{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:00:24Z","timestamp":1773518424039,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10229026","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":13,"title":["Federated PCA on Grassmann Manifold for Anomaly Detection in IoT Networks"],"prefix":"10.1109","author":[{"given":"Tung-Anh","family":"Nguyen","sequence":"first","affiliation":[{"name":"The University of Sydney,School of Computer Science,Sydney,Australia"}]},{"given":"Jiayu","family":"He","sequence":"additional","affiliation":[{"name":"The University of Sydney,School of Computer Science,Sydney,Australia"}]},{"given":"Long Tan","family":"Le","sequence":"additional","affiliation":[{"name":"The University of Sydney,School of Computer Science,Sydney,Australia"}]},{"given":"Wei","family":"Bao","sequence":"additional","affiliation":[{"name":"The University of Sydney,School of Computer Science,Sydney,Australia"}]},{"given":"Nguyen H.","family":"Tran","sequence":"additional","affiliation":[{"name":"The University of Sydney,School of Computer Science,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref13","article-title":"A review of federated learning in intrusion detection systems for iot","author":"belenguer","year":"2022"},{"key":"ref35","author":"jolliffe","year":"2002","journal-title":"Principal Component Analysis for Special Types of Data"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/14786440109462720"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080182"},{"key":"ref37","author":"patel","year":"2019","journal-title":"Hands-On Unsupervised Learning Using Python How to Build Applied Machine Learning Solutions from Unlabeled Data"},{"key":"ref14","article-title":"Grassmannian learning: Embedding geometry awareness in shallow and deep learning","author":"zhang","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1561\/2200000055"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2846568"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00104"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref33","first-page":"6453","article-title":"Federated principal component analysis","volume":"33","author":"grammenos","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2756025"},{"key":"ref32","first-page":"1589","article-title":"Minimax-optimal privacy-preserving sparse pca in distributed systems","volume":"84","author":"ge","year":"2018","journal-title":"Proceedings of the Twenty-First International Conference on Artificial Intelligence and Statistics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.10.044"},{"key":"ref17","article-title":"Federated optimization:distributed optimization beyond the datacenter","author":"kone?n\u00fd","year":"2015"},{"key":"ref39","article-title":"Distributed convex optimization with many convex constraints","author":"giesen","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref18","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2633228"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796926"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048038"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref42","article-title":"Grassmannian learning: Embedding geometry awareness in shallow and deep learning","author":"zhang","year":"2018","journal-title":"CoRR"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2537261"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.330"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1137\/17M1116787"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"ref27","author":"jolliffe","year":"2014","journal-title":"Principal Component Analysis"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062248"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488874"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195548"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"ref3","first-page":"147","article-title":"Toward a gaussian-mixture model-based detection scheme against data integrity attacks in the smart grid","volume":"4","author":"yang","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"key":"ref6","first-page":"756","article-title":"D&#x00CF;ot: A federated self-learning anomaly detection system for iot","author":"nguyen","year":"2019","journal-title":"IEEE International Conference on Distributed Computing Systems (ICDCS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.016"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178689"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","location":"New York City, NY, USA","start":{"date-parts":[[2023,5,17]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10229026.pdf?arnumber=10229026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:45:15Z","timestamp":1695059115000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10229026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10229026","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}