{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:48:36Z","timestamp":1773888516682,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s44443-025-00153-9","type":"journal-article","created":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:07:22Z","timestamp":1755853642000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["FedAware: a distributed IoT intrusion detection method based on fractal shrinking autoencoder"],"prefix":"10.1007","volume":"37","author":[{"given":"Keyuan","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Meifang","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1943-9094","authenticated-orcid":false,"given":"Feng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,22]]},"reference":[{"issue":"15","key":"153_CR1","doi-asserted-by":"publisher","first-page":"12251","DOI":"10.1109\/JIOT.2021.3060878","volume":"8","author":"M Abdel-Basset","year":"2021","unstructured":"Abdel-Basset M, Hawash H, Chakrabortty RK, Ryan MJ (2021) Semi-supervised spatiotemporal deep learning for intrusions detection in IoT networks. IEEE Internet Things J 8(15):12251\u201312265","journal-title":"IEEE Internet Things J"},{"key":"153_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jnca.2017.08.017","volume":"97","author":"M Alaa","year":"2017","unstructured":"Alaa M, Zaidan AA, Zaidan BB, Talal M, Kiah MLM (2017) A review of smart home applications based on Internet of Things. J Netw Comput Appl 97:48\u201365","journal-title":"J Netw Comput Appl"},{"issue":"19","key":"153_CR3","doi-asserted-by":"publisher","first-page":"13877","DOI":"10.1007\/s00500-023-09042-7","volume":"27","author":"A Aljarf","year":"2023","unstructured":"Aljarf A, Zamzami H, Gutub A (2023) Integrating machine learning and features extraction for practical reliable color images steganalysis classification. Soft Comput 27(19):13877\u201313888","journal-title":"Soft Comput"},{"issue":"2","key":"153_CR4","doi-asserted-by":"publisher","first-page":"4579","DOI":"10.1007\/s11042-023-15682-6","volume":"83","author":"A Aljarf","year":"2024","unstructured":"Aljarf A, Zamzami H, Gutub A (2024) Is blind image steganalysis practical using feature-based classification? Multimed Tool Appl 83(2):4579\u20134612","journal-title":"Multimed Tool Appl"},{"issue":"7","key":"153_CR5","doi-asserted-by":"publisher","first-page":"9438","DOI":"10.1007\/s11227-021-04285-3","volume":"78","author":"AS Alqahtani","year":"2022","unstructured":"Alqahtani AS (2022) RETRACTED ARTICLE: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. J Supercomput 78(7):9438\u20139455","journal-title":"J Supercomput"},{"key":"153_CR6","doi-asserted-by":"crossref","unstructured":"Altalhi S, Gutub A (2021) A survey on predictions of cyber-attacks utilizing real-time Twitter tracing recognition. J Amb Intell Hum Comput 1\u201313","DOI":"10.1007\/s12652-020-02789-z"},{"key":"153_CR7","doi-asserted-by":"crossref","unstructured":"Arasteh H, Hosseinnezhad V, Loia V, Tommasetti A, Troisi O, Shafie-Khah M, Siano P (2016) IoT-based smart cities: a survey. In: 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC). IEEE, pp 1\u20136","DOI":"10.1109\/EEEIC.2016.7555867"},{"key":"153_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ins.2022.03.065","volume":"598","author":"A Basati","year":"2022","unstructured":"Basati A, Faghih MM (2022) PDAE: efficient network intrusion detection in IoT using parallel deep auto-encoders. Inf Sci 598:57\u201374","journal-title":"Inf Sci"},{"key":"153_CR9","doi-asserted-by":"crossref","unstructured":"Beuran R et al (2025) FedMSE: semi-supervised federated learning approach for IoT network intrusion detection. Comput Security 104337","DOI":"10.1016\/j.cose.2025.104337"},{"key":"153_CR10","doi-asserted-by":"crossref","unstructured":"Cetin B, Lazar A, Kim J, Sim A, Wu K (2019) Federated wireless network intrusion detection. In: 2019 IEEE international conference on big data (big data). IEEE, pp 6004\u20136006","DOI":"10.1109\/BigData47090.2019.9005507"},{"key":"153_CR11","doi-asserted-by":"crossref","unstructured":"Cholakoska A, Pfitzner B, Gjoreski H, Rakovic V, Arnrich B, Kalendar M (2021) Differentially private federated learning for anomaly detection in ehealth