{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:57:19Z","timestamp":1775084239488,"version":"3.50.1"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s13042-024-02269-2","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T01:05:01Z","timestamp":1719882301000},"page":"5635-5665","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things"],"prefix":"10.1007","volume":"15","author":[{"given":"Chongzhou","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Sarbajit","family":"Manna","sequence":"additional","affiliation":[]},{"given":"Mohammad Zubair","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Abdulfattah","family":"Noorwali","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Das","sequence":"additional","affiliation":[]},{"given":"Koyel","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,1]]},"reference":[{"key":"2269_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal S, Sarkar S, Aouedi O et al (2021) Federated learning for intrusion detection system. Concepts, challenges and future directions. arXiv","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"2269_CR2","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.3390\/app10061909","volume":"10","author":"S Aldhaheri","year":"2020","unstructured":"Aldhaheri S, Alghazzawi D, Cheng L et al (2020) DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Appl Sci 10:1909","journal-title":"Appl Sci"},{"key":"2269_CR3","doi-asserted-by":"crossref","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi O, Moustafa N, Turnbull B et al (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8:9463\u20139472","journal-title":"IEEE Internet Things J"},{"key":"2269_CR4","doi-asserted-by":"crossref","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","volume":"8","author":"A Alwarafy","year":"2020","unstructured":"Alwarafy A, Al-Thelaya KA, Abdallah M et al (2020) A survey on security and privacy issues in edge computingassisted internet of things. IEEE Internet Things J 8:4004\u20134022","journal-title":"IEEE Internet Things J"},{"key":"2269_CR5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.21608\/bfemu.2021.206401","volume":"46","author":"M Amer","year":"2021","unstructured":"Amer M, Hay G, Baset EH, Abd El Azim Mohamed M (2021) Development machine learning techniques to enhance cyber security algorithms (Dept E). Mansoura Eng J 46:36\u201346","journal-title":"Mansoura Eng J"},{"key":"2269_CR6","unstructured":"Antonakakis M, April T, Bailey M et al (2017) Understanding the Mirai Botnet. In: Proceedings of the 26th USENIX security symposium (USENIX Security 17), pp 16\u201318"},{"key":"2269_CR7","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/JSAC.2020.3020655","volume":"39","author":"GS Aujla","year":"2020","unstructured":"Aujla GS, Jindal A (2020) A decoupled blockchain approach for edge-envisioned IoT-based healthcare monitoring. IEEE J Select Areas Commun 39:491\u2013499","journal-title":"IEEE J Select Areas Commun"},{"key":"2269_CR8","unstructured":"Bagdasaryan E, Veit A, Hua Y et al (2020) How to backdoor federated learning. In: Proceedings of the international conference on artificial intelligence and statistics, online pp 26\u201328"},{"key":"2269_CR9","doi-asserted-by":"crossref","first-page":"8671","DOI":"10.1007\/s00521-021-06851-5","volume":"2022","author":"HM Balaha","year":"2022","unstructured":"Balaha HM, Saif M, Tamer A et al (2022) Hybrid deep learning and genetic algorithms approach (HMB-DLGAHA) for the early ultrasound diagnoses of breast cancer. Neural Comput Appl 2022:8671\u20138695","journal-title":"Neural Comput Appl"},{"issue":"1","key":"2269_CR10","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1186\/s12960-019-0440-y","volume":"17","author":"R Cai","year":"2019","unstructured":"Cai R, Tang J, Deng C et al (2019) Violence against health care workers in China, 2013\u20132016: evidence from the national judgment documents. Hum Resour Health 17(1):103\u2013103","journal-title":"Hum Resour Health"},{"key":"2269_CR11","doi-asserted-by":"crossref","unstructured":"Cassales GW, Senger H, Faria ERD et al (2019) An intrusion detection system architecture for IoT