{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:15:56Z","timestamp":1765278956390,"version":"3.46.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["Grant EP\/W020408\/1 and Grant RS718"],"award-info":[{"award-number":["Grant EP\/W020408\/1 and Grant RS718"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The rapid growth of the Internet of Things (IoT) has led to revolutionary innovations in many fields; however, it has also resulted in significant security and privacy issues due to the resource limitations and distributed nature of IoT networks. Traditional cryptographic techniques or machine learning-based anomaly detection systems do not jointly provide data privacy and resilience to threats in real time. The existing methods, such as Homomorphic Encryption (HE), offer a high computation cost for performing encryption. Furthermore, Long Short-Term Memory (LSTM) networks can predict an anomaly profile instead of performing encryption. To address these shortcomings, this paper proposes NeuroCrypt. This new hybrid system combines Fully Homomorphic Encryption (FHE) with LSTM-based encrypted anomaly detection and supplements it with blockchain-based dynamic key management and multi-factor authentication. The architecture targets edge and fog computing settings using, among other techniques, ciphertext packing, model quantisation, and parallelised encrypted operations. The performance of the proposed framework has been evaluated on a real dataset. The results show that the accuracy in the proposed framework is 99.2% compared to existing techniques such as HE-based DNN, FL-based models, and LSTM IDS. Conclusively, NeuroCrypt provides a privacy-preserving, effective, and scalable solution to real-time threat abatement in IoT networks.<\/jats:p>","DOI":"10.1007\/s10791-025-09843-4","type":"journal-article","created":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:08:19Z","timestamp":1765278499000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LSTM guided homomorphic encryption for threat-resistant IoT networks"],"prefix":"10.1007","volume":"28","author":[{"given":"Sanjeev","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sukhvinder Singh","family":"Deora","sequence":"additional","affiliation":[]},{"given":"Tajinder","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Purushottam","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Vishal","family":"Garg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"issue":"1","key":"9843_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MWC.001.2100322","volume":"29","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Deng RH, Zheng D. Secure and efficient federated learning for internet of things: foundations and challenges. IEEE Wirel Commun. 2022;29(1):32\u20139. https:\/\/doi.org\/10.1109\/MWC.001.2100322.","journal-title":"IEEE Wirel Commun"},{"key":"9843_CR2","doi-asserted-by":"publisher","first-page":"121647","DOI":"10.1016\/j.techfore.2022.121647","volume":"179","author":"A Rejeb","year":"2022","unstructured":"Rejeb A, Keogh JG, Simske SJ, Treiblmaier H, Keogh J. Blockchain technology in the smart city: A bibliometric review. Technol Forecast Soc Chang. 2022;179:121647. https:\/\/doi.org\/10.1016\/j.techfore.2022.121647.","journal-title":"Technol Forecast Soc Chang"},{"issue":"5","key":"9843_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3510422","volume":"55","author":"MR Hesamzadeh","year":"2022","unstructured":"Hesamzadeh MR, Berzish M. Privacy-Preserving deep learning: Threats, Challenges, and solutions. ACM-CSUR. 2022;55(5):1\u201340. https:\/\/doi.org\/10.1145\/3510422.","journal-title":"ACM-CSUR"},{"issue":"8","key":"9843_CR4","doi-asserted-by":"publisher","first-page":"5617","DOI":"10.1109\/TII.2020.3046083","volume":"17","author":"Y Li","year":"2021","unstructured":"Li Y, Liu B, Qin Z, Zhou P. DeepFed: federated deep learning with differential privacy for cyber intrusion