{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:41Z","timestamp":1765622501315,"version":"3.48.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Vingroup Innovation Foundation","award":["VINIF.2023.DA059"],"award-info":[{"award-number":["VINIF.2023.DA059"]}]},{"name":"Vingroup Innovation Foundation","award":["VINIF.2023.DA059"],"award-info":[{"award-number":["VINIF.2023.DA059"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s40860-025-00263-1","type":"journal-article","created":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T09:29:43Z","timestamp":1765013383000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Robust Federated Learning System Against Data Poisoning Attacks in IoT Networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Ly","family":"Vu","sequence":"first","affiliation":[]},{"given":"Tuan Phong","family":"Tran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,6]]},"reference":[{"key":"263_CR1","unstructured":"L\u00fctkebohle I (2022) The most vulnerable IoT devices: Think before you buy. https:\/\/tdwi.org\/articles\/2021\/11\/05\/most-vulnerable-iot-devices.aspx\/. [Online; accessed 20-Nov-2022]"},{"key":"263_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103320","volume":"132","author":"NS Shaji","year":"2023","unstructured":"Shaji NS, Jain T, Muthalagu R, Pawar PM (2023) Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networks. Computers & Security 132:103320. https:\/\/doi.org\/10.1016\/j.cose.2023.103320","journal-title":"Computers & Security"},{"key":"263_CR3","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jisa.2017.09.004","volume":"36","author":"KJ Singh","year":"2017","unstructured":"Singh KJ, De T (2017) Mlp-ga based algorithm to detect application layer ddos attack. Journal of Information Security and Applications 36:145\u2013153. https:\/\/doi.org\/10.1016\/j.jisa.2017.09.004","journal-title":"Journal of Information Security and Applications"},{"key":"263_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102725","volume":"118","author":"H Aydin","year":"2022","unstructured":"Aydin H, Orman Z, Aydin MA (2022) A long short-term memory (lstm)-based distributed denial of service (ddos) detection and defense system design in public cloud network environment. Computers & Security 118:102725. https:\/\/doi.org\/10.1016\/j.cose.2022.102725","journal-title":"Computers & Security"},{"issue":"8","key":"263_CR5","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1109\/TCYB.2018.2838668","volume":"49","author":"VL Cao","year":"2019","unstructured":"Cao VL, Nicolau M, McDermott J (2019) Learning neural representations for network anomaly detection. IEEE Transactions on Cybernetics 49(8):3074\u20133087. https:\/\/doi.org\/10.1109\/TCYB.2018.2838668","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"3","key":"263_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12\u201322. https:\/\/doi.org\/10.1109\/MPRV.2018.03367731","journal-title":"IEEE Pervasive Comput"},{"issue":"1","key":"263_CR7","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/TNSM.2021.3088326","volume":"19","author":"MA Salahuddin","year":"2022","unstructured":"Salahuddin MA, Pourahmadi V, Alameddine HA, Bari MF, Boutaba R (2022) Chronos: Ddos attack detection using time-based autoencoder. IEEE Trans Netw Serv Manage 19(1):627\u2013641. https:\/\/doi.org\/10.1109\/TNSM.2021.3088326","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"263_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102213","volume":"104","author":"P Luo","year":"2021","unstructured":"Luo P, Wang B, Li T, Tian J (2021) Ads-b anomaly data detection model based on vae-svdd. Computers & Security 104:102213. https:\/\/doi.org\/10.1016\/j.cose.2021.102213","journal-title":"Computers & Security"},{"key":"263_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103251","volume":"129","author":"S Aktar","year":"2023","unstructured":"Aktar S, Yasin Nur A (2023) Towards ddos attack detection using deep learning approach. Computers & Security 129:103251. https:\/\/doi.org\/10.1016\/j.cose.2023.103251","journal-title":"Computers & Security"},{"key":"263_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102907","volume":"122","author":"X Gu","year":"2022","unstructured":"Gu X, Tianqing Z, Li J, Zhang T, Ren W, Choo K-KR (2022) Privacy, accuracy, and model fairness trade-offs in federated learning. Computers & Security 122:102907. https:\/\/doi.org\/10.1016\/j.cose.2022.102907","journal-title":"Computers & Security"},{"issue":"13","key":"263_CR11","doi-asserted-by":"publisher","first-page":"11365","DOI":"10.1109\/JIOT.2021.3128646","volume":"9","author":"G Sun","year":"2022","unstructured":"Sun G, Cong Y, Dong J, Wang Q, Lyu L, Liu J (2022) Data poisoning attacks on federated machine learning. IEEE Internet Things J 9(13):11365\u201311375. https:\/\/doi.org\/10.1109\/JIOT.2021.3128646","journal-title":"IEEE Internet Things J"},{"key":"263_CR12","doi-asserted-by":"publisher","unstructured":"Zhang T, He C, Ma T, Gao L, Ma M, Avestimehr S (2021) Federated learning for internet of things. Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems. SenSys \u201921, pp. 413\u2013419. Association for Computing Machinery, New York, NY, USA . https:\/\/doi.org\/10.1145\/3485730.3493444","DOI":"10.1145\/3485730.3493444"},{"key":"263_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103881","volume":"142","author":"X Chen","year":"2024","unstructured":"Chen X, Qiu W, Chen L, Ma Y, Ma J (2024) Fast and practical intrusion detection system based on federated learning for vanet. Computers & Security 142:103881. https:\/\/doi.org\/10.1016\/j.cose.2024.103881","journal-title":"Computers & Security"},{"key":"263_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103707","volume":"139","author":"TET Djaidja","year":"2024","unstructured":"Djaidja TET, Brik B, Boualouache A, Senouci SM, Ghamri-Doudane Y (2024) Federated learning for 5g and beyond, a blessing and a curse- an experimental study on intrusion detection systems. Computers & Security 139:103707. https:\/\/doi.org\/10.1016\/j.cose.2024.103707","journal-title":"Computers & Security"},{"issue":"8","key":"263_CR15","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2021","unstructured":"Li B, Wu Y, Song J, Lu R, Li T, Zhao L (2021) Deepfed: Federated deep learning for intrusion detection in industrial cyber\u2013physical systems. IEEE Trans Industr Inf 17(8):5615\u20135624. https:\/\/doi.org\/10.1109\/TII.2020.3023430","journal-title":"IEEE Trans Industr Inf"},{"key":"263_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103910","volume":"143","author":"J-M Shao","year":"2024","unstructured":"Shao J-M, Zeng G-Q, Lu K-D, Geng G-G, Weng J (2024) Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search. Computers & Security 143:103910. https:\/\/doi.org\/10.1016\/j.cose.2024.103910","journal-title":"Computers & Security"},{"issue":"8","key":"263_CR17","doi-asserted-by":"publisher","first-page":"6348","DOI":"10.1109\/JIOT.2020.3011726","volume":"8","author":"Y Liu","year":"2021","unstructured":"Liu Y, Garg S, Nie J, Zhang Y, Xiong Z, Kang J, Hossain MS (2021) Deep anomaly detection for time-series data in industrial iot: A communication-efficient on-device federated learning approach. IEEE Internet Things J 8(8):6348\u20136358. https:\/\/doi.org\/10.1109\/JIOT.2020.3011726","journal-title":"IEEE Internet Things J"},{"key":"263_CR18","doi-asserted-by":"publisher","unstructured":"Guddeti RMR, Mohan BR (2025) Federated learning approach for human activity recognition in online examination environment. Multimedia Tools and Applications 84 https:\/\/doi.org\/10.1007\/s11042-025-20815-0","DOI":"10.1007\/s11042-025-20815-0"},{"key":"263_CR19","doi-asserted-by":"publisher","first-page":"10708","DOI":"10.1109\/ACCESS.2023.3238823","volume":"11","author":"G Xia","year":"2023","unstructured":"Xia G, Chen J, Yu C, Ma J (2023) Poisoning attacks in federated learning: A survey. IEEE Access 11:10708\u201310722. https:\/\/doi.org\/10.1109\/ACCESS.2023.3238823","journal-title":"IEEE Access"},{"key":"263_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103270","volume":"130","author":"P