networks. In: Proceedings of the 2019 IEEE symposium on computers and communications (ISCC)","DOI":"10.1109\/ISCC47284.2019.8969609"},{"key":"2269_CR12","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni N, Mosbah M, Zemmari A et al (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21:2671\u20132701","journal-title":"IEEE Commun Surv Tutor"},{"key":"2269_CR13","doi-asserted-by":"crossref","first-page":"217463","DOI":"10.1109\/ACCESS.2020.3041793","volume":"8","author":"Z Chen","year":"2020","unstructured":"Chen Z, Lv N, Liu P et al (2020) Intrusion detection for wireless edge networks based on federated learning. IEEE Access 8:217463\u2013217472","journal-title":"IEEE Access"},{"key":"2269_CR14","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12287","author":"C Dhasaratha","year":"2024","unstructured":"Dhasaratha C (2024) Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Trans Intell Technol. https:\/\/doi.org\/10.1049\/cit2.12287","journal-title":"CAAI Trans Intell Technol"},{"key":"2269_CR15","doi-asserted-by":"crossref","unstructured":"Dias LP, Cerqueira JD, Assis KD et al (2017) Using artificial neural network in intrusion detection systems to computer networks. In: Proceedings of the 9th computer science and electronic engineering (CEEC), pp 27\u201329","DOI":"10.1109\/CEEC.2017.8101615"},{"issue":"16","key":"2269_CR16","doi-asserted-by":"crossref","first-page":"12505","DOI":"10.1109\/JIOT.2020.3019398","volume":"8","author":"Y Ding","year":"2021","unstructured":"Ding Y, Zhang W, Zhou X et al (2021) FraudTrip: taxi fraudulent trip detection from corresponding trajectories. IEEE Internet Things J 8(16):12505\u201312517","journal-title":"IEEE Internet Things J"},{"key":"2269_CR17","first-page":"451","volume":"9339","author":"M Dolecki","year":"2015","unstructured":"Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. Comput Inf Syst Ind Manag 9339:451\u2013460","journal-title":"Comput Inf Syst Ind Manag"},{"issue":"11","key":"2269_CR18","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999\u20135004. https:\/\/doi.org\/10.1109\/TNNLS.2019.2955165","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2269_CR19","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1109\/TNSM.2020.2971776","volume":"17","author":"R Doriguzzi-Corin","year":"2020","unstructured":"Doriguzzi-Corin R, Millar S, Scott-Hayward S et al (2020) LUCID: a practical, lightweight deep learning solution for DDoS attack detection. IEEE Trans Netw Serv Manag 17:876\u2013889","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2269_CR20","doi-asserted-by":"crossref","first-page":"123448","DOI":"10.1109\/ACCESS.2021.3109081","volume":"9","author":"A Fatani","year":"2021","unstructured":"Fatani A, Elaziz MA, Dahou A et al (2021) IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access 9:123448\u2013123464","journal-title":"IEEE Access"},{"key":"2269_CR21","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1109\/TEM.2019.2922936","volume":"67","author":"MA Ferrag","year":"2019","unstructured":"Ferrag MA, Maglaras L (2019) DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans Eng Manag 67:1285\u20131297","journal-title":"IEEE Trans Eng Manag"},{"key":"2269_CR22","first-page":"102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Moschoyiannis S et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419\u2013102419","journal-title":"J Inf Secur Appl"},{"issue":"12","key":"2269_CR23","doi-asserted-by":"crossref","first-page":"14800","DOI":"10.1109\/TITS.2023.3297996","volume":"24","author":"Y Fu","year":"2023","unstructured":"Fu Y, Li C, Yu FR et al (2023) An incentive mechanism of incorporating supervision game for federated learning in autonomous driving. IEEE Trans Intell Transp Syst 24(12):14800\u201314812","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2269_CR24","volume":"125","author":"T Hai","year":"2023","unstructured":"Hai T, Sarkar A, Karmakar R et al (2023) Neural session key exchange in the industrial internet of things using hyperchaotic-guided vector-valued artificial neural synchronization. Eng Appl Artif Intell 125:106683","journal-title":"Eng Appl Artif