detection. IEEE Trans Industr Inf. 2021;17(8):5617\u201326. https:\/\/doi.org\/10.1109\/TII.2020.3046083.","journal-title":"IEEE Trans Industr Inf"},{"key":"9843_CR5","doi-asserted-by":"publisher","unstructured":"Halevi S, Shoup V. (2020). Faster Homomorphic Linear Transformations in HElib. Advances in Cryptology \u2013 CRYPTO 2020, Lecture Notes in Computer Science, 12171, 93\u2013124. Springer. https:\/\/doi.org\/10.1007\/978-3-030-56877-1_4","DOI":"10.1007\/978-3-030-56877-1_4"},{"issue":"6","key":"9843_CR6","doi-asserted-by":"publisher","first-page":"4287","DOI":"10.1109\/JIOT.2020.3012886","volume":"8","author":"Y Liu","year":"2020","unstructured":"Liu Y, Sun M, Lin Z, Liu Y. Blockchain-based data privacy management with nudge theory in the internet of things. IEEE Internet Things J. 2020;8(6):4287\u201396. https:\/\/doi.org\/10.1109\/JIOT.2020.3012886.","journal-title":"IEEE Internet Things J"},{"key":"9843_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2021.09.004","volume":"182","author":"T Sun","year":"2022","unstructured":"Sun T, Zhou J, Li Z, Liu Q. Survey on blockchain for internet of things. Comput Commun. 2022;182:1\u201315. https:\/\/doi.org\/10.1016\/j.comcom.2021.09.004.","journal-title":"Comput Commun"},{"issue":"3","key":"9843_CR8","doi-asserted-by":"publisher","first-page":"4289","DOI":"10.1109\/JIOT.2023.3302065","volume":"11","author":"NM Hijazi","year":"2023","unstructured":"Hijazi NM, Aloqaily M, Guizani M, Ouni B, Karray F. Secure federated learning with fully homomorphic encryption for Iot communications. IEEE Internet Things J. 2023;11(3):4289\u2013300.","journal-title":"IEEE Internet Things J"},{"key":"9843_CR9","doi-asserted-by":"crossref","unstructured":"Praveen R, Pabitha P. (2023). Improved Gentry\u2013Halevi\u2019s fully homomorphic encryption-based lightweight privacy preserving scheme for securing medical Internet of Things. Trans Emerg Telecommunications Technol, 34(4),e4732.","DOI":"10.1002\/ett.4732"},{"issue":"10","key":"9843_CR10","doi-asserted-by":"publisher","first-page":"6055","DOI":"10.3390\/app13106055","volume":"13","author":"A Albakri","year":"2023","unstructured":"Albakri A, Alshahrani R, Alharbi F, Ahamed SB. Fully homomorphic encryption with optimal key generation secure group communication in internet of things environment. Appl Sci. 2023;13(10):6055.","journal-title":"Appl Sci"},{"key":"9843_CR11","doi-asserted-by":"crossref","unstructured":"Sawlikar AP, Raich DS, Ganguly BS, Yadav LN. (2025). An enhanced encryption scheme for IoT-Based wireless sensor network using DNA enclosed fully homomorphic approach. Trans Emerg Telecommunications Technol, 36(3), e70075.","DOI":"10.1002\/ett.70075"},{"key":"9843_CR12","doi-asserted-by":"publisher","first-page":"101952","DOI":"10.1016\/j.pmcj.2024.101952","volume":"103","author":"S Hamsanandhini","year":"2024","unstructured":"Hamsanandhini S, Balasubramanie P. IoT data encryption and phrase search-based efficient processing using a fully Homomorphic-based SE (FHSE) scheme. Pervasive Mob Comput. 2024;103:101952.","journal-title":"Pervasive Mob Comput"},{"key":"9843_CR13","doi-asserted-by":"crossref","unstructured":"Suma MR, Madhumathy P. (2022). Brakerski-Gentry\u2010Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted internet of things services using glow\u2010worm swarm optimization. Trans Emerg Telecommunications Technol, 33(12), e4641.","DOI":"10.1002\/ett.4641"},{"issue":"10","key":"9843_CR14","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","volume":"110","author":"C Marcolla","year":"2022","unstructured":"Marcolla C, Sucasas V, Manzano M, Bassoli R, Fitzek FH, Aaraj N. Survey on fully homomorphic encryption, theory, and applications. Proc IEEE. 2022;110(10):1572\u2013609.","journal-title":"Proc IEEE"},{"issue":"5","key":"9843_CR15","doi-asserted-by":"publisher","first-page":"2864","DOI":"10.1109\/TNSE.2022.3185327","volume":"10","author":"L