{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:26Z","timestamp":1774678346155,"version":"3.50.1"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02014-8","type":"journal-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T19:17:51Z","timestamp":1749064671000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Federated active meta-learning with blockchain for zero-day attack detection in industrial IoT"],"prefix":"10.1007","volume":"18","author":[{"given":"Kapil","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Manju","family":"Khari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,5]]},"reference":[{"key":"2014_CR1","doi-asserted-by":"crossref","first-page":"100297","DOI":"10.1016\/j.sintl.2024.100297","volume":"6","author":"SY Kayode","year":"2025","unstructured":"Kayode SY, Omole AI, Sabit MO (2025) GA-mADAM-IIoT: A new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sensors Int 6:100297","journal-title":"Sensors Int"},{"issue":"16","key":"2014_CR2","doi-asserted-by":"crossref","first-page":"e8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili A, Al-Khafaji HMR, Darbandi M, Heidari A, Jafari Navimipour N, Unal M (2024) A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr Comput Pract Exp 36(16):e8091","journal-title":"Concurr Comput Pract Exp"},{"issue":"6","key":"2014_CR3","doi-asserted-by":"crossref","first-page":"7521","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Comput 27(6):7521\u20137539","journal-title":"Cluster Comput"},{"key":"2014_CR4","doi-asserted-by":"crossref","first-page":"109838","DOI":"10.1016\/j.engappai.2024.109838","volume":"141","author":"AA Khan","year":"2025","unstructured":"Khan AA, Yang J, Laghari AA, Baqasah AM, Alroobaea R, Ku CS, Por LY (2025) BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"2014_CR5","first-page":"3003","volume":"73","author":"F Azzedin","year":"2022","unstructured":"Azzedin F, Suwad H, Rahman MM (2022) An asset-based approach to mitigate zero-day ransomware attacks. Comput Mater Contin 73(2):3003","journal-title":"Comput Mater Contin"},{"issue":"7","key":"2014_CR6","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.47974\/JDMSC-2092","volume":"27","author":"AB Kathole","year":"2024","unstructured":"Kathole AB, Vhatkar K, Dharmale G, Chiwhane S, Kimbahune VV, Goyal A (2024) A novel approach to IoT security for intrusion detection system using ensemble network and heuristic-assisted feature fusion. J Discrete Math Sci Cryptogr 27(7):2207\u20132217","journal-title":"J Discrete Math Sci Cryptogr"},{"issue":"1","key":"2014_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-024-01821-9","volume":"18","author":"I Ullah","year":"2025","unstructured":"Ullah I, Deng X, Pei X, Mushtaq H, Uzair M (2025) IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. Peer-to-Peer Netw Appl 18(1):1\u201320","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"2014_CR8","doi-asserted-by":"crossref","first-page":"212","DOI":"10.3390\/info15040212","volume":"15","author":"BUI Khan","year":"2024","unstructured":"Khan BUI, Goh KW, Mir MS, Mohd Rosely NFL, Mir AA, Chaimanee M (2024) Blockchain-enhanced sensor-as-a-service (SEaaS) in IoT: leveraging blockchain for efficient and secure sensing data transactions. Information 15(4):212","journal-title":"Information"},{"key":"2014_CR9","doi-asserted-by":"crossref","first-page":"117154","DOI":"10.1109\/ACCESS.2024.3447829","volume":"12","author":"AB Kathole","year":"2024","unstructured":"Kathole AB, Vhatkar KN, Goyal A, Kaushik S, Mirge AS, Jain P, Islam MT (2024) Secure federated cloud storage protection strategy using hybrid heuristic attribute-based encryption with permissioned blockchain. IEEE