Intell"},{"key":"2269_CR25","doi-asserted-by":"crossref","first-page":"107561","DOI":"10.1016\/j.engappai.2023.107561","volume":"128","author":"T Hai","year":"2024","unstructured":"Hai T, Sarkar A, Aksoy M et al (2024) Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the industrial internet of things. Eng Appl Artif Intell 128:107561\u2013107561","journal-title":"Eng Appl Artif Intell"},{"key":"2269_CR26","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.future.2024.05.006","volume":"159","author":"J Hao","year":"2024","unstructured":"Hao J, Chen P, Chen J et al (2024) Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture. Future Gener Comput Syst 159:77\u201390","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"2269_CR27","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1186\/s13677-024-00677-x","volume":"13","author":"H He","year":"2024","unstructured":"He H, Li X, Chen P et al (2024) Efficiently localizing system anomalies for cloud infrastructures: a novel dynamic graph transformer based parallel framework. J Cloud Comput 13(1):115\u2013115","journal-title":"J Cloud Comput"},{"key":"2269_CR28","doi-asserted-by":"crossref","first-page":"1216894","DOI":"10.3389\/fonc.2023.1216894","volume":"13","author":"R Huang","year":"2023","unstructured":"Huang R, Li Y, Wu H et al (2023) 68Ga-PSMA-11 PET\/CT versus 68Ga-PSMA-11 PET\/MRI for the detection of biochemically recurrent prostate cancer: a systematic review and meta-analysis. Front Oncol 13:1216894\u20131216894","journal-title":"Front Oncol"},{"key":"2269_CR29","doi-asserted-by":"crossref","first-page":"29696","DOI":"10.1109\/ACCESS.2021.3058528","volume":"9","author":"TT Huong","year":"2021","unstructured":"Huong TT, Bac TP, Long DM et al (2021) Lockedge: low-complexity cyberattack detection in IoT edge computing. IEEE Access 9:29696\u201329710","journal-title":"IEEE Access"},{"key":"2269_CR30","doi-asserted-by":"crossref","first-page":"3025","DOI":"10.3390\/s21093025","volume":"21","author":"F Hussain","year":"2021","unstructured":"Hussain F, Abbas SG, Shah GA et al (2021) A framework for malicious traffic detection in IoT healthcare environment. Sensors 21:3025","journal-title":"Sensors"},{"key":"2269_CR31","doi-asserted-by":"crossref","first-page":"2195","DOI":"10.3390\/s20082195","volume":"20","author":"F Jamil","year":"2020","unstructured":"Jamil F, Ahmad S, Iqbal N et al (2020) Towards a remote monitoring of patient vital signs based on IoT-based blockchain integrity management platforms in smart hospitals. Sensors 20:2195","journal-title":"Sensors"},{"key":"2269_CR32","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6680782","author":"S Jeong","year":"2021","unstructured":"Jeong S, Park C, Hong D et al (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2021\/6680782","journal-title":"Secur Commun Netw"},{"issue":"5","key":"2269_CR33","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.1109\/TNET.2021.3084251","volume":"29","author":"H Jiang","year":"2021","unstructured":"Jiang H, Wang M, Zhao P et al (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE\/ACM Trans Netw 29(5):2228\u20132241","journal-title":"IEEE\/ACM Trans Netw"},{"key":"2269_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","volume":"14","author":"P Kairouz","year":"2021","unstructured":"Kairouz P, Mcmahan HB, Avent B et al (2021) Advances and open problems in federated learning. Found Trends Mach Learn 14:1\u2013210","journal-title":"Found Trends Mach Learn"},{"key":"2269_CR35","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.chaos.2018.12.021","volume":"119","author":"B Karakaya","year":"2019","unstructured":"Karakaya B, G\u00fclten A, Frasca M (2019) A true random bit generator based on a memristive chaotic circuit: analysis, design and FPGA implementation. Chaos Solitons Fract 119:143\u2013149","journal-title":"Chaos Solitons Fract"},{"key":"2269_CR36","volume":"123","author":"AMZ Khan","year":"2023","unstructured":"Khan AMZ, Sarkar A (2023) Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in industrial internet of things. Eng Appl Artif Intell 123:106357","journal-title":"Eng Appl Artif