{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T15:48:11Z","timestamp":1747064891350},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T00:00:00Z","timestamp":1677801600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T00:00:00Z","timestamp":1677801600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,3]]},"DOI":"10.1109\/iccae56788.2023.10111132","type":"proceedings-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T18:06:35Z","timestamp":1683137195000},"source":"Crossref","is-referenced-by-count":8,"title":["Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach"],"prefix":"10.1109","author":[{"given":"Md Delwar","family":"Hossain","sequence":"first","affiliation":[{"name":"Nara Institute of Science and Technology,Division of Information Science,Ikoma,Nara,Japan"}]},{"given":"Hideya","family":"Ochiai","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Grad. School of Info. Science and Tech.,Tokyo,Japan"}]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas,Department of Computer Science,Dallas,USA"}]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology,Division of Information Science,Ikoma,Nara,Japan"}]}],"member":"263","reference":[{"key":"ref13","author":"tijani","year":"2022","journal-title":"Federated Learning A Step by Step Implementatin in TensorFlow"},{"key":"ref12","author":"brownlee","year":"2022","journal-title":"How to Develop 1D Convolutional Neural Network Models for Human Activity Recognition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SDS54800.2022.00015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC55026.2022.9894318"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2294120"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3010230"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378190"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.12"},{"key":"ref6","first-page":"1","article-title":"Physical Intrusion Detection for Industrial Control System","author":"liu pengfei liu","year":"2018","journal-title":"IEEE Conference on Communications and Network Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2016.193"}],"event":{"name":"2023 15th International Conference on Computer and Automation Engineering (ICCAE)","location":"Sydney, Australia","start":{"date-parts":[[2023,3,3]]},"end":{"date-parts":[[2023,3,5]]}},"container-title":["2023 15th International Conference on Computer and Automation Engineering (ICCAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10111091\/10111098\/10111132.pdf?arnumber=10111132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T17:42:09Z","timestamp":1684777329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10111132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iccae56788.2023.10111132","relation":{},"subject":[],"published":{"date-parts":[[2023,3,3]]}}}