Access 12:117154\u2013117169","journal-title":"IEEE Access"},{"key":"2014_CR10","doi-asserted-by":"publisher","unstructured":"Muthukrishnan G, Kalyani S (2025) Differential privacy with higher utility by exploiting coordinate-wise disparity: laplace mechanism can beat gaussian in high dimensions. IEEE Trans Inform Forensic Secur. https:\/\/doi.org\/10.1109\/TIFS.2025.3536277","DOI":"10.1109\/TIFS.2025.3536277"},{"issue":"21","key":"2014_CR11","doi-asserted-by":"crossref","first-page":"e8205","DOI":"10.1002\/cpe.8205","volume":"36","author":"S Ahmad","year":"2024","unstructured":"Ahmad S, Arif M, Ahmad J, Nazim M, Mehfuz S (2024) Convergent encryption enabled secure data deduplication algorithm for cloud environment. Concurr Comput Pract Exp 36(21):e8205","journal-title":"Concurr Comput Pract Exp"},{"issue":"3","key":"2014_CR12","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1007\/s12559-024-10255-7","volume":"16","author":"A Heidari","year":"2024","unstructured":"Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput 16(3):1073\u20131091","journal-title":"Cogn Comput"},{"key":"2014_CR13","doi-asserted-by":"crossref","first-page":"102756","DOI":"10.1016\/j.inffus.2024.102756","volume":"115","author":"F Sabah","year":"2025","unstructured":"Sabah F, Chen Y, Yang Z, Raheem A, Azam M, Ahmad N, Sarwar R (2025) FairDPFL-SCS: fair dynamic personalized federated learning with strategic client selection for improved accuracy and fairness. Inform Fusion 115:102756","journal-title":"Inform Fusion"},{"issue":"1","key":"2014_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12785\/ijcds\/110101","volume":"11","author":"AKM Al-Qurabat","year":"2022","unstructured":"Al-Qurabat AKM (2022) A lightweight Huffman-based differential encoding lossless compression technique in IoT for smart agriculture. Int J Comput Digit Syst 11(1):1\u201311","journal-title":"Int J Comput Digit Syst"},{"key":"2014_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/TON.2025.3526866","author":"X Liu","year":"2025","unstructured":"Liu X, Zhou Y, Wu D, Hu M, Chen M, Guizani M, Sheng QZ (2025) CPFedAvg: Enhancing hierarchical federated learning via optimized local aggregation and parameter mixing. IEEE Trans Netw. https:\/\/doi.org\/10.1109\/TON.2025.3526866","journal-title":"IEEE Trans Netw"},{"key":"2014_CR16","doi-asserted-by":"crossref","first-page":"102932","DOI":"10.1016\/j.inffus.2025.102932","volume":"118","author":"N Singh","year":"2025","unstructured":"Singh N, Adhikari M (2025) SelfFed: Self-adaptive federated learning with non-IID data on heterogeneous edge devices for bias mitigation and enhanced training efficiency. Inform Fusion 118:102932","journal-title":"Inform Fusion"},{"key":"2014_CR17","doi-asserted-by":"publisher","unstructured":"Azzedin F, Suwad H, Alyafeai Z (2017) Countermeasureing zero day attacks: asset-based approach. In 2017 international conference on high performance computing & simulation (HPCS) (pp. 854-857). IEEE, Genoa, Italy, 17-21 July 2017. https:\/\/doi.org\/10.1109\/HPCS.2017.129","DOI":"10.1109\/HPCS.2017.129"},{"issue":"16","key":"2014_CR18","doi-asserted-by":"crossref","first-page":"17844","DOI":"10.1007\/s11227-022-04548-7","volume":"78","author":"AKM Al-Qurabat","year":"2022","unstructured":"Al-Qurabat AKM, Abdulzahra SA, Idrees AK (2022) Two-level energy-efficient data reduction strategies based on SAX-LZW and hierarchical clustering for minimizing the huge data conveyed on the internet of things networks. J Supercomput 78(16):17844\u201317890","journal-title":"J Supercomput"},{"key":"2014_CR19","doi-asserted-by":"publisher","unstructured":"Thirupathi L, Akshaya B, Reddy PC, Harsha SS, Reddy ES (2025) Integration