{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T22:46:31Z","timestamp":1773441991916,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s13042-025-02753-3","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T14:34:00Z","timestamp":1753713240000},"page":"9253-9269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel hybrid approach to detect clients in federated learning for industrial internet of things"],"prefix":"10.1007","volume":"16","author":[{"given":"Attia","family":"Qammar","sequence":"first","affiliation":[]},{"given":"Hongmei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianguo","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Abdenacer","family":"Naouri","sequence":"additional","affiliation":[]},{"given":"Amar","family":"Khelloufi","sequence":"additional","affiliation":[]},{"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"2753_CR1","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans Industr Inf 14:4724\u20134734","journal-title":"IEEE Trans Industr Inf"},{"key":"2753_CR2","doi-asserted-by":"publisher","unstructured":"Voigt P, von dem Bussche A (2017) The EU General Data Protection Regulation (GDPR). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-57959-7","DOI":"10.1007\/978-3-319-57959-7"},{"key":"2753_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie M, Chang JM (2019) Privacy-preserving machine learning: threats and solutions. IEEE Secur Priv 17:49\u201358","journal-title":"IEEE Secur Priv"},{"key":"2753_CR4","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.3390\/electronics9091379","volume":"9","author":"UA Butt","year":"2020","unstructured":"Butt UA, Mehmood M, Shah SBH, Rashid Amin M, Shaukat W, Raza SM, Suh DY, Piran MJ (2020) A review of machine learning algorithms for cloud computing security. Electronics 9:1379","journal-title":"Electronics"},{"key":"2753_CR5","unstructured":"Brendan M, Eider M, Daniel R, Seth H, Blaise AA (2017) Communication-efficient learning of deep networks from decentralized data. PMLR, pp 1273\u20131282"},{"key":"2753_CR6","first-page":"1","volume":"5","author":"X Jie","year":"2021","unstructured":"Jie X, Glicksberg BS, Chang S, Walker P, Bian J, Wang F (2021) Federated learning for healthcare informatics. J Healthcare Inform Res 5:1\u201319","journal-title":"J Healthcare Inform Res"},{"key":"2753_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_17","volume-title":"Federated learning for open banking","author":"G Long","year":"2020","unstructured":"Long G, Tan Y, Jiang J, Zhang C (2020) Federated learning for open banking. Springer, Berlin"},{"key":"2753_CR8","doi-asserted-by":"crossref","unstructured":"Kang T, Duncan B, Julien LK, Muhammad I (2020) Federated machine learning in vehicular networks: a summary of recent applications. IEEE, pp 1\u20134","DOI":"10.1109\/UCET51115.2020.9205482"},{"key":"2753_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09540091.2021.1936455","volume":"34","author":"Z Zheng","year":"2022","unstructured":"Zheng Z, Zhou Y, Sun Y, Wang Z, Liu B, Li K (2022) Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges. Connect Sci 34:1\u201328","journal-title":"Connect Sci"},{"key":"2753_CR10","doi-asserted-by":"crossref","unstructured":"Yang L, Anbu H, Yun L, He H, Youzhi L, Yuanyuan C, Lican F, Tianjian C, Han Y, Qiang Y (2020) Fedvision: an online visual object detection platform powered by federated learning. In: Proceedings of the AAAI conference on artificial intelligence, vol 34, No. 08, pp 13172\u201313179","DOI":"10.1609\/aaai.v34i08.7021"},{"key":"2753_CR11","doi-asserted-by":"publisher","first-page":"670","DOI":"10.3390\/electronics11040670","volume":"11","author":"M Shaheen","year":"2022","unstructured":"Shaheen M, Farooq MS, Umer T, Kim B-S (2022) Applications of federated learning; taxonomy, challenges, and research trends. Electronics 11:670","journal-title":"Electronics"},{"key":"2753_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSEC.2020.3039941","volume":"19","author":"MS