{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T21:01:57Z","timestamp":1772658117955,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05939-8","type":"journal-article","created":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T20:35:15Z","timestamp":1772656515000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight large language model based hierarchical federated learning for B5G enabled IoT intrusion detection networks"],"prefix":"10.1007","volume":"29","author":[{"given":"Rami","family":"Mohawesh","sequence":"first","affiliation":[]},{"given":"Haitham","family":"Al-Obiedollah","sequence":"additional","affiliation":[]},{"given":"Sumbal","family":"Maqsood","sequence":"additional","affiliation":[]},{"given":"Haythem","family":"Bany Salameh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,4]]},"reference":[{"key":"5939_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2025.103126","volume":"142","author":"M Alhafnawi","year":"2025","unstructured":"Alhafnawi, M., Abu-Ein, A., Salameh, H.B., Jararweh, Y., Al-Hazaimeh, O.: Intelligent dynamic bandwidth allocation for real-time iot in fog-based optical networks. Simulation Modelling Practice and Theory 142, 103126 (2025)","journal-title":"Simulation Modelling Practice and Theory"},{"issue":"17","key":"5939_CR2","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1007\/s11227-025-08061-5","volume":"81","author":"A Al-Yousef","year":"2025","unstructured":"Al-Yousef, A., Mohawesh, R., Saifan, A.A., Al-Shannaq, M.: Cross-frd: A self-supervised transformer framework for cross-domain fraudulent review detection. J. Supercomput. 81(17), 1575 (2025)","journal-title":"J. Supercomput."},{"issue":"6","key":"5939_CR3","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","volume":"32","author":"JG Andrews","year":"2014","unstructured":"Andrews, J.G., Buzzi, S., Choi, W., et al.: What will 5g be? IEEE Journal on Selected Areas in Communications 32(6), 1065\u20131082 (2014)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"5939_CR4","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1007\/s10586-022-03759-0","volume":"26","author":"HB Salameh","year":"2023","unstructured":"Salameh, H.B., Al-Obiedollah, H., Al-Hayek, M., Abdel-Razeq, S., Al-Ajlouni, A.: A two-dimensional oma-noma user-pairing and power-minimization approach for opportunistic b5g-enabled iot networks. Cluster Computing 26(2), 1113\u20131124 (2023)","journal-title":"Cluster Computing"},{"issue":"5","key":"5939_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-025-05131-4","volume":"28","author":"H Bany Salameh","year":"2025","unstructured":"Bany Salameh, H., Jararweh, Y.: Efficient charging station deployment in unmanned aerial vehicle systems for enhanced mission efficiency. Cluster Computing 28(5), 1\u201312 (2025)","journal-title":"Cluster Computing"},{"key":"5939_CR6","doi-asserted-by":"crossref","unstructured":"Benfriha, S., Labraoui, N., Bany Salameh, H A., Bensaid, R.: Reinforcement learning-based drone-client selection for efficient federated learning-based intrusion detection in fanets. Cluster Computing 28, 549 (2025)","DOI":"10.1007\/s10586-025-05188-1"},{"key":"5939_CR7","first-page":"1877","volume":"33","author":"TB Brown","year":"2020","unstructured":"Brown, T.B., Mann, B., Ryder, Nick, et al.: Language models are few-shot learners. Adv Neural Inf Process Syst 33, 1877\u20131901 (2020)","journal-title":"Adv Neural Inf Process Syst"},{"issue":"7","key":"5939_CR8","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/s10586-025-05325-w","volume":"28","author":"B Buyuktan\u0131r","year":"2025","unstructured":"Buyuktan\u0131r, B., Alt\u0131nkaya, \u015e, Baydo\u011fmu\u015f, G., Y\u0131ld\u0131z, Kaz\u0131m: Federated learning in intrusion detection: advancements, applications, and future directions. Cluster Computing 28(7), 473 (2025)","journal-title":"Cluster Computing"},{"key":"5939_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Y. et\u00a0al.: Fedvision: An online visual object detection platform powered by federated learning. Proceedings of the AAAI Conference on Artificial Intelligence (2020)","DOI":"10.1609\/aaai.v34i08.7021"},{"key":"5939_CR10","unstructured":"Dettmers, T., Lewis, M., Belkada, Y., Zettlemoyer L.: Llm.int8(): 8-bit matrix multiplication for transformers at scale. arXiv preprint arXiv:2208.07339, (2022)"},{"key":"5939_CR11","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M-W., Lee, K., Toutanova K.: Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of NAACL-HLT, pages 4171\u20134186, (2019)","DOI":"10.18653\/v1\/N19-1423"},{"issue":"5","key":"5939_CR12","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2017.1600951","volume":"55","author":"X Foukas","year":"2017","unstructured":"Foukas, X., Patounas, G., Elmokashfi, A., Marina, Maria K.: Network slicing in 5g: Survey and challenges. IEEE Communications Magazine 55(5), 94\u2013100 (2017)","journal-title":"IEEE Communications Magazine"},{"key":"5939_CR13","doi-asserted-by":"crossref","unstructured":"Gholami, A., Kim, S., Dong, Z., Yao, Z., Mahoney, M\u00a0W., Keutzer, K.: A survey of quantization methods for efficient neural network inference. arXiv preprint arXiv:2103.13630, (2021)","DOI":"10.1201\/9781003162810-13"},{"key":"5939_CR14","unstructured":"Hu, EJ., Shen, Y., Wallis, P., Allen-Zhu, Z., Li, Y., Wang, S., Chen, W., Chen, Y.: Lora: Low-rank adaptation of large language models. arXiv preprint (2021). https:\/\/arxiv.org\/abs\/2106.09685"},{"key":"5939_CR15","doi-asserted-by":"crossref","unstructured":"Kudo, T.: Subword regularization: Improving neural network translation models with multiple subword candidates. In ACL, (2018)","DOI":"10.18653\/v1\/P18-1007"},{"issue":"3","key":"5939_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2021","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: Challenges, methods, and future directions. IEEE Signal Processing Magazine 37(3), 50\u201360 (2020)","journal-title":"IEEE Signal Processing Magazine"},{"issue":"4","key":"5939_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MIS.2020.2988604","volume":"35","author":"Y Chen","year":"2020","unstructured":"Li, X., Yuxuan, G., Dvornek, Nicha, et al.: Fedhealth: A federated transfer learning framework for wearable healthcare. IEEE Intelligent Systems 16(1), 188\u2013197 (2020)","journal-title":"IEEE Intelligent Systems"},{"key":"5939_CR18","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., Stoyanov, V.: Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692, (2019)"},{"key":"5939_CR19","doi-asserted-by":"crossref","unstructured":"Mishra, RA., Kalla, A., Shukla, K., Nag, A., Liyanage,M.: B-vnf: Blockchain-enhanced architecture for vnf orchestration in mec-5g networks. In 2020 IEEE 3rd 5G World Forum (5GWF), pages 229\u2013234, (2020)","DOI":"10.1109\/5GWF49715.2020.9221075"},{"key":"5939_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2025.100580","volume":"15","author":"R Mohawesh","year":"2025","unstructured":"Mohawesh, R., Ottom, M.A., Salameh, H.B.: A data-driven risk assessment of cybersecurity challenges posed by generative ai. Decision Analytics Journal 15, 100580 (2025)","journal-title":"Decision Analytics Journal"},{"key":"5939_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa, N.: A new distributed architecture for evaluating ai-based security systems at the edge: Network ton_iot datasets. Sustain. Cities Soc. 72, 102994 (2021)","journal-title":"Sustain. Cities Soc."},{"issue":"8","key":"5939_CR22","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., Jeffrey, W., Child, R., Luan, D., Amodei, D., Sutskever, I.: Language models are unsupervised multitask learners. In OpenAI Blog 1(8), 9 (2019)","journal-title":"In OpenAI Blog"},{"key":"5939_CR23","unstructured":"Reddi, S., Charles, Z., et\u00a0al.: Adaptive federated optimization. In International Conference on Learning Representations (ICLR), (2021)"},{"key":"5939_CR24","unstructured":"Khouas, A.\u00a0R., Bouadjenek, M.\u00a0R., Hacid, H., Aryal, S.: Training machine learning models at the edge: A survey. arXiv preprint (2024) https:\/\/arxiv.org\/abs\/2403.02619"},{"key":"5939_CR25","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter. arXiv preprint arXiv:1910.01108, (2020)"},{"key":"5939_CR26","doi-asserted-by":"crossref","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Neural machine translation of rare words with subword units. ACL, (2016)","DOI":"10.18653\/v1\/P16-1162"},{"issue":"3","key":"5939_CR27","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1109\/COMST.2017.2705720","volume":"19","author":"T Taleb","year":"2017","unstructured":"Taleb, T., Samdanis, K., Mada, B., et al.: On multi-access edge computing: A survey of the emerging 5g network edge cloud architecture and orchestration. IEEE Communications Surveys & Tutorials 19(3), 1657\u20131681 (2017)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5939_CR28","unstructured":"Touvron, H., Lavril, T., Izacard, G., et\u00a0al.: Llama: Open and efficient foundation language models. arXiv preprint arXiv:2302.13971, (2023)"},{"issue":"2","key":"5939_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2), 1\u201319 (2019)","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05939-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05939-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05939-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T20:35:21Z","timestamp":1772656521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05939-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,4]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5939"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05939-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,4]]},"assertion":[{"value":"12 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"None","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"None","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"None","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}},{"value":"On request","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"The authors declare no competing interests.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"195"}}