of AI and quantum computing in cyber security. In: Mishra BK (ed) Integration of AI, quantum computing, and semiconductor technology. IGI Global, pp 29\u201356. https:\/\/doi.org\/10.4018\/979-8-3693-7076-6.ch002","DOI":"10.4018\/979-8-3693-7076-6.ch002"},{"key":"2014_CR20","first-page":"2024","volume":"103792","author":"A Javadpour","year":"2024","unstructured":"Javadpour A, Ja\u2019fari F, Taleb T, Shojafar M, Benza\u00efd C (2024) A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput Secur 103792:2024","journal-title":"Comput Secur"},{"issue":"23","key":"2014_CR21","doi-asserted-by":"crossref","first-page":"e7806","DOI":"10.1002\/cpe.7806","volume":"35","author":"S Ahmad","year":"2023","unstructured":"Ahmad S, Mehfuz S, Beg J (2023) An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. Concurr Comput Pract Exp 35(23):e7806","journal-title":"Concurr Comput Pract Exp"},{"key":"2014_CR22","doi-asserted-by":"publisher","unstructured":"Al-hajjar ALN, Al-Qurabat AKM (2023) Epileptic seizure detection using feature importance and ML classifiers. J Educ Pure Sci 13(2). https:\/\/doi.org\/10.32792\/jeps.v13i2.310","DOI":"10.32792\/jeps.v13i2.310"},{"issue":"2","key":"2014_CR23","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1007\/s13369-024-08935-5","volume":"50","author":"K Saurabh","year":"2025","unstructured":"Saurabh K, Sharma V, Singh U, Khondoker R, Vyas R, Vyas OP (2025) HMS-IDS: threat intelligence integration for zero-day exploits and advanced persistent threats in IIoT. Arab J Sci Eng 50(2):1307\u20131327","journal-title":"Arab J Sci Eng"},{"key":"2014_CR24","doi-asserted-by":"publisher","unstructured":"Xu Z, Wang Y, Wu Z, Zheng WX, Hu C (2025) Federated learning-based offset-free distributed control of nonlinear networked systems with application to IIoT. IEEE Trans Netw Sci Eng. https:\/\/doi.org\/10.1109\/TNSE.2025.3540643","DOI":"10.1109\/TNSE.2025.3540643"},{"key":"2014_CR25","doi-asserted-by":"publisher","unstructured":"Hossain MT, Badsha S, La H, Islam S, Khalil I (2025) Exploiting gaussian noise variance for dynamic differential poisoning in federated learning. IEEE Trans Artif Intell. https:\/\/doi.org\/10.1109\/TAI.2025.3540030","DOI":"10.1109\/TAI.2025.3540030"},{"key":"2014_CR26","doi-asserted-by":"crossref","unstructured":"E. Nowroozi, I. Haider, R. Taheri, and M. Conti, \"Federated learning under attack: Exposing vulnerabilities through data poisoning attacks in computer networks,\" IEEE Transactions on Network and Service Management, 2025.","DOI":"10.36227\/techrxiv.170492270.09799501\/v1"},{"key":"2014_CR27","doi-asserted-by":"publisher","unstructured":"Li B, Gu H, Chen R, Li J, Wu C, Ruan N, Si X, Fan L (2025) Temporal gradient inversion attacks with robust optimization. IEEE Trans Dependable and Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2025.3532339","DOI":"10.1109\/TDSC.2025.3532339"},{"key":"2014_CR28","doi-asserted-by":"crossref","first-page":"112962","DOI":"10.1016\/j.knosys.2025.112962","volume":"310","author":"B Wang","year":"2025","unstructured":"Wang B, Tian Z, Liu X, Xia Y, She W, Liu W (2025) A multi-center federated learning mechanism based on consortium blockchain for data secure sharing. Knowl-Based Syst 310:112962","journal-title":"Knowl-Based Syst"},{"key":"2014_CR29","doi-asserted-by":"publisher","unstructured":"Chinnasamy P, Samrin R, Sujitha BB, Augasthega R, Rajagopal M, Nageswaran A (2024) Integrating intelligent breach detection system into 6 g enabled smart grid-based cyber physical systems. Wireless Pers Commun 1-16. https:\/\/doi.org\/10.1007\/s11277-024-11192-2","DOI":"10.1007\/s11277-024-11192-2"},{"key":"2014_CR30","doi-asserted-by":"crossref","first-page":"104299","DOI":"10.1016\/j.cose.2024.104299","volume":"150","author":"C