, C., Wang, F., Letaief, K.B.: SAM: an efficient approach with selective aggregation of models in federated learning. IEEE Int. Things J. (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3373822","journal-title":"IEEE Int. Things J."},{"key":"5337_CR86","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119784","volume":"653","author":"L Ni","year":"2024","unstructured":"Ni, L., Gong, X., Li, J., Tang, Y., Luan, Z., Zhang, J.: rFedFW: secure and trustable aggregation scheme for byzantine-robust federated learning in internet of things. Inf. Sci. 653, 119784 (2024)","journal-title":"Inf. Sci."},{"key":"5337_CR87","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3540312","author":"B Yu","year":"2025","unstructured":"Yu, B., Zhao, J., Zhang, K., Gong, J., Qian, H.: Lightweight and dynamic privacy-preserving federated learning via functional encryption. IEEE Trans Inform. Foren. Secur. (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3540312","journal-title":"IEEE Trans Inform. Foren. Secur."},{"key":"5337_CR88","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3537614","author":"Z Qu","year":"2025","unstructured":"Qu, Z., Zhao, X., Sun, L., Muhammad, G.: DAQFL: dynamic aggregation quantum federated learning algorithm for intelligent diagnosis in internet of medical things. IEEE Int. Things J. (2025). https:\/\/doi.org\/10.1109\/JIOT.2025.3537614","journal-title":"IEEE Int. Things J."},{"key":"5337_CR89","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.126197","volume":"268","author":"HR Kumbhar","year":"2025","unstructured":"Kumbhar, H.R., Rao, S.S.: Federated learning enabled multi-key homomorphic encryption. Expert Syst. Appl. 268, 126197 (2025)","journal-title":"Expert Syst. Appl."},{"key":"5337_CR90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3544763","author":"H Chen","year":"2025","unstructured":"Chen, H., Mou, X., Wang, Z., Wu, T., Wang, X., Wang, C., Li, Y.: Multi-functional homomorphic encryption method based on crowd sensing networks. IEEE Access (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3544763","journal-title":"IEEE Access"},{"key":"5337_CR91","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2025.3525524","author":"T Zhou","year":"2025","unstructured":"Zhou, T., Zhou, J., Cao, Z., Dong, X., Choo, K.K.R.: Efficient multilevel threshold changeable homomorphic data encapsulation with application to privacy-preserving vehicle positioning. IEEE Trans. Intell. Trans. Syst. (2025). https:\/\/doi.org\/10.1109\/TITS.2025.3525524","journal-title":"IEEE Trans. Intell. Trans. Syst."},{"key":"5337_CR92","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2024.3515099","volume":"12","author":"AH Bondok","year":"2024","unstructured":"Bondok, A.H., Badr, M.M., Mahmoud, M., El-Toukhy, A.T., Alsabaan, M., Amsaad, F., Ibrahem, M.I.: A Trojan Attack against smart grid federated learning and countermeasures. IEEE Access 12, 1\u201319 (2024)","journal-title":"IEEE Access"},{"key":"5337_CR93","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2025.3539887","author":"B Hu","year":"2025","unstructured":"Hu, B., Guo, K., Wu, Z., Wen, X., Zhou, X.: Backdoor defense in transportation cyber-physical systems using frequency domain hybrid distillation. IEEE Trans. Intell. Transp. Syst. (2025). https:\/\/doi.org\/10.1109\/TITS.2025.3539887","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"5337_CR94","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10207-025-00998-1","volume":"24","author":"A Paracha","year":"2025","unstructured":"Paracha, A., Arshad, J., Farah, M.B., Ismail, K.: Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning. Int. J. Inf. Secur. 24(2), 85 (2025)","journal-title":"Int. J. Inf. Secur."},{"key":"5337_CR95","unstructured":"M. A. Ferrag, M. Ndhlovu, N. Tihanyi, L. C. Cordeiro, M. Debbah, T. Lestable, and N. S. Thandi,"},{"issue":"5","key":"5337_CR96","doi-asserted-by":"publisher","first-page":"1590","DOI":"10.3390\/s25051590","volume":"25","author":"L Wang","year":"2025","unstructured":"Wang, L., Pan, C., Zhao, H., Ji, M., Wang, X., Yuan, J., Jiao, D.: Highly accurate adaptive federated forests based on resistance to adversarial attacks in wireless traffic prediction. Sensors 25(5), 1590 (2025)","journal-title":"Sensors"},{"key":"5337_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121849","volume":"700","author":"X Chen","year":"2025","unstructured":"Chen, X., Tian, Y., Wang, S., Yang, K., Zhao, W., Xiong, J.: DBFL: dynamic Byzantine-robust privacy-preserving federated learning in heterogeneous data scenario. Inf. Sci. 700, 121849 (2025)","journal-title":"Inf. Sci."