{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:14:12Z","timestamp":1766268852706,"version":"3.44.0"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T00:00:00Z","timestamp":1738972800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T00:00:00Z","timestamp":1738972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s13042-025-02557-5","type":"journal-article","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T20:45:19Z","timestamp":1738961119000},"page":"5013-5031","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["FedL_DBNFSpinalNet based malware detection in IoT devices"],"prefix":"10.1007","volume":"16","author":[{"given":"R.","family":"Bhavani","sequence":"first","affiliation":[]},{"given":"Veeramalai","family":"Sankaradass","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"key":"2557_CR1","doi-asserted-by":"crossref","unstructured":"Vakili A, Mohammed H, Al-Khafaji HMR, Darbandi M, Heidari A, Navimipour N, Unal M (2024) A new service composition method in the cloud-based Internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr Comput Pract Exp, 36","DOI":"10.1002\/cpe.8091"},{"issue":"2","key":"2557_CR2","first-page":"1","volume":"14","author":"A Heidari","year":"2023","unstructured":"Heidari A, Navimipour N, Dag H, Unal M (2023) Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdiscipl Rev Data Min Knowl Discov 14 (2):1-45","journal-title":"Wiley Interdiscipl Rev Data Min Knowl Discov"},{"key":"2557_CR3","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/s12559-024-10255-7","volume":"16","author":"A Heidari","year":"2023","unstructured":"Heidari A, Navimipour N, Dag H, Talebi S, Unal M (2023) A novel blockchain-based deepfake detection method using federated and deep learning models. Cognit Comput 16:1073\u20131091","journal-title":"Cognit Comput"},{"key":"2557_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100078","volume":"7","author":"I Lee","year":"2019","unstructured":"Lee I (2019) The Internet of Things for enterprises: an ecosystem, architecture, and IoT service business model. Internet of Things 7:100078","journal-title":"Internet of Things"},{"issue":"9","key":"2557_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3390\/fi12090157","volume":"12","author":"I Lee","year":"2020","unstructured":"Lee I (2020) Internet of Things (IoT) cybersecurity: literature review and IoT cyber risk management. Future Internet 12(9):157","journal-title":"Future Internet"},{"issue":"2","key":"2557_CR6","first-page":"31","volume":"4","author":"AV Krishna Prasad","year":"2021","unstructured":"Krishna Prasad AV (2021) Deep Learning based optimization for Detection of Attacks in IoT. J Netw Commun Syst 4(2):31\u201336","journal-title":"J Netw Commun Syst"},{"key":"2557_CR7","doi-asserted-by":"crossref","unstructured":"Kaluri R, Rajput DS, Xin Q, Lakshmanna K, Bhattacharya S, Gadekallu TR, Maddikunta PKR (2021) Roughsets-based approach for predicting battery life in IoT. arXiv preprint arXiv:2102.06026","DOI":"10.32604\/iasc.2021.014369"},{"key":"2557_CR8","doi-asserted-by":"crossref","unstructured":"Babu ES, Rao MS, Swain G, Kousar Nikhath A, Kaluri R (2023) Fog\u2010Sec: secure end\u2010to\u2010end communication in fog\u2010enabled IoT network using permissioned blockchain system. Int J Netw Manag 33(5)","DOI":"10.1002\/nem.2248"},{"issue":"1","key":"2557_CR9","doi-asserted-by":"publisher","first-page":"2708","DOI":"10.1109\/TCE.2023.3319374","volume":"70","author":"GG Devarajan","year":"2024","unstructured":"Devarajan GG, Nagarajan SM, Daniel A, Vignesh T, Kaluri R (2024) Consumer product recommendation system using adapted PSO with federated learning method. IEEE Trans Consum Electron 70(1):2708\u20132715","journal-title":"IEEE Trans Consum