networks. In: Adjunct proceedings of the 2021 ACM international joint conference on pervasive and ubiquitous computing and proceedings of the 2021 ACM international symposium on wearable computers. pp 514\u2013518","DOI":"10.1145\/3460418.3479365"},{"issue":"7","key":"153_CR12","first-page":"11","volume":"16","author":"N Farooqi","year":"2019","unstructured":"Farooqi N, Gutub A, Khozium MO (2019) Smart community challenges: enabling IoT\/M2M technology case study. Life Sci J 16(7):11\u201317","journal-title":"Life Sci J"},{"issue":"5","key":"153_CR13","first-page":"3810","volume":"5","author":"A Gatouillat","year":"2018","unstructured":"Gatouillat A, Badr Y, Massot B, Sejdi\u0107 E (2018) Internet of medical things: a review of recent contributions dealing with cyber-physical systems in medicine. IEEE Int Things J 5(5):3810\u20133822","journal-title":"IEEE Int Things J"},{"issue":"1","key":"153_CR14","doi-asserted-by":"publisher","first-page":"100001","DOI":"10.1016\/j.jer.2023.100001","volume":"11","author":"A Gutub","year":"2023","unstructured":"Gutub A, Shambour MK, Abu-Hashem MA (2023) Coronavirus impact on human feelings during 2021 Hajj season via deep learning critical Twitter analysis. J Eng Res 11(1):100001","journal-title":"J Eng Res"},{"key":"153_CR15","first-page":"103541","volume":"76","author":"J Hemalatha","year":"2023","unstructured":"Hemalatha J, Sekar M, Kumar C, Gutub A, Sahu AK (2023) Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. J Inf Sec Appl 76:103541","journal-title":"J Inf Sec Appl"},{"key":"153_CR16","doi-asserted-by":"publisher","first-page":"103509","DOI":"10.1016\/j.compind.2021.103509","volume":"132","author":"TT Huong","year":"2021","unstructured":"Huong TT, Bac TP, Long DM, Luong TD, Dan NM, Quang LA, Cong LT, Thang BD, Tran KP (2021) Detecting cyberattacks using anomaly detection in industrial control systems: a federated learning approach. Comput Ind 132:103509","journal-title":"Comput Ind"},{"key":"153_CR17","doi-asserted-by":"publisher","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","volume":"7","author":"FA Khan","year":"2019","unstructured":"Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373\u201330385","journal-title":"IEEE Access"},{"issue":"1","key":"153_CR18","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1186\/s40537-021-00448-4","volume":"8","author":"F Laghrissi","year":"2021","unstructured":"Laghrissi F, Douzi S, Douzi K, Hssina B (2021) Intrusion detection systems using long short-term memory (LSTM). J Big Data 8(1):65","journal-title":"J Big Data"},{"key":"153_CR19","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. Artif Intell Stat 1273\u20131282"},{"key":"153_CR20","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR, pp 1273\u20131282"},{"issue":"3","key":"153_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12\u201322","journal-title":"IEEE Pervasive Comput"},{"key":"153_CR22","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri V, Parizi RM, Pouriyeh S, Huang Y, Dehghantanha A, Srivastava G (2021) A survey on security and privacy of federated learning. Futur Gener Comput Syst 115:619\u2013640","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"153_CR23","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1109\/JIOT.2020.3041184","volume":"10","author":"G Muhammad","year":"2020","unstructured":"Muhammad G, Hossain MS, Garg S (2020) Stacked autoencoder-based intrusion detection system to combat financial fraudulent. IEEE Internet Things J 10(3):2071\u20132078","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"153_CR24","doi-asserted-by":"publisher","first-page":"432","DOI":"10.3390\/s22020432","volume":"22","author":"X-H Nguyen","year":"2022","unstructured":"Nguyen X-H, Nguyen X-D, Huynh H-H, Le K-H (2022) Realguard: a lightweight network intrusion detection system for IoT gateways. Sensors 22(2):432","journal-title":"Sensors"},{"key":"153_CR25","doi-asserted-by":"crossref","unstructured":"Qin Y and Kondo M (2021) Federated learning-based network intrusion detection with a feature selection approach. In: 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE). IEEE, pp 1\u20136","DOI":"10.1109\/ICECCE52056.2021.9514222"},{"key":"153_CR26","doi-asserted-by":"crossref","unstructured":"Qiu