Gupta","year":"2023","unstructured":"Gupta P, Yadav K, Gupta BB, Alazab M, Gadekallu TR (2023) A novel data poisoning attack in federated learning based on inverted loss function. Computers & Security 130:103270. https:\/\/doi.org\/10.1016\/j.cose.2023.103270","journal-title":"Computers & Security"},{"key":"263_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103205","volume":"129","author":"Y-C Lai","year":"2023","unstructured":"Lai Y-C, Lin J-Y, Lin Y-D, Hwang R-H, Lin P-C, Wu H-K, Chen C-K (2023) Two-phase defense against poisoning attacks on federated learning-based intrusion detection. Computers & Security 129:103205. https:\/\/doi.org\/10.1016\/j.cose.2023.103205","journal-title":"Computers & Security"},{"key":"263_CR22","doi-asserted-by":"publisher","unstructured":"Arora P, Khullar V, Kansal I, Kumar R, Popli R (2024) Privacy-preserving federated learning system (f-ppls) for military focused area classification. Multimedia Tools and Applications, 1\u201327 https:\/\/doi.org\/10.1007\/s11042-024-19358-7","DOI":"10.1007\/s11042-024-19358-7"},{"key":"263_CR23","unstructured":"Blanchard P, El\u00a0Mhamdi EM, Guerraoui R, Stainer J (2017) Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in neural information processing systems 30"},{"key":"263_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.126354","volume":"270","author":"T Wang","year":"2025","unstructured":"Wang T, Zheng Z, Lin F (2025) Federated learning framework based on trimmed mean aggregation rules. Expert Systems with Applications 270:126354. https:\/\/doi.org\/10.1016\/j.eswa.2024.126354","journal-title":"Expert Systems with Applications"},{"key":"263_CR25","unstructured":"Fung C, Yoon CJ, Beschastnikh I (2018) Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866"},{"key":"263_CR26","doi-asserted-by":"crossref","unstructured":"Cao X, Fang M, Liu J, Gong NZ (2020) Fltrust: Byzantine-robust federated learning via trust bootstrapping. arXiv preprint arXiv:2012.13995","DOI":"10.14722\/ndss.2021.24434"},{"key":"263_CR27","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep Learning. MIT Press. http:\/\/www.deeplearningbook.org"},{"issue":"15","key":"263_CR28","doi-asserted-by":"publisher","first-page":"12106","DOI":"10.1109\/JIOT.2021.3060764","volume":"8","author":"L Zhu","year":"2021","unstructured":"Zhu L, Tang X, Shen M, Gao F, Zhang J, Du X (2021) Privacy-preserving machine learning training in iot aggregation scenarios. IEEE Internet Things J 8(15):12106\u201312118. https:\/\/doi.org\/10.1109\/JIOT.2021.3060764","journal-title":"IEEE Internet Things J"},{"key":"263_CR29","doi-asserted-by":"publisher","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 909\u2013910 . https:\/\/doi.org\/10.1109\/ALLERTON.2015.7447103","DOI":"10.1109\/ALLERTON.2015.7447103"},{"issue":"1","key":"263_CR30","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TSMC.2020.2968516","volume":"52","author":"C Yin","year":"2022","unstructured":"Yin C, Zhang S, Wang J, Xiong NN (2022) Anomaly detection based on convolutional recurrent autoencoder for iot time series. IEEE Transactions on Systems Man and Cybernetics Systems 52(1):112\u2013122. https:\/\/doi.org\/10.1109\/TSMC.2020.2968516","journal-title":"IEEE Transactions on Systems Man and Cybernetics Systems"},{"key":"263_CR31","doi-asserted-by":"publisher","first-page":"30387","DOI":"10.1109\/ACCESS.2020.2973023","volume":"8","author":"R-H Hwang","year":"2020","unstructured":"Hwang R-H, Peng M-C, Huang C-W, Lin P-C, Nguyen V-L (2020) An unsupervised deep learning model for early network traffic anomaly detection. IEEE Access 8:30387\u201330399. https:\/\/doi.org\/10.1109\/ACCESS.2020.2973023","journal-title":"IEEE Access"},{"key":"263_CR32","doi-asserted-by":"publisher","unstructured":"Vu L, Cao VL, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewic, E (2020) Learning latent representation for iot anomaly detection. IEEE Transactions on Cybernetics, 1\u201314 . https:\/\/doi.org\/10.1109\/TCYB.2020.3013416","DOI":"10.1109\/TCYB.2020.3013416"},{"key":"263_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109805","volume":"143","author":"D Novoa-Paradela","year":"2023","unstructured":"Novoa-Paradela D, Fontenla-Romero O, Guijarro-Berdi\u00f1as B (2023) Fast deep autoencoder for federated learning. Pattern Recognition 143:109805. https:\/\/doi.org\/10.1016\/j.patcog.2023.109805","journal-title":"Pattern Recognition"},{"key":"263_CR34","doi-asserted-by":"publisher","unstructured":"Doku R, Rawat DB (2021) Mitigating data poisoning attacks on a federated learning-edge computing network. 