{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:48:00Z","timestamp":1769060880874,"version":"3.49.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/globecom48099.2022.10000633","type":"proceedings-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T17:24:18Z","timestamp":1673457858000},"page":"299-304","source":"Crossref","is-referenced-by-count":6,"title":["Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT"],"prefix":"10.1109","author":[{"given":"Takayuki","family":"Nishio","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology,Tokyo,Japan"}]},{"given":"Masataka","family":"Nakahara","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc.,Saitama,Japan"}]},{"given":"Norihiro","family":"Okui","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc.,Saitama,Japan"}]},{"given":"Ayumu","family":"Kubota","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc.,Saitama,Japan"}]},{"given":"Yasuaki","family":"Kobayashi","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc.,Saitama,Japan"}]},{"given":"Keizo","family":"Sugiyama","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc.,Saitama,Japan"}]},{"given":"Ryoichi","family":"Shinkuma","sequence":"additional","affiliation":[{"name":"Shibaura Institute of Technology,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref13","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"abadi","year":"0","journal-title":"2015 software available from tensorflow org"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref14","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5220\/0010394900380047"},{"key":"ref10","article-title":"Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information","author":"aitken","year":"2013","journal-title":"RFC 7011"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.comcom.2019.08.003","article-title":"Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance","volume":"147","author":"arivudainambi","year":"2019","journal-title":"Computer Communications"},{"key":"ref1","article-title":"Threat Intelligence Report 2020","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422402"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2018.8363930"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2766-4_13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref3","first-page":"756","article-title":"D&#x00CF;ot: A federated self-learning anomaly detection system for iot","author":"nguyen","year":"0","journal-title":"Proc IEEE ICDCS"},{"key":"ref6","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"0","journal-title":"Proc AISTATS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3152620"}],"event":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2022,12,4]]},"end":{"date-parts":[[2022,12,8]]}},"container-title":["GLOBECOM 2022 - 2022 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10000063\/10000593\/10000633.pdf?arnumber=10000633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T14:24:30Z","timestamp":1675779870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10000633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/globecom48099.2022.10000633","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}