},{"key":"5337_CR98","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3423457","author":"E Darzi","year":"2024","unstructured":"Darzi, E., Dubost, F., Sijtsema, N.M., van Ooijen, P.M.: Exploring adversarial attacks in federated learning for medical imaging. IEEE Trans Indus Inform (2024). https:\/\/doi.org\/10.1109\/TII.2024.3423457","journal-title":"IEEE Trans Indus Inform"},{"key":"5337_CR99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104168","volume":"150","author":"D Liu","year":"2025","unstructured":"Liu, D., Li, Z., Xu, D.: Generate universal adversarial perturbations by shortest-distance soft maximum direction attack. Comput. Secur. 150, 104168 (2025)","journal-title":"Comput. Secur."},{"issue":"1","key":"5337_CR100","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/COMST.2019.2944748","volume":"22","author":"HMU Hassan","year":"2019","unstructured":"Hassan, H.M.U., Rehmani, M.H., Chen, J.: Differential privacy techniques for cyber physical systems: asurvey. IEEE Commun. Surv. Tut. 22(1), 746\u2013789 (2019)","journal-title":"IEEE Commun. Surv. Tut."},{"issue":"4","key":"5337_CR101","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BC Fung","year":"2010","unstructured":"Fung, B.C., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys (CSUR) 42(4), 1\u201353 (2010)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"5337_CR102","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102464","volume":"111","author":"JW Kim","year":"2021","unstructured":"Kim, J.W., Edemacu, K., Kim, J.S., Chung, Y.D., Jang, B.: A survey of differential privacy-based techniques and their applicability to location-based services. Comput. Secur. 111, 102464 (2021)","journal-title":"Comput. Secur."},{"key":"5337_CR103","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2024.3419559","author":"Z Qu","year":"2024","unstructured":"Qu, Z., Zhang, L., Tiwari, P.: Quantum fuzzy federated learning for privacy protection in intelligent information processing. IEEE Trans. Fuzzy Syst. (2024). https:\/\/doi.org\/10.1109\/TFUZZ.2024.3419559","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"3","key":"5337_CR104","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3678509","volume":"8","author":"L Fan","year":"2024","unstructured":"Fan, L., Zhang, S., Kong, Y., Yi, X., Wang, Y., Xu, X.O., Shi, Y.: Evaluating the privacy valuation of personal data on smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3), 1\u201333 (2024)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"5337_CR105","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1093\/jamia\/ocae038","volume":"31","author":"H Chen","year":"2024","unstructured":"Chen, H., Pang, J., Zhao, Y., Giddens, S., Ficek, J., Valente, M.J., Daley, E.: A data-driven approach to choosing privacy parameters for clinical trial data sharing under differential privacy. J. Am. Med. Inform. Assoc. 31, 1135\u20131143 (2024)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"4","key":"5337_CR106","first-page":"340","volume":"3","author":"H Xie","year":"2024","unstructured":"Xie, H., Zhang, Y., Zhongwen, Z., Zhou, H.: Privacy-preserving medical data collaborative modeling: a differential privacy enhanced federated learning framework. J. Knowl. Learn. Sci. Technol. 3(4), 340\u2013350 (2024)","journal-title":"J. Knowl. Learn. Sci. Technol."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05337-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05337-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05337-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T08:50:10Z","timestamp":1757321410000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05337-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"references-count":106,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5337"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05337-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"27 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"413"}}