Karpagavalli","year":"2025","unstructured":"Karpagavalli C, Kaliappan M (2025) Edge implicit weighting with graph transformers for robust intrusion detection in internet of things network. Comput Secur 150:104299","journal-title":"Comput Secur"},{"issue":"1","key":"2014_CR31","first-page":"1","volume":"18","author":"R Wang","year":"2025","unstructured":"Wang R, Ma F, Tang S, Zhang H, He J, Su Z, Xu C (2025) Parallel Byzantine fault tolerance consensus based on trusted execution environments. Peer-to-Peer Netw Appl 18(1):1\u201324","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2014_CR32","doi-asserted-by":"crossref","first-page":"109343","DOI":"10.1016\/j.compeleceng.2024.109343","volume":"118","author":"AA Khan","year":"2024","unstructured":"Khan AA, Dhabi S, Yang J, Alhakami W, Bourouis S, Yee L (2024) B-LPoET: a middleware lightweight proof-of-elapsed time (PoET) for efficient distributed transaction execution and security on blockchain using multithreading technology. Comput Electr Eng 118:109343","journal-title":"Comput Electr Eng"},{"key":"2014_CR33","doi-asserted-by":"publisher","unstructured":"Majeed A, Hwang SO (2024) Solving the privacy-equity trade-off in data sharing by using homophily, diversity, and t-closeness based anonymity algorithm. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3510332","DOI":"10.1109\/ACCESS.2024.3510332"},{"issue":"5","key":"2014_CR34","doi-asserted-by":"crossref","first-page":"2256","DOI":"10.1007\/s12083-023-01531-8","volume":"16","author":"I Ullah","year":"2023","unstructured":"Ullah I, Deng X, Pei X, Jiang P, Mushtaq H (2023) A verifiable and privacy-preserving blockchain-based federated learning approach. Peer-to-Peer Netw Appl 16(5):2256\u20132270","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"2014_CR35","first-page":"74","volume":"4","author":"M Zhu","year":"2024","unstructured":"Zhu M, Li X, Zhang Y, Wang J, Liu Z, Zhang Q (2024) Enhancing collaborative machine learning for security and privacy in federated learning. J Theory Pract Eng Sci 4(2):74\u201382","journal-title":"J Theory Pract Eng Sci"},{"issue":"5","key":"2014_CR36","first-page":"7525","volume":"11","author":"A Javadpour","year":"2023","unstructured":"Javadpour A, Jafari F, Taleb T, Zhao Y, Yang B, Benzaid C (2023) Encryption as a service for IoT: opportunities, challenges, and solutions. IEEE Int Things J 11(5):7525\u20137558","journal-title":"IEEE Int Things J"},{"key":"2014_CR37","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/OAJPE.2024.3365747","volume":"11","author":"RR Tiferes","year":"2024","unstructured":"Tiferes RR, Manassero G, Pellini EL, di Santo SG (2024) Biweight midcorrelation based transmission line pilot protection algorithm. IEEE Open Access J Power Energy 11:68\u201382","journal-title":"IEEE Open Access J Power Energy"},{"key":"2014_CR38","doi-asserted-by":"crossref","first-page":"10393","DOI":"10.1109\/ACCESS.2024.3352605","volume":"12","author":"S Tong","year":"2024","unstructured":"Tong S, Li J, Fu W (2024) An efficient and scalable Byzantine fault-tolerant consensus mechanism based on credit scoring and aggregated signatures. IEEE Access 12:10393\u201310410","journal-title":"IEEE Access"},{"issue":"18","key":"2014_CR39","doi-asserted-by":"crossref","first-page":"6143","DOI":"10.3390\/s24186143","volume":"24","author":"P Chinnasamy","year":"2024","unstructured":"Chinnasamy P, Babu GC, Ayyasamy RK, Amutha S, Sinha K, Balaram A (2024) Blockchain 6G-based wireless network security management with optimization using machine learning techniques. Sensors 24(18):6143","journal-title":"Sensors"},{"key":"2014_CR40","doi-asserted-by":"publisher","unstructured":"Liu A, Chen J, He K, Du R, Xu J, Wu C, Feng Y, Li T, Ma J (2024) Dynashard: secure and adaptive blockchain sharding protocol with hybrid consensus and dynamic shard management. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2024.3490036","DOI":"10.1109\/JIOT.2024.3490036"},{"key":"2014_CR41","doi-asserted-by":"publisher","unstructured":"Fieblinger R, Alam MT, Rastogi N (2024) Actionable cyber threat intelligence using knowledge graphs and large language models. In 2024 IEEE European symposium on security and privacy workshops (EuroS&PW) (pp. 100-111). IEEE, Vienna, Austria, 08-12 July 2024. https:\/\/doi.org\/10.1109\/EuroSPW61312.2024.00018","DOI":"10.1109\/EuroSPW61312.2024.00018"},{"key":"2014_CR42","doi-asserted-by":"publisher","unstructured":"Ye Z, Luo W, Zhou Q, Zhu Z, Shi Y, Jia Y (2024) Gradient inversion attacks: impact factors analyses and privacy enhancement. IEEE Trans Pattern Anal Mach Intell. https:\/\/doi.org\/10.1109\/TPAMI.2024.3430533","DOI":"10.1109\/TPAMI.2024.3430533"},{"key":"2014_CR43","doi-asserted-by":"crossref","first-page":"112899","DOI":"10.1016\/j.knosys.2024.112899","volume":"309","author":"H Huang","year":"2025","unstructured":"Huang H, Yang K, Xu H, Li Y (2025) Synthetic data for enhanced privacy: A VAE-GAN approach against membership inference attacks. Knowl-Based Syst 309:112899","journal-title":"Knowl-Based Syst"},{"key":"2014_CR44","doi-asserted-by":"publisher","unstructured":"Yang L, Zhang W, Miao Y, Liang Y, Li X, Choo KKR, Deng RH (2025) Secure and efficient cross-modal retrieval over encrypted multimodal data. IEEE Trans Comput. https:\/\/doi.org\/10.1109\/TC.2025.3525614","DOI":"10.1109\/TC.2025.3525614"},{"issue":"1","key":"2014_CR45","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00607-024-01364-0","volume":"107","author":"JM Rivas","year":"2025","unstructured":"Rivas JM, Fernandez-Basso C, Morcillo-Jimenez R, Pa\u00f1os-Basterra J, Ruiz MD, Martin-Bautista MJ (2025) Simulafed: an enhanced federated simulated environment for privacy and security in health. Computing 107(1):3","journal-title":"Computing"},{"issue":"1","key":"2014_CR46","doi-asserted-by":"crossref","first-page":"e13372","DOI":"10.1111\/exsy.13372","volume":"42","author":"X Wu","year":"2025","unstructured":"Wu X, Gao J, Bilal M, Dai F, Xu X, Qi L, Dou W (2025) Federated learning-based private medical knowledge graph for epidemic surveillance in internet of things. Expert Syst 42(1):e13372","journal-title":"Expert Syst"},{"issue":"1","key":"2014_CR47","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/sym17010061","volume":"17","author":"BUI Khan","year":"2025","unstructured":"Khan BUI, Goh KW, Khan AR, Zuhairi MF, Chaimanee M (2025) Resource management and secure data exchange for mobile sensors using Ethereum blockchain. Symmetry 17(1):61","journal-title":"Symmetry"},{"key":"2014_CR48","doi-asserted-by":"publisher","unstructured":"Usharani C, Selvapandian A (2025) FedLRes: enhancing lung cancer detection using federated learning with convolution neural network (ResNet50). Neural Comput Applic, 1-12. https:\/\/doi.org\/10.1007\/s00521-025-11006-x","DOI":"10.1007\/s00521-025-11006-x"},{"issue":"1","key":"2014_CR49","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1038\/s44172-025-00341-5","volume":"4","author":"S Gholami","year":"2025","unstructured":"Gholami S, Jannat FE, Thompson AC, Ong SSY, Lim JI, Leng T, Alam MN (2025) Distributed training of foundation models for ophthalmic diagnosis. Commun Eng 4(1):6","journal-title":"Commun Eng"},{"key":"2014_CR50","doi-asserted-by":"crossref","unstructured":"Kaiser J, Mueller T, Kaissis G (2025) Differential privacy in medical imaging applications. In trustworthy AI in medical imaging (pp. 411-424). Academic Press.","DOI":"10.1016\/B978-0-44-323761-4.00032-8"},{"issue":"2","key":"2014_CR51","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/s00778-024-00895-4","volume":"34","author":"Y Tao","year":"2025","unstructured":"Tao Y, Gilad A, Machanavajjhala A, Roy S (2025) Differentially private explanations for aggregate query answers. VLDB J 34(2):20","journal-title":"VLDB J"},{"key":"2014_CR52","doi-asserted-by":"crossref","first-page":"e2472","DOI":"10.7717\/peerj-cs.2472","volume":"10","author":"A Ahmed","year":"2024","unstructured":"Ahmed A, Asim M, Ullah I, Ateya AA (2024) An optimized ensemble model with advanced feature selection for network intrusion detection. PeerJ Comp Sci 10:e2472","journal-title":"PeerJ Comp Sci"},{"key":"2014_CR53","doi-asserted-by":"publisher","unstructured":"Agarwal S, Kamath G, Majid M, Mouzakis A, Silver R, Ullman J (2025) Private mean estimation with person-level differential privacy. In: Proceedings of the 2025 Annual ACM-SIAM symposium on discrete algorithms (SODA). Society for Industrial and Applied Mathematics,\u00a0pp 2819\u20132880.\u00a0https:\/\/doi.org\/10.1137\/1.9781611978322.92","DOI":"10.1137\/1.9781611978322.92"},{"key":"2014_CR54","doi-asserted-by":"publisher","unstructured":"Zheng Z, Li Z, Long S, Guo S, Chen C, Xu K (2025) Pricing Utility vs. location privacy: a differentially private data sharing framework for ride-on-demand services. IEEE Trans Dependable and Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2025.3532599","DOI":"10.1109\/TDSC.2025.3532599"},{"key":"2014_CR55","doi-asserted-by":"crossref","first-page":"109949","DOI":"10.1016\/j.compeleceng.2024.109949","volume":"122","author":"AK Silivery","year":"2025","unstructured":"Silivery AK, Rao KRM, Solleti R (2025) Dual-path feature extraction-based hybrid intrusion detection in IoT networks. Comput Electr Eng 122:109949","journal-title":"Comput Electr Eng"},{"issue":"5","key":"2014_CR56","doi-asserted-by":"crossref","first-page":"5953","DOI":"10.1007\/s10586-024-04288-8","volume":"27","author":"S Ahmad","year":"2024","unstructured":"Ahmad S, Mehfuz S, Urooj S, Alsubaie N (2024) Machine learning-based intelligent security framework for secure cloud key management. Cluster Comput 27(5):5953\u20135979","journal-title":"Cluster Comput"},{"issue":"1","key":"2014_CR57","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1504\/IJSNET.2025.143909","volume":"47","author":"AES Leni","year":"2025","unstructured":"Leni AES, Anand R, Mythili N, Pugalenthi R (2025) An improved cyber-attack detection and classification model for the internet of things systems using fine-tuned deep learning model. Int J Sensor Netw 47(1):11\u201325","journal-title":"Int J Sensor Netw"},{"issue":"2","key":"2014_CR58","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/TII.2021.3126728","volume":"19","author":"P Ruzafa-Alc\u00e1zar","year":"2023","unstructured":"Ruzafa-Alc\u00e1zar P, Fern\u00e1ndez-Saura P, M\u00e1rmol-Campos E, Gonz\u00e1lez-Vidal A, Hern\u00e1ndez-Ramos JL, Bernal-Bernabe J, Skarmeta AF (2023) Intrusion detection based on privacy-preserving federated learning for the industrial IoT. IEEE Trans Industr Inf 19(2):1145\u20131154","journal-title":"IEEE Trans Industr Inf"},{"key":"2014_CR59","doi-asserted-by":"crossref","first-page":"112317","DOI":"10.1016\/j.jss.2024.112317","volume":"222","author":"N Neto","year":"2025","unstructured":"Neto N, Martins R, Veiga L (2025) Atlas, a modular and efficient open-source BFT framework. J Syst Softw 222:112317","journal-title":"J Syst