Electron"},{"key":"2557_CR10","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.comcom.2022.12.001","volume":"199","author":"ES Babu","year":"2023","unstructured":"Babu ES, Barthwal A, Kaluri R (2023) Sec-edge: trusted blockchain system for enabling the identification and authentication of edge based 5G networks. Comput Commun 199:10\u201329","journal-title":"Comput Commun"},{"issue":"1","key":"2557_CR11","first-page":"40","volume":"5","author":"B Janaiah","year":"2022","unstructured":"Janaiah B (2022) Attack detection in IoT using DBN based optimization algorithm. J Netw Commun Syst 5(1):40\u201349","journal-title":"J Netw Commun Syst"},{"key":"2557_CR12","doi-asserted-by":"publisher","first-page":"107399","DOI":"10.1016\/j.engappai.2023.107399","volume":"128","author":"G Sathish Kumar","year":"2024","unstructured":"Sathish Kumar G, Premalatha K, Uma Maheshwari G, Rajesh Kanna P, Vijaya G, Nivaashini M (2024) Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation. Eng Appl Artif Intell 128:107399","journal-title":"Eng Appl Artif Intell"},{"key":"2557_CR13","doi-asserted-by":"publisher","first-page":"121071","DOI":"10.1016\/j.eswa.2023.121071","volume":"234","author":"G Sathish Kumar","year":"2023","unstructured":"Sathish Kumar G, Premalatha K, Uma Maheshwari G, Rajesh Kanna P (2023) No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user\u2019s private and sensitive data. Expert Syst Appl 234:121071","journal-title":"Expert Syst Appl"},{"key":"2557_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102779","volume":"120","author":"R Chaganti","year":"2022","unstructured":"Chaganti R, Ravi V, Pham TD (2022) Deep learning based cross architecture internet of things malware detection and classification. Comput Secur 120:102779","journal-title":"Comput Secur"},{"issue":"2","key":"2557_CR15","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","volume":"6","author":"Y Lu","year":"2018","unstructured":"Lu Y, Da Xu L (2018) Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J 6(2):2103\u20132115","journal-title":"IEEE Internet Things J"},{"key":"2557_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2024.102779","volume":"149","author":"S Aminizadeh","year":"2024","unstructured":"Aminizadeh S, Heidari A, Dehghan M, Toumaj S, Rezaei M, Navimipour NJ, Stroppa F, Unal M (2024) Opportunities and challenges of artificial intelligence and distributed systems to improve the quality of healthcare service. Artif Intell Med 149:102779","journal-title":"Artif Intell Med"},{"key":"2557_CR17","doi-asserted-by":"publisher","first-page":"5757","DOI":"10.1007\/s00521-023-09366-3","volume":"36","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Navimipour N, Esmaeilpour M, Yazdani Y (2024) The deep learning applications in IoT-based bio- and medical informatics a systematic literature review. Neural Comput Appl 36:5757\u20135797","journal-title":"Neural Comput Appl"},{"key":"2557_CR18","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/B978-0-323-91150-4.00006-9","volume-title":"Non-destructive material characterization methods","author":"A Heidari","year":"2024","unstructured":"Heidari A, Navimipour NJ, Otsuki A (2024) Cloud-based non-destructive characterization. In: Otsuki A, Jose S, Mohan M, Thomas S (eds) Non-destructive material characterization methods, vol 24. Elsevier, pp 727\u2013765"},{"key":"2557_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693","volume":"204","author":"V Rey","year":"2022","unstructured":"Rey V, Sanchez PMS, Celdran AH, Bovet G (2022) Federated learning for malware detection in IoT devices. Comput Netw 204:108693","journal-title":"Comput Netw"},{"issue":"15","key":"2557_CR20","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The Internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"2557_CR21","unstructured":"Doriguzzi-Corin