{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:23:40Z","timestamp":1763191420028,"version":"3.45.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11228189","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Fed-CLIDS: Network intrusion detection system based on federated meta-continuous learning"],"prefix":"10.1109","author":[{"given":"Shumian","family":"Yang","sequence":"first","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China,250014"}]},{"given":"Guoqing","family":"Lou","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China,250014"}]},{"given":"Lijuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China,250014"}]},{"given":"Dawei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China,250014"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3265964"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119512"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105607"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200533"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104263"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2023.3293134"},{"issue":"11","key":"ref7","first-page":"2333","article-title":"Multi-mode attack detection and evaluation of abnormal states for industrial control network","volume":"58","author":"Xu","year":"2021","journal-title":"Journal of Computer Research and Development"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2024.100593"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993410"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3060878"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3474180"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3090260"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103094"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991693"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/mice.13186"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3385385"},{"issue":"16","key":"ref18","article-title":"A hierarchical federated learning-based intrusion detection system for 5g smart grids","volume-title":"Electronics","volume":"11","author":"Sun","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3076780"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3363240"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3393230"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3510553"},{"key":"ref24","first-page":"12 073","article-title":"Federated continual learning with weighted inter-client transfer","volume-title":"International Conference on Machine Learning","author":"Yoon"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2024.3393017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.01506125"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3579824"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CISP-BMEI64163.2024.10906174"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11228189.pdf?arnumber=11228189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:21:16Z","timestamp":1763191276000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11228189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11228189","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}