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), pp. 1\u20136 . https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369581","DOI":"10.1109\/CCNC49032.2021.9369581"},{"key":"263_CR35","doi-asserted-by":"crossref","unstructured":"Cao D, Chang S, Lin Z, Liu G, Sun D (2019) Understanding distributed poisoning attack in federated learning. 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), pp. 233\u2013239 . IEEE","DOI":"10.1109\/ICPADS47876.2019.00042"},{"issue":"5","key":"263_CR36","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.1109\/JIOT.2020.3023126","volume":"8","author":"J Zhang","year":"2021","unstructured":"Zhang J, Chen B, Cheng X, Binh HTT, Yu S (2021) Poisongan: Generative poisoning attacks against federated learning in edge computing systems. IEEE Internet Things J 8(5):3310\u20133322. https:\/\/doi.org\/10.1109\/JIOT.2020.3023126","journal-title":"IEEE Internet Things J"},{"key":"263_CR37","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116","journal-title":"ICISSp"},{"key":"263_CR38","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"263_CR39","unstructured":"Dua D, Graff C (2017) UCI Machine Learning Repository . http:\/\/archive.ics.uci.edu\/ml"},{"key":"263_CR40","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S Garc\u00eda","year":"2014","unstructured":"Garc\u00eda S, Grill M, Stiborek J, Zunino A (2014) An empirical comparison of botnet detection methods. Computers & Security 45:100\u2013123. https:\/\/doi.org\/10.1016\/j.cose.2014.05.011","journal-title":"Computers & Security"},{"key":"263_CR41","unstructured":"Classification: ROC Curve and AUC. https:\/\/developers.google.com\/machine-learning\/crash-course\/classification\/roc-and-auc. [Online; accessed 28-Nov-2022] (2022)"},{"issue":"4","key":"263_CR42","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1561\/2200000056","volume":"12","author":"DP Kingma","year":"2019","unstructured":"Kingma DP, Welling M et al (2019) An introduction to variational autoencoders. Foundations and Trends\u00ae in Machine Learning 12(4):307\u2013392","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"key":"263_CR43","doi-asserted-by":"crossref","unstructured":"Cao VL, Nicolau M, McDermott J (2016) A hybrid autoencoder and density estimation model for anomaly detection. PPSN, pp. 717\u2013726","DOI":"10.1007\/978-3-319-45823-6_67"},{"key":"263_CR44","unstructured":"Glorot X, Bengio Y(2010) Understanding the difficulty of training deep feedforward neural networks. AISTATS"},{"key":"263_CR45","unstructured":"Kingma DP, Ba J (2015) Adam: A method for stochastic optimization. CoRR abs\/1412.6980"},{"key":"263_CR46","unstructured":"Pytorch framework. https:\/\/pytorch.org. [Online; accessed 10-Jan-2022] (2022)"},{"key":"263_CR47","unstructured":"Scikit-learn framework. https:\/\/scikit-learn.org\/stable\/. [Online; accessed 10-Jan-2022] (2022)"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00263-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-025-00263-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00263-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:20Z","timestamp":1765622240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-025-00263-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["263"],"URL":"https:\/\/doi.org\/10.1007\/s40860-025-00263-1","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"14 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Springer journals and proceedings:","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Editorial Policies for"}}],"article-number":"22"}}