R, Siracusa D (2022) FLAD: adaptive federated learning for DDoS attack detection. arXiv preprint arXiv:2205.06661"},{"key":"2557_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.ins.2019.11.021","volume":"515","author":"L Qi","year":"2020","unstructured":"Qi L, Zhang X, Li S, Wan S, Wen Y, Gong W (2020) Spatial-temporal data-driven service recommendation with privacy-preservation. Inf Sci 515:91\u2013102","journal-title":"Inf Sci"},{"key":"2557_CR23","doi-asserted-by":"publisher","first-page":"7521","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari A, Shishehlou H, Darbandi M, Navimipour N, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Comput 27:7521\u20137539","journal-title":"Cluster Comput"},{"issue":"10","key":"2557_CR24","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari A, Jafari Navimipour N, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet of Things J 10(10):8445\u20138454","journal-title":"IEEE Internet of Things J"},{"issue":"12","key":"2557_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571728","volume":"55","author":"A Heidari","year":"2022","unstructured":"Heidari A, Navimipour N, Unal M, Zhang G (2022) Machine learning applications in internet-of-drones: systematic review, recent deployments, and open issues. ACM Comput Surv 55(12):1\u201345","journal-title":"ACM Comput Surv"},{"key":"2557_CR26","doi-asserted-by":"crossref","unstructured":"Pei X, Deng X, Tian S, Zhang L, Xue K (2022) A knowledge transfer-based semi-supervised federated learning for IoT malware detection. IEEE Trans Depend Secure Comput","DOI":"10.1109\/TDSC.2022.3173664"},{"issue":"11","key":"2557_CR27","first-page":"755","volume":"9","author":"V Sankaradass","year":"2015","unstructured":"Sankaradass V, Daya Florance D, Gowthami M, Briskilal J (2015) Privacy and security in distributed information sharing through brokering system. Austral J Basic Appl Sci 9(11):755\u2013758","journal-title":"Austral J Basic Appl Sci"},{"issue":"13","key":"2557_CR28","first-page":"8","volume":"10","author":"V Sankaradass","year":"2015","unstructured":"Sankaradass V, Nalinipriya G, Praveen Raj Kumar, N (2015) Recommendation system for visualization of network security issues. Res J Fish Hydrobiol 10(13):8\u201317","journal-title":"Res J Fish Hydrobiol"},{"key":"2557_CR29","doi-asserted-by":"crossref","unstructured":"Amiri Z, Heidari A, Zavvar M, Navimipour N, Esmaeilpour M (2024) The applications of nature\u2010inspired algorithms in Internet of Things\u2010based healthcare service: A systematic literature review. Trans Emerg Telecommun Technol 35(6)","DOI":"10.1002\/ett.4969"},{"key":"2557_CR30","doi-asserted-by":"crossref","unstructured":"Heidari A, Navimipour N, Zeadally S, Chamola V (2024) Everything you wanted to know about ChatGPT: Components, capabilities, applications, and opportunities\", Internet Technol Lett, 7 (6)","DOI":"10.1002\/itl2.530"},{"key":"2557_CR31","doi-asserted-by":"crossref","unstructured":"Nataraj L, Karthikeyan S, Jacob G, Manjunath BS (2011) \"Malware images: visualization and automatic classification\", In: Proceedings of the 8th International Symposium on visualization for cyber security, pp 1\u20137","DOI":"10.1145\/2016904.2016908"},{"issue":"1","key":"2557_CR32","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TNSE.2023.3292855","volume":"11","author":"X Deng","year":"2024","unstructured":"Deng X, Wang Z, Pei X, Xue K (2024) TransMalDE: an effective transformer based hierarchical framework for IoT malware detection. IEEE Trans Netw Sci Eng 11(1):140\u2013151","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2557_CR33","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1109\/TIFS.2024.3350379","volume":"19","author":"J