{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:48:26Z","timestamp":1775069306318,"version":"3.50.1"},"reference-count":186,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Science and Technology Council (NSTC), Taiwan, through the National Yang-Ming Chiao Tung University, Taiwan","award":["NSTC 113-2634-F-A49-001-MBK"],"award-info":[{"award-number":["NSTC 113-2634-F-A49-001-MBK"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3454211","type":"journal-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:19:43Z","timestamp":1725473983000},"page":"127018-127050","source":"Crossref","is-referenced-by-count":51,"title":["Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5697-6729","authenticated-orcid":false,"given":"Abhishek","family":"Vyas","sequence":"first","affiliation":[{"name":"Computer Science and Information Engineering Department, National Chung Cheng University, Minxiong, Chiayi, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8294-5857","authenticated-orcid":false,"given":"Po-Ching","family":"Lin","sequence":"additional","affiliation":[{"name":"Computer Science and Information Engineering Department, National Chung Cheng University, Minxiong, Chiayi, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7996-4184","authenticated-orcid":false,"given":"Ren-Hung","family":"Hwang","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, National Yang Ming Chiao Tung University, Tainan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6559-5151","authenticated-orcid":false,"given":"Meenakshi","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Malaviya National Institute of Technology Jaipur, Jaipur, Rajasthan, India"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Number of Internet of Things (IoT) Connected Devices Worldwide 2022\/2023: Breakdowns, Growth, and Predictions","author":"Alan","year":"2023"},{"key":"ref2","volume-title":"State of IoT 2023","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3269980"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref7","article-title":"A review of federated learning in intrusion detection systems for IoT","author":"Belenguer","year":"2022","journal-title":"arXiv:2204.12443"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/a15070247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18280\/ria.360106"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10563-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/network3010008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s23146507"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3090430"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/math11010151"},{"key":"ref16","article-title":"Privacy preservation in federated learning: An insightful survey from the GDPR perspective","author":"Truong","year":"2020","journal-title":"arXiv:2011.05411"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3501296"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118642"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916503"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.129.2200346"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12020260"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3387107"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3220622"},{"key":"ref26","article-title":"Privacy-preserving machine learning: Methods, challenges and directions","author":"Xu","year":"2021","journal-title":"arXiv:2108.04417"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3190835"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023084"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447103"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/fi14090246"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA49011.2020.00077"},{"key":"ref33","article-title":"Federated deep learning for botnet attack detection in IoT networks","author":"Popoola","year":"2022"},{"key":"ref34","article-title":"Privacy-preserving decentralized intrusion detection system for IoT devices using deep learning","author":"Tabassum","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103723"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref37","article-title":"Differential privacy-enabled federated learning for sensitive health data","author":"Choudhury","year":"2019","journal-title":"arXiv:1910.02578"},{"key":"ref38","article-title":"Can differential privacy practically protect collaborative deep learning inference for the Internet of Things?","author":"Ryu","year":"2021","journal-title":"arXiv:2104.03813"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.07.013"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.028"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s22062112"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7242-3_14"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/sym13061043"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2974555"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23005"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-022-01146-6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3115817"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.11.009"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3236995"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107337"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3052183"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006173"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.08.011"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10233019"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00080"},{"key":"ref57","article-title":"ModelChain: Decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks","author":"Kuo","year":"2018","journal-title":"arXiv:1802.01746"},{"key":"ref58","article-title":"FederatedTrust: A solution for trustworthy federated learning","author":"S\u00e1nchez","year":"2023","journal-title":"arXiv:2302.09844"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107743"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3117285"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref63","article-title":"Differential privacy enabled federated learning for sensitive health data","author":"Choudhury","year":"2019","journal-title":"arXiv:1910.02578"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2200204"},{"key":"ref65","article-title":"Differentially private vertical federated learning","author":"Ranbaduge","year":"2022","journal-title":"arXiv:2211.06782"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2022.100009"},{"key":"ref67","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Stevens"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3229005"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940052"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179468"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103719"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560611"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3204975"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2023.101750"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom48709.2020.9234959"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3165945"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223658"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.015"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.03.003"},{"key":"ref81","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"31st USENIX Secur. Symp. (USENIX Secur.)","author":"Nguyen"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3390\/s22228974"},{"key":"ref83","article-title":"FLock: Defending malicious behaviors in federated learning with