K, Zhang Y, Zhao J, Zhang S, Wang Q, Chen F (2024a) A multimodal sentiment analysis approach based on a joint chained interactive attention mechanism. Electronics 13(10):1922","DOI":"10.3390\/electronics13101922"},{"key":"153_CR27","doi-asserted-by":"crossref","unstructured":"Qiu K, Zhang Y, Ren Z, Li M, Wang Q, Feng Y, Chen F (2024a) SpemNet: a cotton disease and pest identification method based on efficient multi-scale attention and stacking patch embedding. Insects 15(9):667","DOI":"10.3390\/insects15090667"},{"key":"153_CR28","first-page":"1","volume":"1","author":"K Qiu","year":"2025","unstructured":"Qiu K, Zhang Y, Chen F (2025) MSM: point cloud alignment algorithm through multi-scale feature fusion and cross-attention mechanism. Intel Serv Robot 1:1\u201317","journal-title":"Intel Serv Robot"},{"issue":"2","key":"153_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-025-09912-5","volume":"33","author":"K Qiu","year":"2025","unstructured":"Qiu K, Zhang Y, Feng Y, Chen F (2025) LogAnomEX: an unsupervised log anomaly detection method based on Electra-DP and gated bilinear neural networks. J Netw Syst Manage 33(2):1\u201329","journal-title":"J Netw Syst Manage"},{"issue":"9","key":"153_CR30","doi-asserted-by":"publisher","first-page":"9768","DOI":"10.1007\/s10489-021-02968-1","volume":"52","author":"M Rashid","year":"2022","unstructured":"Rashid M, Kamruzzaman J, Imam T, Wibowo S, Gordon S (2022) A tree-based stacking ensemble technique with feature selection for network intrusion detection. Appl Intell 52(9):9768\u20139781","journal-title":"Appl Intell"},{"issue":"1","key":"153_CR31","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1049\/cit2.12081","volume":"8","author":"PK Roy","year":"2023","unstructured":"Roy PK, Saumya S, Singh JP, Banerjee S, Gutub A (2023) Analysis of community question-answering issues via machine learning and deep learning: state-of-the-art review. CAAI Trans Intell Technol 8(1):95\u2013117","journal-title":"CAAI Trans Intell Technol"},{"issue":"2","key":"153_CR32","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MITP.2020.2992710","volume":"23","author":"T Saba","year":"2021","unstructured":"Saba T, Sadad T, Rehman A, Mehmood Z, Javaid Q (2021) Intrusion detection system through advance machine learning for the internet of things networks. IT Professional 23(2):58\u201364","journal-title":"IT Professional"},{"issue":"1","key":"153_CR33","doi-asserted-by":"publisher","first-page":"57","DOI":"10.32604\/csse.2023.034277","volume":"46","author":"M Sabir","year":"2023","unstructured":"Sabir M, Ahmad J, Alghazzawi DM (2023) A lightweight deep autoencoder scheme for cyberattack detection in the Internet of Things. Comput Syst Sci Eng 46(1):57\u201372","journal-title":"Comput Syst Sci Eng"},{"key":"153_CR34","doi-asserted-by":"crossref","unstructured":"Sarwar A, Hasan S, Khan W U, Ahmed S, Marwat SNK (2022) Design of an advance intrusion detection system for IoT networks. In: 2022 2nd International Conference on Artificial Intelligence (ICAI). IEEE, pp 46\u201351","DOI":"10.1109\/ICAI55435.2022.9773747"},{"issue":"1","key":"153_CR35","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Topics Comput Intell 2(1):41\u201350","journal-title":"IEEE Trans Emerg Topics Comput Intell"},{"issue":"8","key":"153_CR36","doi-asserted-by":"publisher","first-page":"9801","DOI":"10.1007\/s13369-021-06348-2","volume":"47","author":"A Singh","year":"2022","unstructured":"Singh A, Satapathy SC, Roy A, Gutub A (2022) AI-based mobile edge computing for IoT: applications, challenges, and future scope. Arab J Sci Eng 47(8):9801\u20139831","journal-title":"Arab J Sci Eng"},{"issue":"14","key":"153_CR37","doi-asserted-by":"publisher","first-page":"21243","DOI":"10.1007\/s11042-022-14006-4","volume":"82","author":"A Singh","year":"2023","unstructured":"Singh A, Gutub A, Nayyar A, Khan MK (2023) Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multimed Tools Appl 82(14):21243\u201321277","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"153_CR38","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Industr Inf 