Zhang","year":"2022","unstructured":"Zhang L, Xu J, Vijayakumar P, Sharma PK, Ghosh U. Homomorphic encryption-based privacy-preserving federated learning in IoT-enabled healthcare system. IEEE Trans Netw Sci Eng. 2022;10(5):2864\u201380.","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"9843_CR16","doi-asserted-by":"crossref","unstructured":"Matsumoto M, Oguchi M. (2021, August). Speeding up encryption on iot devices using homomorphic encryption. In 2021 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 270\u2013275). IEEE.","DOI":"10.1109\/SMARTCOMP52413.2021.00059"},{"issue":"1","key":"9843_CR17","first-page":"2793998","volume":"2022","author":"V Subramaniyaswamy","year":"2022","unstructured":"Subramaniyaswamy V, Jagadeeswari V, Indragandhi V, Jhaveri R H, Vijayakumar V, Kotecha K, Ravi L. Somewhat homomorphic encryption: ring learning with error algorithm for faster encryption of IoT sensor signal-based edge devices. Secur CommunicationNetworks. 2022;2022(1):2793998.","journal-title":"Secur Communication Networks"},{"key":"9843_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.comcom.2022.04.018","volume":"191","author":"MA Kandi","year":"2022","unstructured":"Kandi MA, Kouicem DE, Doudou M, Lakhlef H, Bouabdallah A, Challal Y. A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Comput Commun. 2022;191:11\u201325.","journal-title":"Comput Commun"},{"issue":"16","key":"9843_CR19","doi-asserted-by":"publisher","first-page":"12947","DOI":"10.1109\/JIOT.2021.3063806","volume":"8","author":"SS Panda","year":"2021","unstructured":"Panda SS, Jena D, Mohanta BK, Ramasubbareddy S, Daneshmand M, Gandomi AH. Authentication and key management in distributed Iot using blockchain technology. IEEE Internet Things J. 2021;8(16):12947\u201354.","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"9843_CR20","doi-asserted-by":"publisher","first-page":"6155","DOI":"10.1007\/s40747-023-01058-8","volume":"9","author":"QUA Arshad","year":"2023","unstructured":"Arshad QUA, Khan WZ, Azam F, Khan MK, Yu H, Zikria YB. Blockchain-based decentralized trust management in iot: systems, requirements and challenges. Complex Intell Syst. 2023;9(6):6155\u201376.","journal-title":"Complex Intell Syst"},{"issue":"7","key":"9843_CR21","doi-asserted-by":"publisher","first-page":"7586","DOI":"10.1109\/TITS.2022.3160068","volume":"24","author":"M De Ree","year":"2022","unstructured":"De Ree M, Mantas G, Rodriguez J, Otung IE. DECENT: decentralized and efficient key management to secure communication in dense and dynamic environments. IEEE Trans Intell Transp Syst. 2022;24(7):7586\u201398.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"9843_CR22","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1007\/s40747-022-00667-z","volume":"8","author":"A Attkan","year":"2022","unstructured":"Attkan A, Ranga V. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex Intell Syst. 2022;8(4):3559\u201391.","journal-title":"Complex Intell Syst"},{"issue":"13","key":"9843_CR23","doi-asserted-by":"publisher","first-page":"10766","DOI":"10.1109\/JIOT.2021.3050562","volume":"8","author":"T Chen","year":"2021","unstructured":"Chen T, Zhang L, Choo KKR, Zhang R, Meng X. Blockchain-based key management scheme in fog-enabled IoT systems. IEEE Internet Things J. 2021;8(13):10766\u201378.","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"9843_CR24","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/s12652-021-02929-z","volume":"13","author":"U Narayanan","year":"2022","unstructured":"Narayanan U, Paul V, Joseph S. Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec. J Ambient Intell Humaniz Comput. 2022;13(2):769\u201387.