Intell"},{"key":"2269_CR37","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis N, Moustafa N, Sitnikova E et al (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: BoT-IoT dataset. Future Gener Comput Syst 100:779\u2013796","journal-title":"Future Gener Comput Syst"},{"key":"2269_CR38","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.future.2020.03.042","volume":"110","author":"N Koroniotis","year":"2020","unstructured":"Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gener Comput Syst 110:91\u2013106","journal-title":"Future Gener Comput Syst"},{"key":"2269_CR39","unstructured":"Koroniotis N, Moustafa N, Sitnikova E et al (2021) https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset"},{"key":"2269_CR40","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4112","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Gupta GP et al (2021) A distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.4112","journal-title":"Trans Emerg Telecommun Technol"},{"key":"2269_CR41","doi-asserted-by":"crossref","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","volume":"8","author":"S Latif","year":"2020","unstructured":"Latif S, Zou Z, Idrees Z et al (2020) A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8:89337\u201389350","journal-title":"IEEE Access"},{"key":"2269_CR42","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129512000783","author":"A Lesne","year":"2014","unstructured":"Lesne A (2014) Shannon entropy: a rigorous notion at the crossroads between probability, information theory, dynamical systems and statistical physics. Math Struct Comput Sci. https:\/\/doi.org\/10.1017\/S0960129512000783","journal-title":"Math Struct Comput Sci"},{"key":"2269_CR43","first-page":"2058497","volume":"2022","author":"H Li","year":"2022","unstructured":"Li H, Yang X, Wang H et al (2022) A controllable secure blockchain-based electronic healthcare records sharing scheme. J Healthc Eng 2022:2058497","journal-title":"J Healthc Eng"},{"issue":"1","key":"2269_CR44","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1057\/s41599-023-01719-6","volume":"10","author":"J Li","year":"2023","unstructured":"Li J, Huang C, Yang Y et al (2023) How nursing students\u2019 risk perception affected their professional commitment during the COVID-19 pandemic: the mediating effects of negative emotions and moderating effects of psychological capital. Humanit Soc Sci Commun 10(1):195\u2013195","journal-title":"Humanit Soc Sci Commun"},{"key":"2269_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3339674","author":"M Li","year":"2023","unstructured":"Li M, Cui H, Liu C et al (2023) A four-dimensional space-based data multi-embedding mechanism for network services. IEEE Trans Netw Serv Manag. https:\/\/doi.org\/10.1109\/TNSM.2023.3339674","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2269_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3336330","author":"Q Li","year":"2024","unstructured":"Li Q, You T, Chen J et al (2024) LI-EMRSQL: linking information enhanced Text2SQL parsing on complex electronic medical records. IEEE Trans Reliab. https:\/\/doi.org\/10.1109\/TR.2023.3336330","journal-title":"IEEE Trans Reliab"},{"issue":"8","key":"2269_CR47","doi-asserted-by":"crossref","first-page":"2624","DOI":"10.1109\/TMC.2020.2984364","volume":"20","author":"T Li","year":"2021","unstructured":"Li T, Braud T, Li Y et al (2021) Lifecycle-aware online video caching. IEEE Trans Mob Comput 20(8):2624\u20132636","journal-title":"IEEE Trans Mob Comput"},{"issue":"23","key":"2269_CR48","doi-asserted-by":"crossref","first-page":"16723","DOI":"10.1109\/JIOT.2021.3073864","volume":"8","author":"T Li","year":"2021","unstructured":"Li T, Zhang M, Li Y et al (2021) The impact of covid-19 on smartphone usage. IEEE Internet Things J 8(23):16723\u201316733","journal-title":"IEEE Internet Things J"},{"key":"2269_CR49","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3375369","author":"W Li","year":"2024","unstructured":"Li W, Susilo W, Xia C et al (2024) Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage. IEEE Trans Depend Secur