{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:41:16Z","timestamp":1759333276862,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-01820-2","type":"journal-article","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T13:01:35Z","timestamp":1687006895000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Gaussian Differential Privacy Integrated Machine Learning Model for Industrial Internet of Things"],"prefix":"10.1007","volume":"4","author":[{"given":"Arokia Jesu Prabhu","family":"Lazar","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Sivaprakash","family":"Soundararaj","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Vijaya Krishna","family":"Sonthi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Vishnu Raja","family":"Palanisamy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Vanithamani","family":"Subramaniyan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4901-1432","authenticated-orcid":false,"given":"Sudhakar","family":"Sengan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"1820_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2019.119869","volume":"252","author":"M Ghobakhloo","year":"2020","unstructured":"Ghobakhloo M. Industry 4.0, digitization, and opportunities for sustainability. J Clean Prod. 2020;252: 119869.","journal-title":"J Clean Prod"},{"key":"1820_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2019.107546","volume":"224","author":"A Raj","year":"2020","unstructured":"Raj A, Dwivedi G, Sharma A, de Sousa Jabbour ABL, Rajak S. Barriers to the adoption of industry 4.0 technologies in the manufacturing sector: an inter-country comparative perspective. Int J Prod Econ. 2020;224: 107546.","journal-title":"Int J Prod Econ"},{"key":"1820_CR3","doi-asserted-by":"publisher","first-page":"2213","DOI":"10.1108\/BIJ-09-2018-0284","volume":"27","author":"M Sony","year":"2019","unstructured":"Sony M, Naik S. Key ingredients for evaluating Industry 4.0 readiness for organizations: a literature review. Benchmarking. 2019;27:2213\u201332.","journal-title":"Benchmarking"},{"issue":"1","key":"1820_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/bs.adcom.2019.10.007","volume":"117","author":"P Ambika","year":"2020","unstructured":"Ambika P. Machine learning and deep learning algorithms on the industrial internet of things (IIoT). Adv Comput. 2020;117(1):321\u201338.","journal-title":"Adv Comput"},{"issue":"11","key":"1820_CR5","doi-asserted-by":"publisher","first-page":"7771","DOI":"10.1109\/TII.2021.3069470","volume":"17","author":"B Pu","year":"2021","unstructured":"Pu B, Li K, Li S, Zhu N. Automatic fetal ultrasound standard plane recognition based on deep learning and IIoT. IEEE Trans Ind Inf. 2021;17(11):7771\u201380.","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"1820_CR6","doi-asserted-by":"publisher","first-page":"2821","DOI":"10.1109\/JIOT.2021.3098980","volume":"10","author":"N Bugshan","year":"2023","unstructured":"Bugshan N, IKhalil I, Moustafa N, Rahman MS. Privacy-preserving microservices in industrial internet-of-things-driven smart applications. IEEE Internet Things J. 2023;10(4):2821\u201331. https:\/\/doi.org\/10.1109\/JIOT.2021.3098980.","journal-title":"IEEE Internet Things J"},{"key":"1820_CR7","doi-asserted-by":"publisher","first-page":"8927830","DOI":"10.1155\/2022\/8927830","volume":"2022","author":"K Lakshmanna","year":"2022","unstructured":"Lakshmanna K, Kavitha R, Geetha BT, Kumar AN, Radhakrishnan A, Kohar R. Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment. Comput Intell Neurosci. 2022;2022:8927830. https:\/\/doi.org\/10.1155\/2022\/8927830.","journal-title":"Comput Intell Neurosci."},{"issue":"6","key":"1820_CR8","doi-asserted-by":"publisher","first-page":"4119","DOI":"10.1109\/TII.2020.2966068","volume":"16","author":"KKR Choo","year":"2020","unstructured":"Choo KKR, Yan Z, Meng W. Blockchain in industrial IoT applications: security and privacy advances, challenges, and opportunities. IEEE Trans Ind Inf. 2020;16(6):4119\u201321.","journal-title":"IEEE Trans Ind Inf"},{"key":"1820_CR9","doi-asserted-by":"crossref","unstructured":"Puri V, Priyadarshini I, Kumar R, Kim LC. Blockchain meets IIoT: an architecture for privacy preservation and security in IIoT. In: 2020 international conference on computer science, engineering and applications (ICCSEA). IEEE; 2020. p. 1\u20137.","DOI":"10.1109\/ICCSEA49143.2020.9132860"},{"issue":"6","key":"1820_CR10","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/TII.2021.3085960","volume":"18","author":"B Jia","year":"2021","unstructured":"Jia B, Zhang X, Liu J, Zhang Y, Huang K, Liang Y. Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Trans Ind Inf. 2021;18(6):4049\u201358.","journal-title":"IEEE Trans Ind Inf"},{"issue":"6","key":"1820_CR11","doi-asserted-by":"publisher","first-page":"4156","DOI":"10.1109\/TII.2019.2948094","volume":"16","author":"K Gai","year":"2019","unstructured":"Gai K, Wu Y, Zhu L, Zhang Z, Qiu M. Differential privacy-based blockchain for industrial internet-of-things. IEEE Trans Ind Inf. 2019;16(6):4156\u201365.","journal-title":"IEEE Trans Ind Inf"},{"issue":"6","key":"1820_CR12","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Y Lu","year":"2019","unstructured":"Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Ind Inf. 2019;16(6):4177\u201386.","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"1820_CR13","volume":"32","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R. DBTP2SF: a deep blockchain-based trustworthy privacy-preserving secured framework in industrial Internet of things systems. Trans Emerg Telecommun Technol. 2021;32(4): e4222.","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"2020","key":"1820_CR14","doi-asserted-by":"publisher","first-page":"152351","DOI":"10.1109\/ACCESS.2020.3016937","volume":"8","author":"T Gebremichael","year":"2020","unstructured":"Gebremichael T, et al. Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access. 2020;8(2020):152351\u201366.","journal-title":"IEEE Access"},{"key":"1820_CR15","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L. Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM; 2016. p. 308\u2013318.","DOI":"10.1145\/2976749.2978318"},{"key":"1820_CR16","doi-asserted-by":"publisher","unstructured":"Oyekanlu E. Osmotic collaborative computing for machine learning and cybersecurity applications in industrial IoT networks and cyber physical systems with Gaussian mixture models. In: 2018 IEEE 4th international conference on collaboration and internet computing (CIC), Philadelphia. 2018. p. 326\u2013335. https:\/\/doi.org\/10.1109\/CIC.2018.00051.","DOI":"10.1109\/CIC.2018.00051"},{"key":"1820_CR17","doi-asserted-by":"publisher","unstructured":"Wang Z. Research on industrial internet platform technology based on machine learning algorithm. In: 2022 4th international conference on communications, information system and computer engineering (CISCE), Shenzhen. 2022. p. 390\u2013396. https:\/\/doi.org\/10.1109\/CISCE55963.2022.9851027.","DOI":"10.1109\/CISCE55963.2022.9851027"},{"key":"1820_CR18","doi-asserted-by":"publisher","unstructured":"Chen B, Wan J. Emerging trends of ML-based intelligent services for industrial internet of things (IIoT). In: 2019 computing, communications and IoT applications (ComComAp), Shenzhen. 2019. p. 135\u2013139.https:\/\/doi.org\/10.1109\/ComComAp46287.2019.9018815.","DOI":"10.1109\/ComComAp46287.2019.9018815"},{"issue":"15","key":"1820_CR19","doi-asserted-by":"publisher","first-page":"12163","DOI":"10.1109\/JIOT.2021.3062482","volume":"8","author":"X Liu","year":"2021","unstructured":"Liu X, Yu W, Liang F, Griffith D, Golmie N. Toward deep transfer learning in industrial internet of things. IEEE Internet Things J. 2021;8(15):12163\u201375. https:\/\/doi.org\/10.1109\/JIOT.2021.3062482.","journal-title":"IEEE Internet Things J"},{"key":"1820_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s42979-022-01566-3","volume":"4","author":"S Elhag","year":"2023","unstructured":"Elhag S, Alghamdi AM, Al-Shomrani NA. Toward an improved security performance of industrial internet of things systems. SN Comput Sci. 2023;4:131. https:\/\/doi.org\/10.1007\/s42979-022-01566-3.","journal-title":"SN Comput Sci"},{"key":"1820_CR21","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s42979-020-00201-3","volume":"1","author":"A Jurcut","year":"2020","unstructured":"Jurcut A, Niculcea T, Ranaweera P, et al. Security considerations for internet of things: a survey. SN Comput Sci. 2020;1:193. https:\/\/doi.org\/10.1007\/s42979-020-00201-3.","journal-title":"SN Comput Sci"},{"key":"1820_CR22","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s42979-022-01110-3","volume":"3","author":"T Zsch\u00f6rnig","year":"2022","unstructured":"Zsch\u00f6rnig T, Windolph J, Wehlitz R, et al. A fog-based multi-purpose internet of things analytics platform. SN Comput Sci. 2022;3:213. https:\/\/doi.org\/10.1007\/s42979-022-01110-3.","journal-title":"SN Comput Sci"},{"key":"1820_CR23","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s42979-022-01065-5","volume":"3","author":"A Tchagna Kouanou","year":"2022","unstructured":"Tchagna Kouanou A, Tchito Tchapga C, Sone Ekonde M, et al. Securing data in an internet of things network using blockchain technology: smart home case. SN Comput Sci. 2022;3:167. https:\/\/doi.org\/10.1007\/s42979-022-01065-5.","journal-title":"SN Comput Sci"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01820-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-01820-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01820-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T13:09:45Z","timestamp":1687007385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-01820-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":23,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["1820"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-01820-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"23 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"454"}}