{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T05:00:31Z","timestamp":1775710831263,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:00:00Z","timestamp":1773878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:00:00Z","timestamp":1773878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,3,19]]},"DOI":"10.1109\/isdfs69419.2026.11459107","type":"proceedings-article","created":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T20:01:51Z","timestamp":1775678511000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["safeMEDInet: Fed AI Systems for Privacy-Preserving Threat Detection in Healthcare"],"prefix":"10.1109","author":[{"given":"Irin","family":"Sultana","sequence":"first","affiliation":[{"name":"Univ of Hawaii Maui College,Department of Information &#x0026; Computer Science,Kahului,HI,USA"}]},{"given":"Syed Mustavi","family":"Maheen","sequence":"additional","affiliation":[{"name":"School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA"}]},{"given":"Naresh","family":"Kshetri","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Department of Cybersecurity,Rochester,NY,USA"}]},{"given":"Shriram KS","family":"Pandian","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Department of Cybersecurity,Rochester,NY,USA"}]},{"given":"Marshiat Mithe","family":"Syed","sequence":"additional","affiliation":[{"name":"North South University,Department of ECE,Dhaka,Bangladesh"}]},{"given":"Md Rasel","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Jagannath University,Department of Political Science,Dhaka,Bangladesh"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.51381\/adrs.v3i1.38"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3093905"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0515-4"},{"key":"ref4","article-title":"Detection of Distributed Denial of Service Attacks for IoT-Based Healthcare Systems","author":"Kaur","year":"2022","journal-title":"Comp Ass. Methods in Eng. Sci"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1778"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS65363.2025.11011957"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLAS64557.2025.10968798"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s25206261"},{"key":"ref9","author":"Ali","year":"2024","journal-title":"Federated Learning in Healthcare: Model Misconducts, Security, Challenges, Applications, and Future Research Directions \u2010\u2010 A Systematic Review"},{"key":"ref10","author":"Elhoseny","year":"2024","journal-title":"Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s24144591"},{"key":"ref12","article-title":"Privacy preservation for federated learning in health care","author":"Huang","year":"2024","journal-title":"PMC"},{"key":"ref13","author":"Alnizami","year":"2025","journal-title":"Towards a HIPAA Compliant Agentic AI System in Healthcare"},{"key":"ref14","article-title":"Data Privacy in Healthcare: In the Era of Artificial Intelligence","author":"Shah","year":"2023","journal-title":"PMC"},{"key":"ref15","article-title":"Federated learning in healthcare: Transformative 2025","volume-title":"Lifebit","year":"2025"},{"key":"ref16","author":"Simbo","journal-title":"Navigating Regulatory Challenges: How Federated Learning Aligns with Data Privacy Laws in the Healthcare Sector"},{"key":"ref17","article-title":"Federated Learning for Healthcare: A Comprehensive Review","author":"Rieke","year":"2020","journal-title":"MDPI Eng. Proc."},{"key":"ref18","volume-title":"From Challenges and Pitfalls to Recommendations and Opportunities: Implementing Federated Learning in Healthcare","author":"Abedi","year":"2024"},{"key":"ref19","article-title":"Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models","author":"Al-Dhuraibi","year":"2024","journal-title":"MDPI Future Internet"},{"key":"ref20","article-title":"Federated Learning for Cybersecurity: A Privacy-Preserving Approach","author":"Kumar","year":"2024","journal-title":"MDPI App. Sci., 2025"},{"key":"ref21","volume-title":"Byzantine Resilient Federated Multi-Task Representation Learning","author":"Le","year":"2025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/fi17090409"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2021.824898"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363469"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2024.100974"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/fi17080345"},{"key":"ref27","author":"Jeong","year":"2022","journal-title":"FedCC: Robust Federated Learning against Model Poisoning Attacks"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/app15126878"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3493957"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3370193"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSADL65848.2025.10933436"},{"key":"ref32","article-title":"MIMIC-IV","volume-title":"Physionet.org","author":"Johnson","year":"2024"},{"key":"ref33","article-title":"HealthData.gov","volume-title":"HealthData.gov","year":"2019"},{"key":"ref34","article-title":"World Health Data Platform - WHO","year":"2023","journal-title":"WHO"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3420078"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000421"}],"event":{"name":"2026 14th International Symposium on Digital Forensics and Security (ISDFS)","location":"Boston, MA, USA","start":{"date-parts":[[2026,3,19]]},"end":{"date-parts":[[2026,3,20]]}},"container-title":["2026 14th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11458844\/11458909\/11459107.pdf?arnumber=11459107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T04:39:52Z","timestamp":1775709592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11459107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,19]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/isdfs69419.2026.11459107","relation":{},"subject":[],"published":{"date-parts":[[2026,3,19]]}}}