Jere","year":"2020","unstructured":"Jere MS, Farnan T, Koushanfar F (2020) A taxonomy of attacks on federated learning. IEEE Secur Priv 19:20\u201328","journal-title":"IEEE Secur Priv"},{"key":"2753_CR13","doi-asserted-by":"crossref","unstructured":"Zhang J, Chen J, Wu D, Chen B, Yu S (2019) Poisoning attack in federated learning using generative adversarial nets. IEEE, pp 374\u2013380","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"key":"2753_CR14","doi-asserted-by":"crossref","unstructured":"Lyu L, Yu H, Yang Q (2020) Threats to federated learning: a survey. arXiv:2003.02133","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"2753_CR15","doi-asserted-by":"crossref","unstructured":"Qammar A, Ding J,  Ning H (2022) Federated learning attack surface: taxonomy, cyber defences, challenges, and future directions. Artif Intell Rev 55(5):3569\u20133606","DOI":"10.1007\/s10462-021-10098-w"},{"key":"2753_CR16","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri V, Parizi RM, Pouriyeh S, Huang Y, Dehghantanha A, Srivastava G (2021) A survey on security and privacy of federated learning. Futur Gener Comput Syst 115:619\u2013640","journal-title":"Futur Gener Comput Syst"},{"key":"2753_CR17","first-page":"480","volume-title":"Data poisoning attacks against federated learning systems","author":"V Tolpegin","year":"2020","unstructured":"Tolpegin V, Truex S, Gursoy ME, Liu L (2020) Data poisoning attacks against federated learning systems. Springer, Berlin, pp 480\u2013501"},{"key":"2753_CR18","doi-asserted-by":"crossref","unstructured":"Liu W, Lin H, Wang X, Hu J, Kaddoum G, Piran MJ, Alamri A (2021) D2MIF: A malicious model detection mechanism for federated-learning-empowered artificial intelligence of things. IEEE Internet Things J 10(3):2141\u20132151","DOI":"10.1109\/JIOT.2021.3081606"},{"key":"2753_CR19","unstructured":"McCaffrey J. Anomaly detection using principal component analysis (pca). https:\/\/visualstudiomagazine.com\/articles\/2021\/10\/20\/anomaly-detection-pca.aspx"},{"key":"2753_CR20","doi-asserted-by":"crossref","unstructured":"Saxena A, Goebel K, Simon D, Eklund N (2008) Damage propagation modeling for aircraft engine run-to-failure simulation. IEEE, pp 1\u20139","DOI":"10.1109\/PHM.2008.4711414"},{"key":"2753_CR21","unstructured":"Fung C, Yoon CJM, Beschastnikh I (2018) Mitigating sybils in federated learning poisoning. arXiv:1808.04866"},{"key":"2753_CR22","unstructured":"Li S, Cheng Y, Wang W, Liu Y, Chen T (2020) Learning to detect malicious clients for robust federated learning. arXiv:2002.00211"},{"key":"2753_CR23","first-page":"pages 595","volume-title":"Pdgan: a novel poisoning defense method in federated learning using generative adversarial network","author":"Y Zhao","year":"2020","unstructured":"Zhao Y, Chen J, Zhang J, Di W, Teng J, Shui Yu (2020) Pdgan: a novel poisoning defense method in federated learning using generative adversarial network. Springer, Berlin, p pages 595-609"},{"key":"2753_CR24","doi-asserted-by":"crossref","unstructured":"Cao X, Jia J,  Gong NZ (2021) Provably secure federated learning against malicious clients. In: Proceedings of the AAAI conference on artificial intelligence, vol 35, No. 8, pp 6885\u20136893","DOI":"10.1609\/aaai.v35i8.16849"},{"key":"2753_CR25","unstructured":"Blanchard P, El Mhamdi EM, Guerraoui R,  Stainer J (2017) Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in neural information processing systems, vol 30"},{"key":"2753_CR26","doi-asserted-by":"crossref","unstructured":"Cao D, Chang S, Lin Z, Liu G, Sun D (2019) Understanding distributed poisoning attack in federated learning. IEEE, pp 233\u2013239","DOI":"10.1109\/ICPADS47876.2019.00042"},{"key":"2753_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5906","volume":"34","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Chen J, Zhang J, Di W, Blumenstein M, Shui Yu (2022) Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks. Concurr Comput Pract Exp 34:e5906","journal-title":"Concurr Comput Pract Exp"},{"key":"2753_CR28","unstructured":"Li S, Cheng Y, Liu Y, Wang W, Chen T (2019) Abnormal client behavior detection in federated learning. arXiv:1910.09933"},{"key":"2753_CR29","first-page":"2029","volume":"18","author":"L Zhao","year":"2020","unstructured":"Zhao L, Shengshan H, Wang Q, Jiang J, Shen C, Luo X, Pengfei H (2020) Shielding collaborative learning: mitigating poisoning attacks through client-side detection. IEEE Trans Dependable Secure Comput 18:2029\u20132041","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"2753_CR30","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/MNET.011.2000379","volume":"35","author":"J Tan","year":"2020","unstructured":"Tan J, Liang Y-C, Luong NC, Niyato D (2020) Toward smart security enhancement of federated learning networks. IEEE Netw 35(1):340\u2013347","journal-title":"IEEE Netw"},{"key":"2753_CR31","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MWC.001.1900119","volume":"27","author":"J Kang","year":"2020","unstructured":"Kang J, Xiong Z, Niyato D, Zou Y, Zhang Y, Guizani M (2020) Reliable federated learning for mobile networks. IEEE Wirel Commun 27:72\u201380","journal-title":"IEEE Wirel Commun"},{"key":"2753_CR32","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer J, Blanco-Justicia A, S\u00e1nchez D, Jebreel N (2020) Co-utile peer-to-peer decentralized computing. IEEE, pp 31\u201340","DOI":"10.1109\/CCGrid49817.2020.00-90"},{"key":"2753_CR33","unstructured":"Li T, Hu S, Beirami A, Smith V (2021) Ditto: Fair and robust federated learning through personalization. PMLR, pp 6357\u20136368"},{"key":"2753_CR34","doi-asserted-by":"crossref","unstructured":"Du W, Xu D, Wu X, Tong H (2021) Fairness-aware agnostic federated learning. SIAM, pp 181\u2013189","DOI":"10.1137\/1.9781611976700.21"},{"issue":"10","key":"2753_CR35","doi-asserted-by":"publisher","first-page":"8467","DOI":"10.1109\/JIOT.2022.3200048","volume":"10","author":"IA Khan","year":"2023","unstructured":"Khan IA, Pi D, Abbas MZ, Zia U, Hussain Y, Soliman H (2023) Federated-srus: A federated-simple-recurrent-units-based ids for accurate detection of cyber attacks against iot-augmented industrial control systems. IEEE Internet Things J 10(10):8467\u20138476. https:\/\/doi.org\/10.1109\/JIOT.2022.3200048","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2753_CR36","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.3352013","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Zia U, Kamal S, Hussain Y (2024) A novel collaborative sru network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J Biomed Health Inform 28(6):3228\u20133235. https:\/\/doi.org\/10.1109\/JBHI.2024.3352013","journal-title":"IEEE J Biomed Health Inform"},{"key":"2753_CR37","doi-asserted-by":"publisher","unstructured":"Khan IA, Razzak I, Pi D, Khan N, Hussain Y, Li B, Kousar T (2024) Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of iomt networks against cyber-attacks. Inform Fusion 101:102002. https:\/\/doi.org\/10.1016\/j.inffus.2023.102002. urlhttps:\/\/www.sciencedirect.com\/science\/article\/pii\/S1566253523003184","DOI":"10.1016\/j.inffus.2023.102002"},{"key":"2753_CR38","doi-asserted-by":"publisher","unstructured":"Moudoud H , Cherkaoui S (2022) Toward secure and private federated learning for iot using blockchain. In GLOBECOM 2022 - 2022 IEEE Global Communications Conference, pp 4316\u20134321. https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000623","DOI":"10.1109\/GLOBECOM48099.2022.10000623"},{"key":"2753_CR39","doi-asserted-by":"crossref","unstructured":"El\u00a0Houda ZA, Moudoud H, Khoukhi L (2023) Secure and efficient federated learning for robust intrusion detection in iot networks. In GLOBECOM 2023-2023 IEEE Global Communications Conference. IEEE, pp 2668\u20132673","DOI":"10.1109\/GLOBECOM54140.2023.10436768"},{"key":"2753_CR40","doi-asserted-by":"publisher","unstructured":"El\u00a0Houda