Comput. https:\/\/doi.org\/10.1109\/TDSC.2024.3375369","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"2269_CR50","doi-asserted-by":"crossref","first-page":"2031","DOI":"10.1109\/COMST.2020.2986024","volume":"22","author":"WY Lim","year":"2020","unstructured":"Lim WY, Luong NC, Hoang DT et al (2020) Federated learning in mobile edge networks: a comprehensive survey. IEEE Commun Surv Tutor 22:2031\u20132063","journal-title":"IEEE Commun Surv Tutor"},{"key":"2269_CR51","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MCE.2018.2851723","volume":"7","author":"F Lin","year":"2018","unstructured":"Lin F, Zhou Y, An X et al (2018) Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of Internet of Things devices. IEEE Consum Electron Mag 7:45\u201350","journal-title":"IEEE Consum Electron Mag"},{"issue":"8","key":"2269_CR52","doi-asserted-by":"crossref","first-page":"2358","DOI":"10.1109\/TNNLS.2018.2884620","volume":"30","author":"P Liu","year":"2019","unstructured":"Liu P, Zeng Z, Wang J (2019) Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans Neural Netw Learn Syst 30(8):2358\u20132368","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"8","key":"2269_CR53","doi-asserted-by":"crossref","first-page":"5628","DOI":"10.1109\/TII.2022.3144016","volume":"18","author":"X Liu","year":"2022","unstructured":"Liu X, Zhao J, Li J et al (2022) Federated neural architecture search for medical data security. IEEE Trans Ind Inform 18(8):5628\u20135636","journal-title":"IEEE Trans Ind Inform"},{"issue":"5","key":"2269_CR54","doi-asserted-by":"crossref","first-page":"8973","DOI":"10.1109\/JIOT.2023.3321673","volume":"11","author":"T Lyu","year":"2024","unstructured":"Lyu T, Xu H, Zhang L et al (2024) Source selection and resource allocation in wireless-powered relay networks: an adaptive dynamic programming-based approach. IEEE Internet Things J 11(5):8973\u20138988","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2269_CR55","first-page":"426","volume":"58","author":"J Ma","year":"2022","unstructured":"Ma J, Hu J (2022) Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 58(3):426\u2013439","journal-title":"Kybernetika"},{"key":"2269_CR56","unstructured":"Mcmahan HB, Moore E, Ramage D et al (2016) Federated learning of deep networks using model averaging. arXiv 2016, pp 5629\u20135629. arXiv:1602.05629"},{"key":"2269_CR57","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/978-981-15-2774-6_6","volume-title":"Advances in intelligent computing and communication","author":"S Mohapatra","year":"2020","unstructured":"Mohapatra S, Parija S (2020) Brief understanding of IoT health care service model over remotely cloud connected environment. Advances in intelligent computing and communication. Springer, Singapore, pp 46\u201351"},{"key":"2269_CR58","first-page":"2020","volume":"160","author":"A Moustafa","year":"2020","unstructured":"Moustafa A (2020) Internet of medical things (IoMT) security: a survey on threats, security mechanisms, and challenges. J Netw Comput Appl 160:2020\u20132020","journal-title":"J Netw Comput Appl"},{"key":"2269_CR59","doi-asserted-by":"crossref","unstructured":"Nguyen TD, Rieger P, Miettinen M et al (2020) Poisoning attacks on federated learning-based IoT intrusion detection system. In: Proceedings of the workshop on decentralized IoT systems and security (DISS), 2020, pp 23\u201326","DOI":"10.14722\/diss.2020.23003"},{"key":"2269_CR60","unstructured":"Pokhrel S, Abbas R, BA (2021) IoT Security: botnet detection in iot using machine learning. arXiv 2021. arXiv:2104.02231"},{"issue":"12","key":"2269_CR61","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.3390\/app8122663","volume":"8","author":"D Preuveneers","year":"2018","unstructured":"Preuveneers D, Rimmer V, Tsingenopoulos I, Ilie-Zudor E (2018) Chained anomaly detection models for federated learning: an intrusion detection case study. Appl Sci 8(12):2663","journal-title":"Appl Sci"},{"key":"2269_CR62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1200\/CCI.20.00060","volume":"5","author":"S Rajendran","year":"2021","unstructured":"Rajendran S, Obeid JS, Binol H et al (2021) Cloud-based federated learning implementation across medical centers. JCO Clin Cancer Inform 