Softw"},{"key":"2014_CR60","doi-asserted-by":"crossref","unstructured":"T. J. Shen, \"Estimating Shannon\u2019s entropy with incomplete species inventories,\" Japanese Journal of Statistics and Data Science, pp. 1\u201327, 2025.","DOI":"10.1007\/s42081-025-00291-4"},{"issue":"1","key":"2014_CR61","doi-asserted-by":"crossref","first-page":"107440","DOI":"10.1016\/j.jfranklin.2024.107440","volume":"362","author":"M Luqman","year":"2025","unstructured":"Luqman M, Zeeshan M, Riaz Q, Hussain M, Tahir H, Mazhar N, Khan MS (2025) Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets. J Franklin Inst 362(1):107440","journal-title":"J Franklin Inst"},{"key":"2014_CR62","doi-asserted-by":"publisher","unstructured":"Chang J, Shi L, Li Z, Zuo X, Hou B (2025) Security detection algorithm using CNN: Anomaly detection for API call sequence. J Comput Methods Sci Eng 14727978251318812. https:\/\/doi.org\/10.1177\/14727978251318813","DOI":"10.1177\/14727978251318813"},{"issue":"3","key":"2014_CR63","doi-asserted-by":"crossref","first-page":"235","DOI":"10.60087\/jklst.vol3.n3.p.235-260","volume":"3","author":"H Li","year":"2024","unstructured":"Li H, Zhou S, Yuan B, Zhang M (2024) Optimizing intelligent edge computing resource scheduling based on federated learning. J Knowl Learn Sci Technol 3(3):235\u2013260","journal-title":"J Knowl Learn Sci Technol"},{"issue":"5","key":"2014_CR64","doi-asserted-by":"crossref","first-page":"712","DOI":"10.3390\/math13050712","volume":"13","author":"F Makhmudov","year":"2025","unstructured":"Makhmudov F, Kilichev D, Giyosov U, Akhmedov F (2025) Online machine learning for intrusion detection in electric vehicle charging systems. Mathematics 13(5):712","journal-title":"Mathematics"},{"issue":"1","key":"2014_CR65","doi-asserted-by":"crossref","first-page":"9831","DOI":"10.1038\/s41598-025-94624-8","volume":"15","author":"AS Ahanger","year":"2025","unstructured":"Ahanger AS, Khan SM, Masoodi F, Salau AO (2025) Advanced intrusion detection in internet of things using graph attention networks. Sci Rep 15(1):9831","journal-title":"Sci Rep"},{"key":"2014_CR66","doi-asserted-by":"publisher","unstructured":"Xu G, Zhou Z, Song X, Huang Y (2025) Research on transaction allocation strategy in blockchain state sharding. Future Gener Comput Syst 107756. https:\/\/doi.org\/10.1016\/j.future.2025.107756","DOI":"10.1016\/j.future.2025.107756"},{"issue":"1","key":"2014_CR67","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s11235-024-01240-4","volume":"88","author":"P Han-huai","year":"2025","unstructured":"Han-huai P, Lin-wei W, Hao L, Abdollahi M (2025) Identifying influential nodes in complex networks: a semi-local centrality measure based on augmented graph and average shortest path theory. Telecommun Syst 88(1):25","journal-title":"Telecommun Syst"},{"issue":"6","key":"2014_CR68","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.3390\/electronics14061177","volume":"14","author":"R Zhang","year":"2025","unstructured":"Zhang R, Li Y, Fang L (2025) PBTMS: A blockchain-based privacy-preserving system for reliable and efficient e-commerce. Electronics 14(6):1177","journal-title":"Electronics"},{"key":"2014_CR69","doi-asserted-by":"publisher","unstructured":"Bai J, Cao L, Li J, Wan J, Du X (2025) FedWDP: a Wasserstein-distance-based federated learning for privacy and heterogeneous data in IoT. Internet Things 101532. https:\/\/doi.org\/10.1016\/j.iot.2025.101532","DOI":"10.1016\/j.iot.2025.101532"},{"key":"2014_CR70","doi-asserted-by":"crossref","first-page":"103108","DOI":"10.1016\/j.sysarc.2024.103108","volume":"150","author":"S Jiang","year":"2024","unstructured":"Jiang S, Wang X, Que Y, Lin H (2024) Fed-MPS: federated learning with local