Zakaria\u00a0A, Moudoud H, Brik B, Khoukhi L (2023)Securing federated learning through blockchain and explainable ai for robust intrusion detection in iot networks. In IEEE INFOCOM 2023\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 1\u20136. https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS57453.2023.10225769","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225769"},{"key":"2753_CR41","doi-asserted-by":"publisher","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G, Karimipour H, Parizi RM (2024) Hybrid privacy preserving federated learning against irregular users in next-generation internet of things. J Syst Architect 148:103088. https:\/\/doi.org\/10.1016\/j.sysarc.2024.103088. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1383762124000250","DOI":"10.1016\/j.sysarc.2024.103088"},{"issue":"1","key":"2753_CR42","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.1109\/TCE.2023.3318509","volume":"70","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G (2024) Ap2fl: Auditable privacy-preserving federated learning framework for electronics in healthcare. IEEE Trans Consum Electron 70(1):2527\u20132535. https:\/\/doi.org\/10.1109\/TCE.2023.3318509","journal-title":"IEEE Trans Consum Electron"},{"key":"2753_CR43","doi-asserted-by":"publisher","first-page":"9100","DOI":"10.1109\/TIFS.2024.3451359","volume":"19","author":"M Xutong","year":"2024","unstructured":"Xutong M, Cheng K, Liu T, Zhang T, Geng X, Shen Y (2024) Fedpta: Prior-based tensor approximation for detecting malicious clients in federated learning. IEEE Trans Inf Forensics Secur 19:9100\u20139114. https:\/\/doi.org\/10.1109\/TIFS.2024.3451359","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2753_CR44","doi-asserted-by":"crossref","unstructured":"Zhang Z, Cao X, Jia J, Gong NZ (2022) Fldetector: Defending federated learning against model poisoning attacks via detecting malicious clients. In Proceedings of the 28th ACM SIGKDD conference on knowledge discovery and data mining, pp 2545\u20132555","DOI":"10.1145\/3534678.3539231"},{"key":"2753_CR45","doi-asserted-by":"publisher","unstructured":"Kumar C, Ansari Md. SA (2024) An explainable nature-inspired cyber attack detection system in software-defined iot applications. Expert Syst Appl 250:123853, 2024. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S095741742400719X. https:\/\/doi.org\/10.1016\/j.eswa.2024.123853","DOI":"10.1016\/j.eswa.2024.123853"},{"key":"2753_CR46","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1109\/TIFS.2025.3539964","volume":"20","author":"M Xhemrishi","year":"2025","unstructured":"Xhemrishi M, \u00d6stman J, Wachter-Zeh A, Graell A, Amat I (2025) Fedgt: Identification of malicious clients in federated learning with secure aggregation. IEEE Trans Inf Forensics Secur 20:2577\u20132592. https:\/\/doi.org\/10.1109\/TIFS.2025.3539964","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2753_CR47","unstructured":"The\u00a0AI Blog. Elliptic envelope anomaly detection). https:\/\/aiblog.co.za\/technology\/elliptic-envelope-anomaly-detection"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02753-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02753-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02753-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T11:24:46Z","timestamp":1762514686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02753-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,28]]},"references-count":47,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["2753"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02753-3","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,28]]},"assertion":[{"value":"20 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors agreed with the content and gave explicit consent to submit and for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate and for publication"}}]}}