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"13","key":"9843_CR25","doi-asserted-by":"publisher","first-page":"10625","DOI":"10.1109\/JIOT.2021.3124016","volume":"9","author":"H Yin","year":"2021","unstructured":"Yin H, Chen E, Zhu Y, Zhao C, Feng R, Yau SS. Attribute-based private data sharing with script-driven programmable ciphertext and decentralized key management in blockchain internet of things. IEEE Internet Things J. 2021;9(13):10625\u201339.","journal-title":"IEEE Internet ThingsJ"},{"issue":"1","key":"9843_CR26","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TNSE.2022.3205913","volume":"10","author":"J Zheng","year":"2022","unstructured":"Zheng J, Zhang L, Feng Y, Wu Z. Blockchain-based key management and authentication scheme for IoT networks with chaotic scrambling. IEEE Trans Netw Sci Eng. 2022;10(1):178\u201388.","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"1","key":"9843_CR27","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TMC.2021.3068717","volume":"22","author":"J Li","year":"2021","unstructured":"Li J, Wu J, Chen L, Li J, Lam SK. Blockchain-based secure key management for mobile edge computing. IEEE Trans Mob Comput. 2021;22(1):100\u201314.","journal-title":"IEEE Trans Mob Comput"},{"key":"9843_CR28","doi-asserted-by":"publisher","first-page":"110054","DOI":"10.1016\/j.asoc.2023.110054","volume":"136","author":"V Shanmuganathan","year":"2023","unstructured":"Shanmuganathan V, Suresh A. LSTM-Markov based efficient anomaly detection algorithm for IoT environment. Appl Soft Comput. 2023;136:110054.","journal-title":"Appl Soft Comput"},{"key":"9843_CR29","doi-asserted-by":"publisher","first-page":"62722","DOI":"10.1109\/ACCESS.2022.3176317","volume":"10","author":"I Ullah","year":"2022","unstructured":"Ullah I, Mahmoud QH. Design and development of RNN anomaly detection model for IoT networks. IEEE Access. 2022;10:62722\u201350.","journal-title":"IEEE Access"},{"issue":"2","key":"9843_CR30","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1109\/TII.2021.3079504","volume":"18","author":"J Liu","year":"2021","unstructured":"Liu J, Bai J, Li H, Sun B. Improved LSTM-based abnormal stream data detection and correction system for internet of things. IEEE Trans Industr Inf. 2021;18(2):1282\u201390.","journal-title":"IEEE Trans Industr Inf"},{"key":"9843_CR31","doi-asserted-by":"crossref","unstructured":"Bibi S, Titouna C, Titouna F, Na\u00eft-Abdesselam F. (2023, September). An LSTM-based outlier detection approach for IoT sensor data in hierarchical Edge Computing. In 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) (pp. 1\u20136). IEEE.","DOI":"10.23919\/SoftCOM58365.2023.10271607"},{"key":"9843_CR32","unstructured":"Sengan, S., Mehbodniya, A., Webber, J. L., Bostani, A., Almusharraf, A., Alharbi,M., \u2026 Khan, S. B. (2023). Improved LSTM-based anomaly detection model with cybertwin deep learning to detect cutting-edge cybersecurity attacks. Hum-Centric Comput Inf Sci, 13, 770-8."},{"key":"9843_CR33","doi-asserted-by":"crossref","unstructured":"Varshney N, Madan P, Shrivastava A, Srivastava AP, KUMAR CP, Khan K. (2023, December). Real-time anomaly detection in IoT healthcare devices with LSTM. In 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI) (Vol. 1, pp. 1\u20136). IEEE.","DOI":"10.1109\/ICAIIHI57871.2023.10489823"},{"key":"9843_CR34","doi-asserted-by":"crossref","unstructured":"Azumah SW, Elsayed N, Adewopo V, Zaghloul ZS, Li C. June). A deep Lstm based approach for intrusion detection Iot devices network in smart home. 2021 IEEE 7th world forum on internet of things (WF-IoT). IEEE; 2021. pp. 836\u201341.","DOI":"10.1109\/WF-IoT51360.2021.9596033"},{"key":"9843_CR35","doi-asserted-by":"crossref","unstructured":"Gopali S, Siami Namin A, Moon HJ. (2023). Anomaly detection based on lstm learning in iot-based dormitory for indoor environment control. Buildings, 13(11), 2886.","DOI":"10.3390\/buildings13112886"},{"issue":"4","key":"9843_CR36","doi-asserted-by":"publisher","first-page":"3787","DOI":"10.1109\/JSEN.2022.3230361","volume":"23","author":"Y Wei","year":"2023","unstructured":"Wei Y, Jang-Jaccard J, Xu W, Sabrina F, Camtepe S, Boulic M. LSTM-autoencoder-based anomaly detection for indoor air quality time-series data. IEEE Sens J. 2023;23(4):3787\u2013800.","journal-title":"IEEE Sens J"},{"issue":"1","key":"9843_CR37","first-page":"43","volume":"30","author":"KK Chanumolu","year":"2025","unstructured":"Chanumolu KK, Nagamani GM. An enhanced model for smart healthcare by integrating hybrid ML, LSTM, and blockchain. Ingenierie Des Systemes d\u2019Information. 