Jeon","year":"2024","unstructured":"Jeon J, Jeong B, Baek S, Jeong Y-S (2024) Static multi feature-based malware detection using multi SPP-net in smart IoT environments. IEEE Trans Inf Forensics Secur 19:2487\u20132500","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2557_CR34","doi-asserted-by":"crossref","unstructured":"Su J, Vasconcellos DV, Prasad S, Sgandurra D, Feng Y, Sakurai K (2018) Lightweight classification of IoT malware based on image recognition. In: Proceedings of 42Nd annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 664\u2013669","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"2557_CR35","unstructured":"Shukla S, Kolhe G, Homayoun H, Manoj PDS, Rafatirad S (2019) Malware detection using federated learning based on HPC events and localized image features"},{"key":"2557_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/8195395","volume":"2019","author":"F Xiao","year":"2019","unstructured":"Xiao F, Lin Z, Sun Y, Ma Y (2019) Malware detection based on deep learning of behavior graphs. Math Probl Eng 2019(1):1\u201310","journal-title":"Math Probl Eng"},{"issue":"Part A","key":"2557_CR37","doi-asserted-by":"publisher","first-page":"105688","DOI":"10.1016\/j.bspc.2023.105688","volume":"88","author":"TM Nithya","year":"2024","unstructured":"Nithya TM, Dhivya P, Sangeethaa SN, Rajesh Kanna P (2024) TB-MFCC multifuse feature for emergency vehicle sound classification using multistacked CNN-Attention BiLSTM. Biomed Signal Process Control 88(Part A):105688","journal-title":"Biomed Signal Process Control"},{"key":"2557_CR38","doi-asserted-by":"crossref","unstructured":"Priyanka KST, Indirapriyadharshini J, Sadesh S, RG, RKP (2023) Prediction of weather forecasting with long short-term memory using deep learning. In: 2023 4th International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, pp. 1161\u20131168","DOI":"10.1109\/ICOSEC58147.2023.10276273"},{"key":"2557_CR39","doi-asserted-by":"crossref","unstructured":"Salem A, Zhang Y, Humbert M, Berrang P, Fritz M, Backes M (2018) Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","DOI":"10.14722\/ndss.2019.23119"},{"key":"2557_CR40","first-page":"1","volume":"70","author":"P Dhivya","year":"2023","unstructured":"Dhivya P, Rajesh Kanna P, Deepa K, Santhiya S (2023) Square static\u2014deep hyper optimization and genetic meta-learning approach for disease classification. IETE J Res\u00a0 70(4):1-10","journal-title":"IETE J Res"},{"key":"2557_CR41","doi-asserted-by":"crossref","unstructured":"Harsha R, Karthika S, Priya MD, Kanna RP, Rajeshkumar G, Mythili E (2023) Folla disease detection using in-depth learning. In: 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, pp. 547\u2013552","DOI":"10.1109\/ICAAIC56838.2023.10141305"},{"key":"2557_CR42","doi-asserted-by":"crossref","unstructured":"SS, SS, RG, GS, VK, RKP (2023) Predict the quality of freshwater using support vector machines. In: 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, pp. 370\u2013377","DOI":"10.1109\/ICAAIC56838.2023.10140956"},{"key":"2557_CR43","doi-asserted-by":"crossref","unstructured":"Rajesh Kanna P, Rajeshkumar G, Sriram S, Sadesh S, Vinu C, Mani L (2023) Effective scheduling of real-time task in virtual cloud environment using adaptive job scoring algorithm. In: Buyya R, Misra S, Leung YW, Mondal A (eds) Proceedings of International Conference on Advanced Communications and Machine Intelligence. MICA 2022. Studies in Autonomic, Data-driven and Industrial Computing. Springer, Singapore","DOI":"10.1007\/978-981-99-2768-5_30"},{"issue":"Part C","key":"2557_CR44","doi-asserted-by":"publisher","first-page":"105296","DOI":"10.1016\/j.bspc.2023.105296","volume":"86","author":"TM Nithya","year":"2023","unstructured":"Nithya TM, Rajesh Kanna P, Vanithamani