5:1\u201311","journal-title":"JCO Clin Cancer Inform"},{"key":"2269_CR63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41746-020-00323-1","volume":"3","author":"N Rieke","year":"2020","unstructured":"Rieke N, Hancox J, Li W et al (2020) The future of digital health with federated learning. NPJ Digit Med 3:1\u20137","journal-title":"NPJ Digit Med"},{"key":"2269_CR64","doi-asserted-by":"crossref","unstructured":"Rohokale VM, Prasad NR, Prasad R (2011) A cooperative internet of things (IoT) for rural healthcare monitoring and control. In: Proceedings of the 2nd international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (wireless VITAE)","DOI":"10.1109\/WIRELESSVITAE.2011.5940920"},{"key":"2269_CR65","doi-asserted-by":"crossref","unstructured":"Sahoo M, Singhar SS, Nayak B et al (2019) A blockchain based framework secured by ECDSA to curb drug counterfeiting. In: Proceedings of the 10th International Conference on computing, communication and networking technologies (ICCCNT), pp 6\u20138","DOI":"10.1109\/ICCCNT45670.2019.8944772"},{"key":"2269_CR66","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11063-021-10443-8","volume":"53","author":"A Sarkar","year":"2021","unstructured":"Sarkar A (2021) Deep learning guided double hidden layer neural synchronization through mutual. Learning 53:1355\u20131384. https:\/\/doi.org\/10.1007\/s11063-021-10443-8","journal-title":"Learning"},{"key":"2269_CR67","doi-asserted-by":"publisher","first-page":"100533","DOI":"10.1016\/j.vehcom.2022.100533","volume":"38","author":"A Sarkar","year":"2022","unstructured":"Sarkar A, Daripa K, Khan MZ et al (2022) Cloud enabled blockchain-based secured communication in mutual intelligent transportation using neural synchronization. Veh Commun 38:100533\u2013100533. https:\/\/doi.org\/10.1016\/j.vehcom.2022.100533","journal-title":"Veh Commun"},{"key":"2269_CR68","doi-asserted-by":"crossref","first-page":"4413","DOI":"10.1007\/s00500-023-08808-3","volume":"28","author":"A Sarkar","year":"2024","unstructured":"Sarkar A, Daripa K, Khan MZ (2024) An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key. Soft Comput 28:4413\u20134433","journal-title":"Soft Comput"},{"key":"2269_CR69","doi-asserted-by":"crossref","first-page":"3242","DOI":"10.1109\/JIOT.2020.3002255","volume":"8","author":"M Shafiq","year":"2020","unstructured":"Shafiq M, Tian Z, Bashir AK et al (2020) A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J 8:3242\u20133254","journal-title":"IEEE Internet Things J"},{"key":"2269_CR70","doi-asserted-by":"crossref","unstructured":"Shaikh S, Chitre V (2017) Healthcare monitoring system using IoT. In: Proceedings of the 2017 international conference on trends in electronics and informatics (ICEI), pp 11\u201312","DOI":"10.1109\/ICOEI.2017.8300952"},{"key":"2269_CR71","volume":"96","author":"P Sharma","year":"2021","unstructured":"Sharma P, Borah MD, Namasudra S (2021) Improving security of medical big data by using Blockchain technology. Comput Electr Eng 96:107529","journal-title":"Comput Electr Eng"},{"key":"2269_CR72","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.3390\/app9061207","volume":"9","author":"B Shen","year":"2019","unstructured":"Shen B, Guo J, Yang Y (2019) MedChain: efficient healthcare data sharing via blockchain. Appl Sci 9:1207\u20131207","journal-title":"Appl Sci"},{"key":"2269_CR73","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.icte.2018.04.003","volume":"4","author":"A Shenfield","year":"2018","unstructured":"Shenfield A, Day D, Ayesh A (2018) Intelligent intrusion detection systems using artificial neural networks. ICT Express 4:95\u201399","journal-title":"ICT Express"},{"issue":"3","key":"2269_CR74","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1109\/TNSM.2018.2861717","volume":"15","author":"G Sun","year":"2018","unstructured":"Sun G, Li Y, Liao D et al (2018) Service function chain orchestration across multiple domains: a full mesh aggregation approach. IEEE Trans Netw Serv Manag 15(3):1175\u20131191","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"2","key":"2269_CR75","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSC.2015.2477825","volume":"11","author":"G