{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:48:40Z","timestamp":1776358120915,"version":"3.51.2"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"S\u00e3o Paulo Research Foundation (FAPESP), Brazil","award":["2023\/07184-1"],"award-info":[{"award-number":["2023\/07184-1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3596374","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T18:01:44Z","timestamp":1754503304000},"page":"140694-140708","source":"Crossref","is-referenced-by-count":2,"title":["CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0686-2763","authenticated-orcid":false,"given":"Ogobuchi Daniel","family":"Okey","sequence":"first","affiliation":[{"name":"Center for Engineering, Modeling and Applied Social Sciences (CECS), Federal University of ABC, Santo Andr&#x00E9;, S&#x00E3;o Paulo, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5401-7551","authenticated-orcid":false,"given":"Dem\u00f3stenes Zegarra","family":"Rodr\u00edguez","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Federal University of Lavras, Lavras, Minas Gerais, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9238-8839","authenticated-orcid":false,"given":"Frederico Gadelha","family":"Guimar\u00e3es","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Federal University of Minas Gerais, Belo Horizonte, Minas Gerais, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6706-455X","authenticated-orcid":false,"given":"Jo\u00e3o Henrique","family":"Kleinschmidt","sequence":"additional","affiliation":[{"name":"Center for Engineering, Modeling and Applied Social Sciences (CECS), Federal University of ABC, Santo Andr&#x00E9;, S&#x00E3;o Paulo, Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3013416"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0286652"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86890-1_23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110351"},{"key":"ref7","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Stevens"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3731596"},{"key":"ref10","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref11","article-title":"Federated optimization in heterogeneous networks","author":"Li","year":"2018","journal-title":"arXiv:1812.06127"},{"key":"ref12","article-title":"Local model reconstruction attacks in federated learning and their uses","author":"Driouich","year":"2022","journal-title":"arXiv:2210.16205"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS61526.2024.10639159"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3586102.3586107"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20819"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206805"},{"key":"ref17","article-title":"Quantization-aware neural architectural search for intrusion detection","author":"Acharya","year":"2023","journal-title":"arXiv:2311.04194"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3233775"},{"key":"ref19","article-title":"Knowledge distillation in federated learning: A survey on long lasting challenges and new solutions","author":"Qin","year":"2024","journal-title":"arXiv:2406.10861"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref21","first-page":"326","article-title":"Iot intrusion detection based on personalized federated learning","volume-title":"Proc. 24st Asia\u2013Pacific Netw. Oper. Manage. Symp. (APNOMS)","author":"Zhang"},{"key":"ref22","first-page":"5946","article-title":"Compressing gradient optimizers via count-sketches","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Spring"},{"key":"ref23","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2023","journal-title":"arXiv:1602.05629"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICME55011.2023.00066"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3690134.3694819"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101209"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102807","article-title":"FedKD-IDS: A robust intrusion detection system using knowledge distillation-based semi-supervised federated learning and anti-poisoning attack mechanism","volume":"117","author":"Quyen","year":"2025","journal-title":"Inf. Fusion"},{"key":"ref29","article-title":"FedMD: Heterogenous federated learning via model distillation","author":"Li","year":"2019","journal-title":"arXiv:1910.03581"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279722"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622262"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM58377.2023.10356272"},{"key":"ref33","article-title":"ACI IoT network traffic dataset 2023","author":"Bastian","year":"2023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101351"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s22197409"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11115050.pdf?arnumber=11115050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T05:55:44Z","timestamp":1755323744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11115050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3596374","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}