2025;30(1):43.","journal-title":"Ingenierie Des Systemes d\u2019Information"},{"key":"9843_CR38","doi-asserted-by":"crossref","unstructured":"Senanayake N, Podschwadt R, Takabi D, Calhoun VD, Sergey M. Plis. NeuroCrypt: Machine learning over encrypted distributed neuroimaging data. Neuroinformatics 20, no. 1 (2022): 91\u2013108.","DOI":"10.1007\/s12021-021-09525-8"},{"key":"9843_CR39","unstructured":"Manh B, Duc C-H, Nguyen DT, Hoang, Diep N, Nguyen M, Zeng. and Quoc-Viet Pham. Privacy-Preserving cyberattack detection in Blockchain-Based IoT systems using AI and homomorphic encryption. IEEE Internet Things J (2025)."},{"key":"9843_CR40","doi-asserted-by":"crossref","unstructured":"Al Badawi A, Bates J, Bergamaschi F, Cousins DB, Erabelli S, Genise N, Halevi S et al. Openfhe: Open-source fully homomorphic encryption library. In proceedings of the 10th workshop on encrypted computing & applied homomorphic cryptography, pp. 53\u201363. 2022.","DOI":"10.1145\/3560827.3563379"},{"key":"9843_CR41","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"J-W Lee","year":"2022","unstructured":"Lee J-W, Kang HC, Lee Y, Choi W, Eom J, Deryabin M, Lee E, et al. Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. iEEE Access. 2022;10:30039\u201354.","journal-title":"iEEE Access"},{"key":"9843_CR42","doi-asserted-by":"crossref","unstructured":"Gentry C. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169\u2013178. 2009.","DOI":"10.1145\/1536414.1536440"},{"key":"9843_CR43","doi-asserted-by":"crossref","unstructured":"Cheon J, Hee A, Kim M, Kim, Song Y. Homomorphic encryption for arithmetic of approximate numbers. In Advances in cryptology\u2013ASIACRYPT 2017: 23rd international conference on the theory and applications of cryptology and information security, Hong kong, China, December 3\u20137, 2017, proceedings, part i 23, pp. 409\u2013437. Springer International Publishing, 2017.","DOI":"10.1007\/978-3-319-70694-8_15"},{"issue":"1","key":"9843_CR44","first-page":"24","volume":"20","author":"R Bhandari","year":"2024","unstructured":"Bhandari R, Singla S, Sharma P, Kang S. AINIS: an intelligent network intrusion system [J]. Int J Perform Eng. 2024;20(1):24\u201331.","journal-title":"Int J Perform Eng"},{"key":"9843_CR45","unstructured":"Narkedimilli S, Sriram AV, Raghav S. FL-DABE-BC: A Privacy-Enhanced, decentralized Authentication, and secure communication for federated learning framework with decentralized Attribute-Based encryption and blockchain for IoT Scenarios. ArXiv Preprint ArXiv:2410.20259 (2024)."},{"key":"9843_CR46","doi-asserted-by":"crossref","unstructured":"Bossuat J-P, Cammarota R, Chillotti I, Curtis BR, Dai W, Gong H, Hales E et al. Secur Guidelines Implement Homomorphic Encryption Cryptol ePrint Archive (2024).","DOI":"10.62056\/anxra69p1"},{"key":"9843_CR47","doi-asserted-by":"crossref","unstructured":"Xie Q, Jiang S, Jiang L, Huang Y, Zhao Z, Khan S, Dai W, Liu Z, Wu K. Efficiency optimization techniques in privacy-preserving federated learning with homomorphic encryption: A brief survey. IEEE internet of things journal 11, 14 (2024): 24569\u201380.","DOI":"10.1109\/JIOT.2024.3382875"},{"key":"9843_CR48","doi-asserted-by":"publisher","first-page":"100689","DOI":"10.1016\/j.cosrev.2024.100689","volume":"55","author":"W Liu","year":"2025","unstructured":"Liu W, You L, Shao Y, Shen X. Jiawen Shi, and Shuhong Gao. From accuracy to approximation: A survey on approximate homomorphic encryption and its applications. Comput Sci Rev. 2025;55:100689.","journal-title":"Comput Sci