Sun","year":"2018","unstructured":"Sun G, Liao D, Zhao D et al (2018) Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Trans Serv Comput 11(2):279\u2013291","journal-title":"IEEE Trans Serv Comput"},{"key":"2269_CR76","doi-asserted-by":"crossref","DOI":"10.5772\/644","volume-title":"Artificial neural networks: methodological advances and biomedical applications","author":"K Suzuki","year":"2011","unstructured":"Suzuki K (2011) Artificial neural networks: methodological advances and biomedical applications. BoD-Books on Demand, Norderstedt"},{"key":"2269_CR77","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08566-1","author":"A Teodoro","year":"2021","unstructured":"Teodoro A, Gomes O, Saadi M (2021) An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08566-1","journal-title":"Wirel Pers Commun"},{"key":"2269_CR78","unstructured":"UCI (1999) Kdd Cup 1999. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"2269_CR79","unstructured":"UNB (2021) Botnet dataset. https:\/\/www.unb.ca\/cic\/datasets\/botnet.html"},{"key":"2269_CR80","unstructured":"UNB (2021) CSE-CIC-IDS2018 dataset. https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html"},{"key":"2269_CR81","doi-asserted-by":"crossref","first-page":"2643","DOI":"10.1007\/s11227-019-03028-9","volume":"76","author":"S Walker-Roberts","year":"2020","unstructured":"Walker-Roberts S, Hammoudeh M, Aldabbas O et al (2020) Threats on the horizon: understanding security threats in the era of cyber-physical systems. J Supercomput 76:2643\u20132664","journal-title":"J Supercomput"},{"issue":"1","key":"2269_CR82","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/JIOT.2019.2943151","volume":"7","author":"Wang","year":"2020","unstructured":"Wang (2020) Blockchain-based secure key management for the internet of things. IEEE Internet Things J 7(1):37\u201346","journal-title":"IEEE Internet Things J"},{"key":"2269_CR83","doi-asserted-by":"crossref","first-page":"98596","DOI":"10.1109\/ACCESS.2023.3313602","volume":"11","author":"D Wang","year":"2023","unstructured":"Wang D, Zhang W, Wu W et al (2023) Soft-label for multi-domain fake news detection. IEEE Access 11:98596\u201398606","journal-title":"IEEE Access"},{"issue":"1","key":"2269_CR84","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1186\/s12913-022-08610-1","volume":"22","author":"N Wang","year":"2022","unstructured":"Wang N, Chen J, Chen W et al (2022) The effectiveness of case management for cancer patients: an umbrella review. BMC Health Serv Res 22(1):1247\u20131247","journal-title":"BMC Health Serv Res"},{"key":"2269_CR85","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2022.11.035","volume":"619","author":"Q Wang","year":"2023","unstructured":"Wang Q, Hu J, Wu Y et al (2023) Output synchronization of wide-area heterogeneous multi-agent systems over intermittent clustered networks. Inf Sci 619:263\u2013275","journal-title":"Inf Sci"},{"key":"2269_CR86","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/JSAC.2019.2904348","volume":"37","author":"S Wang","year":"2019","unstructured":"Wang S, Tuor T, Salonidis T et al (2019) Adaptive federated learning in resource constrained edge computing systems. IEEE J Select Areas Commun 37:1205\u20131221","journal-title":"IEEE J Select Areas Commun"},{"key":"2269_CR87","doi-asserted-by":"crossref","first-page":"165462","DOI":"10.1109\/ACCESS.2019.2960412","volume":"7","author":"Wazid","year":"2019","unstructured":"Wazid (2019) Blockchain for internet of things (IoT) applications: a comprehensive survey. IEEE Access 7:165462\u2013165499","journal-title":"IEEE Access"},{"key":"2269_CR88","doi-asserted-by":"crossref","unstructured":"Wu Z, Liu G, Wu J et al (2023) Are neighbors alike? A semisupervised probabilistic collaborative learning model for online review spammers detection. Information Systems Research","DOI":"10.1287\/isre.2022.0047"},{"key":"2269_CR89","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cmpb.2017.09.005","volume":"153","author":"Y Xiao","year":"2018","unstructured":"Xiao Y, Wu J, Lin Z et al (2018) A deep learning-based multi-model ensemble method for cancer