differential privacy using model parameter selection for resource-constrained CPS. J Syst Archit 150:103108","journal-title":"J Syst Archit"},{"issue":"2","key":"2014_CR71","doi-asserted-by":"crossref","first-page":"182307","DOI":"10.1007\/s11704-023-2283-x","volume":"18","author":"S Lu","year":"2024","unstructured":"Lu S, Li R, Liu W (2024) FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack. Front Comp Sci 18(2):182307","journal-title":"Front Comp Sci"},{"issue":"1","key":"2014_CR72","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/JSYST.2023.3347435","volume":"18","author":"M Ye","year":"2024","unstructured":"Ye M, Zhang Q, Xue X, Wang Y, Jiang Q, Qiu H (2024) A novel self-supervised learning-based anomalous node detection method based on an autoencoder for wireless sensor networks. IEEE Syst J 18(1):256\u2013267. https:\/\/doi.org\/10.1109\/JSYST.2023.3347435","journal-title":"IEEE Syst J"},{"issue":"1","key":"2014_CR73","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/s11227-024-06471-5","volume":"81","author":"L Lin","year":"2025","unstructured":"Lin L, Zhong Q, Qiu J, Liang Z (2025) E-GRACL: an IoT intrusion detection system based on graph neural networks. J Supercomput 81(1):42","journal-title":"J Supercomput"},{"key":"2014_CR74","doi-asserted-by":"crossref","first-page":"104174","DOI":"10.1016\/j.cose.2024.104174","volume":"148","author":"X Jiang","year":"2025","unstructured":"Jiang X, Xu L, Yu L, Fang X (2025) MFT: a novel memory flow transformer efficient intrusion detection method. Comput Secur 148:104174","journal-title":"Comput Secur"},{"issue":"2","key":"2014_CR75","doi-asserted-by":"crossref","first-page":"73","DOI":"10.31987\/ijict.7.2.290","volume":"7","author":"DS Ghazi","year":"2024","unstructured":"Ghazi DS, Hamid HS, Zaiter MJ, Behadili ASG (2024) Snort versus suricata in intrusion detection. Iraqi J ICT 7(2):73\u201388","journal-title":"Iraqi J ICT"},{"key":"2014_CR76","doi-asserted-by":"crossref","first-page":"125447","DOI":"10.1016\/j.eswa.2024.125447","volume":"260","author":"Y Deng","year":"2025","unstructured":"Deng Y, Zhou W, Haq AU, Ahmad S, Tabassum A (2025) Differentially private recommender framework with dual semi-autoencoder. Expert Syst Appl 260:125447","journal-title":"Expert Syst Appl"},{"key":"2014_CR77","doi-asserted-by":"publisher","unstructured":"Yu B, Zhao J, Zhang K, Gong J, Qian H (2025) Lightweight and dynamic privacy-preserving federated learning via functional encryption. IEEE Trans Inform Forensic Secur. https:\/\/doi.org\/10.1109\/TIFS.2025.3540312","DOI":"10.1109\/TIFS.2025.3540312"},{"issue":"1","key":"2014_CR78","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1108\/IJPCC-05-2022-0184","volume":"21","author":"RN Bhimanpallewar","year":"2025","unstructured":"Bhimanpallewar RN, Khan SI, Raj KB, Gulati K, Bhasin N, Raj R (2025) Federated learning on web browsing data with statistical and machine learning techniques. Int J Pervasive Comput Commun 21(1):144\u2013156","journal-title":"Int J Pervasive Comput Commun"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02014-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02014-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02014-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:46Z","timestamp":1758986506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02014-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,5]]},"references-count":78,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2014"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02014-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,5]]},"assertion":[{"value":"26 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"199"}}