S, Santhi P (2023) An efficient PM-multisampling image filtering with enhanced CNN architecture for pneumonia classfication. Biomed Signal Process Control 86(Part C):105296","journal-title":"Biomed Signal Process Control"},{"key":"2557_CR45","doi-asserted-by":"crossref","unstructured":"Mythili E, Vanithamani S, Kanna RP, Gayathri RGK, Harsha R (2023) AMLPDS: an automatic multi-regional license plate detection system based on EasyOCR and CNN algorithm. In: 2023 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, pp. 667\u2013673","DOI":"10.1109\/ICECAA58104.2023.10212354"},{"key":"2557_CR46","doi-asserted-by":"crossref","unstructured":"Gayathiri B, Brindha P, Karthika I, Saranya E, Rajeshkumar G, Rajesh Kanna P (2023) Machine Learning based crop suitability prediction and fertiliser recommendation system. In: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp. 1023\u20131028","DOI":"10.1109\/ICESC57686.2023.10193542"},{"issue":"7","key":"2557_CR47","doi-asserted-by":"publisher","first-page":"8726","DOI":"10.1109\/TNNLS.2022.3216981","volume":"35","author":"L Lyu","year":"2022","unstructured":"Lyu L, Yu H, Ma X, Chen C, Sun L, Zhao J, Yang Q, Philip SY (2022) Privacy and robustness in federated learning: Attacks and defenses. IEEE Trans Neural Netw Learn Syst. 35(7):8726-8746","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2557_CR48","doi-asserted-by":"crossref","unstructured":"Pandiaraj A, Lakshmana Prakash S, Gopal R, Rajesh Kanna P (2022) Generating art and music using deep neural networks, In book: Artificial Intelligent Techniques for Wireless Communication and Networking (pp.91-103)","DOI":"10.1002\/9781119821809.ch7"},{"key":"2557_CR49","doi-asserted-by":"publisher","first-page":"116545","DOI":"10.1016\/j.eswa.2022.116545","volume":"194","author":"P Rajesh Kanna","year":"2022","unstructured":"Rajesh Kanna P, Santhi P (2022) Hybrid Intrusion detection using MapReduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst Appl 194:116545","journal-title":"Expert Syst Appl"},{"key":"2557_CR50","doi-asserted-by":"publisher","first-page":"107132","DOI":"10.1016\/j.knosys.2021.107132","volume":"226","author":"P Rajesh Kanna","year":"2021","unstructured":"Rajesh Kanna P, Santhi P (2021) Unified deep learning approach for efficient intrusion detection system using integrated spatial-temporal features. Knowl-Based Syst 226:107132","journal-title":"Knowl-Based Syst"},{"key":"2557_CR51","doi-asserted-by":"crossref","unstructured":"Pandiaraj A, Prakash SL, Kanna PR (2021) Effective heart disease prediction using hybridmachine learning. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, pp. 731\u2013738, 2021","DOI":"10.1109\/ICICV50876.2021.9388635"},{"key":"2557_CR52","unstructured":"Kanna PR, Ragunath V (2020) Agricultural robot\u2014a pesticide spraying device"},{"issue":"1","key":"2557_CR53","first-page":"71","volume":"11","author":"P Rajesh Kanna","year":"2017","unstructured":"Rajesh Kanna P, Sindhanaiselvan K, Vijaymeena MK (2017) A defensive mechanism based on PCA to defend denial-of-service attack. Int J Secur Appl 11(1):71\u201382","journal-title":"Int J Secur Appl"},{"key":"2557_CR54","doi-asserted-by":"crossref","unstructured":"Shukla S, Kolhe G, Homayoun H, Rafatirad S, PD, SM (2022) Rafel-robust and data-aware federated learning-inspired malware detection in internet-of-things (IoT) networks. In: Proceedings of the Great Lakes Symposium on VLSI, pp 153\u2013157, June 2022","DOI":"10.1145\/3526241.3530378"},{"issue":"12","key":"2557_CR55","doi-asserted-by":"publisher","first-page":"8442","DOI":"10.1109\/TII.2020.3043458","volume":"17","author":"R Taheri","year":"2020","unstructured":"Taheri R, Shojafar M, Alazab M, Tafazolli R (2020) FED-IIoT: a robust federated malware detection architecture