prediction. Comput Methods Programs Biomed 153:1\u20139","journal-title":"Comput Methods Programs Biomed"},{"issue":"7","key":"2269_CR90","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.3390\/electronics13071230","volume":"13","author":"G Xie","year":"2024","unstructured":"Xie G, Hou G, Pei Q et al (2024) Lightweight privacy protection via adversarial sample. Electronics 13(7):1230\u20131230","journal-title":"Electronics"},{"key":"2269_CR91","doi-asserted-by":"crossref","first-page":"3915","DOI":"10.1109\/JIOT.2020.3025953","volume":"8","author":"H Xu","year":"2020","unstructured":"Xu H, Zhang L, Onireti O et al (2020) Blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond. IEEE Internet Things J 8:3915\u20133929","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"2269_CR92","doi-asserted-by":"crossref","first-page":"9346","DOI":"10.1109\/TWC.2023.3270179","volume":"22","author":"H Xu","year":"2023","unstructured":"Xu H, Han S, Li X et al (2023) Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Trans Wirel Commun 22(12):9346\u20139360","journal-title":"IEEE Trans Wirel Commun"},{"key":"2269_CR93","first-page":"1","volume":"8","author":"I Yaqoob","year":"2021","unstructured":"Yaqoob I, Salah K, Jayaraman R et al (2021) Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput Appl 8:1\u201316","journal-title":"Neural Comput Appl"},{"key":"2269_CR94","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TII.2019.2940742","volume":"16","author":"L Yin","year":"2019","unstructured":"Yin L, Luo X, Zhu C et al (2019) Disrupting C &C communication of IoT-based botnet through fast detection of anomalous domain queries. IEEE Trans Ind Inform 16:1373\u20131384","journal-title":"IEEE Trans Ind Inform"},{"key":"2269_CR95","doi-asserted-by":"crossref","first-page":"109635","DOI":"10.1016\/j.comnet.2023.109635","volume":"224","author":"H Zhang","year":"2023","unstructured":"Zhang H, Mi Y, Liu X et al (2023) A differential game approach for real-time security defense decision in scale-free networks. Comput Netw 224:109635\u2013109635","journal-title":"Comput Netw"},{"key":"2269_CR96","doi-asserted-by":"crossref","unstructured":"Zhang J, Chen J, Wu D et al (2019) Poisoning attack in federated learning using generative adversarial nets. In: Proceedings of the 18th IEEE international conference on trust, security and privacy in computing and communications\/13th IEEE international conference on big data science and engineering, pp 5\u20138","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"issue":"4","key":"2269_CR97","doi-asserted-by":"crossref","first-page":"4183","DOI":"10.1109\/JSYST.2020.3020425","volume":"15","author":"P Zhao","year":"2021","unstructured":"Zhao P (2021) Federated learning for anomaly detection in industrial control systems. IEEE Syst J 15(4):4183\u20134196","journal-title":"IEEE Syst J"},{"key":"2269_CR98","doi-asserted-by":"crossref","unstructured":"Zhao Y, Chen J, Wu D et al (2019) Multi-task network anomaly detection using federated learning. In: Proceedings of the tenth international symposium on information and communication technology, pp 4\u20136","DOI":"10.1145\/3368926.3369705"},{"key":"2269_CR99","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2023.046692","author":"W Zheng","year":"2024","unstructured":"Zheng W, Lu S, Cai Z et al (2024) PAL-BERT: an improved question answering model. Comput Model Eng Sci. https:\/\/doi.org\/10.32604\/cmes.2023.046692","journal-title":"Comput Model Eng Sci"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02269-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02269-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02269-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:23:28Z","timestamp":1730197408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02269-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,1]]},"references-count":99,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["2269"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02269-2","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,1]]},"assertion":[{"value":"23 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}