blockchain","author":"Dong","year":"2022","journal-title":"arXiv:2211.04344"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4261807"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/e24111545"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MECO52532.2021.9460304"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3185327"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107876"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000286"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3126728"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00041"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/en14175364"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102749"},{"key":"ref94","first-page":"1397","article-title":"Label inference attacks against vertical federated learning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Fu"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3220779"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-00978-9"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3237367"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904349"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3427477.3429989"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3102581"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3508379"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2020.23003"},{"key":"ref104","article-title":"SoK: Privacy-preserving deep learning with homomorphic encryption","author":"Podschwadt","year":"2021","journal-title":"arXiv:2112.12855"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3089435"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.3390\/math8111871"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.12.013"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3428152"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060393"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2017.8190422"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2939713"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3216981"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19208-1_35"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3108434"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3167663"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108671"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/math11010214"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3426474"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3390\/s20071898"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.121.2200099"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103167"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006231"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.11.006"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060116"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92708-0_23"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3031721"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05491-4_26"},{"key":"ref128","article-title":"Subject granular differential privacy in federated learning","author":"Marathe","year":"2022","journal-title":"arXiv:2206.03617"},{"key":"ref129","first-page":"2651","article-title":"SWIFT: Super-fast and robust privacy-preserving machine learning","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Koti"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000623"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2020.2996273"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101954"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3214998"},{"key":"ref134","article-title":"Using autoencoders on differentially private federated learning GANs","author":"Schram","year":"2022","journal-title":"arXiv:2206.12270"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2023.3250705"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051250"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3169918"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103205"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12122703"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3262546"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615203"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.05.004"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-022-00982-3"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103768"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0009"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3296637"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2023.3317870"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100564"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179401"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3273542"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103366"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3272334"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2023.3322785"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3283853"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3303718"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/icassp49357.2023.10096606"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3321565"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302065"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3280032"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179400"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3279926"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12163382"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3273914"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-01184-3"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103320"},{"key":"ref166","article-title":"Applied federated learning: Architectural design for robust and efficient learning in privacy aware settings","author":"Stojkovic","year":"2022","journal-title":"arXiv:2206.00807"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00727-6"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.3390\/fi15060203"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/3573834.3574544"},{"key":"ref170","doi-asserted-by":"crossref","DOI":"10.1007\/s10796-023-10443-0","article-title":"A fully privacy-preserving solution for anomaly detection in IoT using federated learning and homomorphic encryption","author":"Arazzi","year":"2023","journal-title":"Inf. Syst. Frontiers"},{"key":"ref171","volume-title":"The New Generation of Privacy-Preserving Technologies","author":"Potter","year":"2024"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/2956990"},{"key":"ref173","article-title":"Generative AI has lowered the barriers to computational social sciences","author":"Zhang","year":"2023","journal-title":"arXiv:2311.10833"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.101015"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415540"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/3589774"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00181"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3299947"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3335374"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3295786"},{"key":"ref182","volume-title":"Scalability and performance evaluation of federated learning frameworks: A comparative analysis","author":"Soudan","year":"2024"},{"key":"ref183","article-title":"An empirical study of efficiency and privacy of federated learning algorithms","author":"Zahri","year":"2023","journal-title":"arXiv:2312.15375"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2024.124215"},{"key":"ref185","article-title":"Intrusion detection based on federated learning: A systematic review","author":"Hernandez-Ramos","year":"2023","journal-title":"arXiv:2308.09522"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101251"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10664537.pdf?arnumber=10664537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T06:32:51Z","timestamp":1726641171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10664537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":186,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3454211","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}