Rev"},{"key":"9843_CR49","doi-asserted-by":"crossref","unstructured":"Xiong H, Hang Y, Obaidat MS, Chen J, Cao M, Kumar S. Kadambri Agarwal, and Saru Kumari. Efficient and Privacy-Enhanced Asynchronous Federated Learning for Multimedia Data in Edge-based IoT. ACM Transactions on Multimedia Computing, Communications and Applications (2024).","DOI":"10.1145\/3688002"},{"issue":"2","key":"9843_CR50","first-page":"141","volume":"4","author":"M Istaltofa","year":"2024","unstructured":"Istaltofa M, Sarwido S, Sucipto A. Comparison of linear regression and LSTM (Long Short-Term Memory) in cryptocurrency prediction. J Dinda: Data Sci Inform Technol Data Analytics. 2024;4(2):141\u20138.","journal-title":"J Dinda: Data Sci Inform Technol Data Analytics"},{"key":"9843_CR51","doi-asserted-by":"publisher","first-page":"265","DOI":"10.54254\/2755-2721\/49\/20241346","volume":"49","author":"Q Xiang","year":"2024","unstructured":"Xiang Q. Cryptocurrency assets valuation prediction based on LSTM, neural network, and deep learning hybrid model. Appl Comput Eng. 2024;49:265\u201372.","journal-title":"Appl Comput Eng"},{"key":"9843_CR52","unstructured":"Wu J, Zhang X, Huang F, Zhou H. and Rohtiash Chandra. Review of deep learning models for crypto price prediction: implementation and evaluation. arXiv preprint arXiv:2405.11431 (2024)."},{"issue":"1","key":"9843_CR53","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/s13198-022-01820-0","volume":"14","author":"S Singla","year":"2023","unstructured":"Singla S, Sharma P, Sharma PK. Enhanced security using proxy signcryption technique for wireless mesh networks. Int J Syst Assur Eng Manage. 2023;14(1):474\u201382. https:\/\/doi.org\/10.1007\/s13198-022-01820-0.","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"17","key":"9843_CR54","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.3390\/electronics13173461","volume":"13","author":"M Kumar","year":"2024","unstructured":"Kumar M, Kim S. Securing the internet of health things: embedded federated learning-driven long short-term memory for cyberattack detection. Electronics. 2024;13(17):3461.","journal-title":"Electronics"},{"issue":"1","key":"9843_CR55","doi-asserted-by":"publisher","first-page":"28","DOI":"10.55056\/jec.648","volume":"3","author":"AI Jony","year":"2024","unstructured":"Jony AI, Kumar Bose A, Arnob. A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset. J Edge Comput. 2024;3(1):28\u201342.","journal-title":"J Edge Comput"},{"key":"9843_CR56","first-page":"111731","volume":"161","author":"A Sarkar","year":"2024","unstructured":"Sarkar A. Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication. Industrial Internet Things Appl Soft Comput. 2024;161:111731.","journal-title":"Industrial Internet Things Appl Soft Comput"},{"issue":"3","key":"9843_CR57","first-page":"393","volume":"14","author":"DSJD Prasanna","year":"2024","unstructured":"Prasanna DSJD, Punitha K, Raju MN, Rahman F, Yadav KK. An artificial Intelligence-based, big Data-aware, Long-lasting security solution for the internet of things. J Internet Serv Inform Secur. 2024;14(3):393\u2013402.","journal-title":"J Internet Serv Inform Secur"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09843-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09843-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09843-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:08:25Z","timestamp":1765278505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09843-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,9]]},"references-count":57,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9843"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09843-4","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,9]]},"assertion":[{"value":"18 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This is an observational study. So, No Ethical Approval required.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"301"}}