{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T15:03:00Z","timestamp":1775746980397,"version":"3.50.1"},"reference-count":168,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001798","name":"Cyber Security Cooperative Research Centre (CSCRC) and Edith Cowan University, Australia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001798","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3118642","type":"journal-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T01:43:44Z","timestamp":1633571024000},"page":"138509-138542","source":"Crossref","is-referenced-by-count":283,"title":["Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0632-3172","authenticated-orcid":false,"given":"Mohamed Amine","family":"Ferrag","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1160-2846","authenticated-orcid":false,"given":"Othmane","family":"Friha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5360-9782","authenticated-orcid":false,"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1345-2829","authenticated-orcid":false,"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6700-9347","authenticated-orcid":false,"given":"Lei","family":"Shu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2922936"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102033"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162672"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2018.2850541"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/fi12030044"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367398"},{"key":"ref9","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3072033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3039941"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.12.003"},{"key":"ref14","first-page":"1","article-title":"Verifiable and privacy preserving federated learning without fully trusted centers","author":"Han","year":"2021","journal-title":"J. Ambient Intell. Humanized Comput."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369480"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3073925"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3037554"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017668"},{"key":"ref19","volume-title":"Federated Learning: Collaborative Machine Learning Without Centralized Training Data","year":"2021"},{"key":"ref20","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018","journal-title":"arXiv:1811.03604"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3076767"},{"key":"ref22","article-title":"Experiments of federated learning for COVID-19 chest X-ray images","author":"Liu","year":"2020","journal-title":"arXiv:2007.05592"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056185"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3075683"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3014385"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC47757.2020.9049708"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3075706"},{"key":"ref28","article-title":"Towards accurate anomaly detection in industrial Internet-of-Things using hierarchical federated learning","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3090909"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013541"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.09.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s20216230"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s21010167"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072611"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3058573"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102355"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3095077"},{"key":"ref44","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Bhagoji"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00017"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3034674"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.02.028"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp51126.2021.00035"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101889"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101824"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026589"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015772"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00017"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900317"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3030278"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056325"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101157"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3036157"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3029459"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2937876"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120761"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3052183"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148937"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00029"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP49889.2020.9299798"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3074806"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600587CM"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2020.000015"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3076167"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102574"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148979"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2988604"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3046665"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000340"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2966778"},{"key":"ref82","article-title":"FedSky: An efficient and privacy-preserving scheme for federated mobile crowdsensing","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref83","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2016","journal-title":"arXiv:1602.05629"},{"key":"ref84","article-title":"FLEAM: A federated learning empowered architecture to mitigate DDoS in industrial IoT","author":"Li","year":"2021","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058528"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3043458"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041793"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom48709.2020.9234959"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041641"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000286"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00020"},{"key":"ref94","first-page":"1","article-title":"Network anomaly detection using federated deep autoencoding Gaussian mixture model","volume-title":"Proc. Int. Conf. Mach. Learn. Netw.","author":"Chen"},{"key":"ref95","first-page":"1","article-title":"Attack detection using federated learning in medical cyber-physical systems","volume-title":"Proc. 28th Int. Conf. Comput. Commun. Netw. (ICCCN)","author":"Schneble"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005507"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170757"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00114"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102748"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050773"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987843"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037474"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162735"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102220"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892848"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959220"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00047"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882794"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078072"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900598"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322159"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000263"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3050781"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/EI250167.2020.9347025"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3085960"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3007817"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403349"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019225"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3005969"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048038"},{"key":"ref125","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th Secur. Symp. (USENIX Secur.)","author":"Fang"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI50040.2020.00044"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5906"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3090771"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962873"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57524-3_13"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00026"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3031843"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.321"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000379"},{"key":"ref138","first-page":"1508","article-title":"TernGrad: Ternary gradients to reduce communication in distributed deep learning","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Wen"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref142","first-page":"1","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Goodfellow"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014102"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/3453158"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.07.009"},{"key":"ref146","volume-title":"The MNIST Database of Handwritten Digits","year":"2021"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"ref148","article-title":"LEAF: A benchmark for federated settings","author":"Caldas","year":"2018","journal-title":"arXiv:1812.01097"},{"key":"ref149","first-page":"21","article-title":"New generations of Internet of Things datasets for cybersecurity applications based machine learning: TON_IoT datasets","volume-title":"Proc. eResearch Australasia Conf.","author":"Moustafa"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref151","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100755"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.3390\/s20226578"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref158","article-title":"Federated learning for malware detection in IoT devices","author":"Rey","year":"2021","journal-title":"arXiv:2104.09994"},{"key":"ref159","article-title":"Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions","author":"Ferrag","year":"2021","journal-title":"IEEE CAA J. Autom. Sinica"},{"key":"ref160","first-page":"30","article-title":"Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques","volume-title":"Proc. Int. Conf. Mobile Netw. Manage.","author":"Koroniotis"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.042"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2020.100304"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036728"},{"key":"ref164","article-title":"Designing an effective network forensic framework for the investigation of botnets in the Internet of Things","author":"Koroniotis","year":"2020"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900461"},{"key":"ref168","article-title":"Advances and open problems in federated learning","author":"Kairouz","year":"2019","journal-title":"arXiv:1912.04977"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09562531.pdf?arnumber=9562531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:09:21Z","timestamp":1706058561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9562531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":168,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3118642","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}