14(11):4724\u20134734","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"153_CR39","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1007\/s13369-022-07250-1","volume":"48","author":"FK Sufi","year":"2023","unstructured":"Sufi FK, Alsulami M, Gutub A (2023) Automating global threat-maps generation via advancements of news sensors and AI. Arab J Sci Eng 48(2):2455\u20132472","journal-title":"Arab J Sci Eng"},{"key":"153_CR40","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DMJ Tax","year":"2004","unstructured":"Tax DMJ, Duin RPW (2004) Support vector data description. Mach Learn 54:45\u201366","journal-title":"Mach Learn"},{"key":"153_CR41","doi-asserted-by":"crossref","unstructured":"Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial Internet of\u00a0Things based on deep reinforcement learning. Wirel Commun Mob Comput 2022(1):9023719","DOI":"10.1155\/2022\/9023719"},{"key":"153_CR42","doi-asserted-by":"publisher","first-page":"122045","DOI":"10.1016\/j.eswa.2023.122045","volume":"238","author":"Z Wang","year":"2024","unstructured":"Wang Z, Li J, Yang S, Luo X, Li D, Mahmoodi S (2024) A lightweight IoT intrusion detection model based on improved BERT-of-Theseus. Expert Syst Appl 238:122045","journal-title":"Expert Syst Appl"},{"issue":"12","key":"153_CR43","first-page":"10370","volume":"35","author":"X Wu","year":"2021","unstructured":"Wu X, Cheng Q (2021) Fractal autoencoders for feature selection. Proc AAAI Conf Artif Intell 35(12):10370\u201310378","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"1","key":"153_CR44","first-page":"106","volume":"45","author":"H Wu","year":"2024","unstructured":"Wu H, He J, Lu Y (2024) Research on distributed network intrusion detection system for IoT based on honeyfarm. J Commun 45(1):106\u2013118","journal-title":"J Commun"},{"issue":"8","key":"153_CR45","doi-asserted-by":"publisher","first-page":"4141","DOI":"10.3390\/s23084141","volume":"23","author":"W Yao","year":"2023","unstructured":"Yao W, Hu L, Hou Y, Li X (2023) A lightweight intelligent network intrusion detection system using one-class autoencoder and ensemble learning for IoT. Sensors 23(8):4141","journal-title":"Sensors"},{"issue":"01","key":"153_CR46","first-page":"49","volume":"7","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Liu F, Ge Y, Li S, Zhang Y, Xiong K (2023) An intrusion detection method based on depthwise separable convolution and attention mechanism. Chin J Int Things 7(01):49\u201359","journal-title":"Chin J Int Things"},{"key":"153_CR47","doi-asserted-by":"crossref","unstructured":"Zhao R, Yang L, Wang Y, Xue Z, Gui G, Ohtsuki T (2022) A semi-supervised federated learning scheme via knowledge distillation for intrusion detection. In: Proceedings of the IEEE International Conference on Communications (ICC). pp 2688\u20132693","DOI":"10.1109\/ICC45855.2022.9838256"},{"key":"153_CR48","doi-asserted-by":"publisher","first-page":"111857","DOI":"10.1016\/j.knosys.2024.111857","volume":"295","author":"Y Zhu","year":"2024","unstructured":"Zhu Y, Dong J, Xie L, Wang Z, Qin S, Xu P, Yin M (2024) Recurrent multi-view collaborative registration network for 3D reconstruction and optical measurement of blade profiles. Knowl-Based Syst 295:111857","journal-title":"Knowl-Based Syst"},{"key":"153_CR49","doi-asserted-by":"crossref","unstructured":"Zhu Y, Xie L, Wang Z, Xu P, Sun J, Zheng F, Bai Q, Yin M (2025) 3-D reconstruction and optical measurement of blade profiles via multiview fine registration based on self-supervised simultaneous optimization. IEEE Trans Ind Inform","DOI":"10.1109\/TII.2025.3567404"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00153-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00153-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00153-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T12:46:02Z","timestamp":1758113162000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00153-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,22]]},"references-count":49,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["153"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00153-9","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,22]]},"assertion":[{"value":"30 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"202"}}