in industrial IoT. IEEE Trans Industr Inf 17(12):8442\u20138452","journal-title":"IEEE Trans Industr Inf"},{"key":"2557_CR56","unstructured":"Kumar R, Wang W, Kumar J, Yang T, Ali W (2021) Collective intelligence: Decentralized learning for Android malware detection in IoT with blockchain. arXiv preprint arXiv:2102.13376"},{"key":"2557_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102098","volume":"101","author":"Z Ren","year":"2020","unstructured":"Ren Z, Wu H, Ning Q, Hussain I, Chen B (2020) End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw 101:102098","journal-title":"Ad Hoc Netw"},{"key":"2557_CR58","doi-asserted-by":"publisher","first-page":"8432","DOI":"10.1109\/JIOT.2022.3188583","volume":"10","author":"R Yumlembam","year":"2022","unstructured":"Yumlembam R, Issac B, Jacob SM, Yang L (2022) Iot-based android malware detection using graph neural network with adversarial defense. IEEE Internet of Things J 10 (10):8432\u20138444","journal-title":"IEEE Internet of Things J"},{"key":"2557_CR59","unstructured":"Medbiot dataset is taken from https:\/\/cs.taltech.ee\/research\/data\/medbiot\/fine-grained\/structured_dataset\/malware\/. Accessed Aug 12 2023"},{"issue":"1","key":"2557_CR60","first-page":"63","volume":"1","author":"HA Prihanditya","year":"2020","unstructured":"Prihanditya HA (2020) The implementation of z-score normalization and boosting techniques to increase accuracy of c4.5 algorithm in diagnosing chronic kidney disease. J Soft Comput Explor 1(1):63\u201369","journal-title":"J Soft Comput Explor"},{"key":"2557_CR61","unstructured":"Chopra P (2021) Progressivespinalnet architecture for fc layers. arXiv preprint arXiv:2103.11373"},{"issue":"4","key":"2557_CR62","doi-asserted-by":"publisher","first-page":"2682","DOI":"10.3390\/app13042682","volume":"13","author":"J Ryu","year":"2023","unstructured":"Ryu J (2023) Improved image quality assessment by utilizing pre-trained architecture features with unified learning mechanism. Appl Sci 13(4):2682","journal-title":"Appl Sci"},{"key":"2557_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/396529","volume":"2014","author":"PR Bhaladhare","year":"2014","unstructured":"Bhaladhare PR, Jinwala DC (2014) A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm. Adv Comput Eng 2014:1\u201312","journal-title":"Adv Comput Eng"},{"issue":"6","key":"2557_CR64","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1109\/JSTARS.2015.2388577","volume":"8","author":"Y Chen","year":"2015","unstructured":"Chen Y, Zhao X, Jia X (2015) Spectral\u2013spatial classification of hyperspectral data based on deep belief network. IEEE J Sel Top Appl Earth Observ Remote Sens 8(6):2381\u20132392","journal-title":"IEEE J Sel Top Appl Earth Observ Remote Sens"},{"issue":"4","key":"2557_CR65","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1198\/073500104000000370","volume":"22","author":"RF Engle","year":"2004","unstructured":"Engle RF, Manganelli S (2004) CAViaR: conditional autoregressive value at risk by regression quantiles. J Bus Econ Stat 22(4):367\u2013381","journal-title":"J Bus Econ Stat"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02557-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02557-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02557-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T05:43:16Z","timestamp":1757137396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02557-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,8]]},"references-count":65,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2557"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02557-5","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2025,2,8]]},"assertion":[{"value":"18 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}