{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T22:43:21Z","timestamp":1773441801782,"version":"3.50.1"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972096"],"award-info":[{"award-number":["61972096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771140"],"award-info":[{"award-number":["61771140"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872088"],"award-info":[{"award-number":["61872088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872090"],"award-info":[{"award-number":["61872090"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902289"],"award-info":[{"award-number":["61902289"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University-Industry Cooperation of Fujian Province","award":["2022H6025"],"award-info":[{"award-number":["2022H6025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,5,15]]},"DOI":"10.1109\/jiot.2025.3526379","type":"journal-article","created":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T20:02:46Z","timestamp":1736452966000},"page":"14348-14361","source":"Crossref","is-referenced-by-count":11,"title":["Stones From Other Hills: Intrusion Detection in Statistical Heterogeneous IoT by Self-Labeled Personalized Federated Learning"],"prefix":"10.1109","volume":"12","author":[{"given":"Wenting","family":"Lu","sequence":"first","affiliation":[{"name":"College of Computer Science and Network Security, Fujian Normal University, Fujian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2606-5406","authenticated-orcid":false,"given":"Ayong","family":"Ye","sequence":"additional","affiliation":[{"name":"College of Computer Science and Network Security, Fujian Normal University, Fujian, China"}]},{"given":"Peixin","family":"Xiao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Network Security, Fujian Normal University, Fujian, China"}]},{"given":"Yuanhuang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Network Security, Fujian Normal University, Fujian, China"}]},{"given":"Longjing","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Network Security, Fujian Normal University, Fujian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9868-8103","authenticated-orcid":false,"given":"Donglin","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang Normal University, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-2177","authenticated-orcid":false,"given":"Zhiquan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icscai61790.2024.10866781"},{"key":"ref2","volume-title":"Smart appliances market by type","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-42987-4_5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3378727"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3490897"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3543146.3543172"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.334214"},{"key":"ref8","article-title":"Threat intelligence report finds malicious IoT botnet based DDOS.","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2019.8929620"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3251282"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CNS59707.2023.10288680"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-024-00513-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103516"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3605775"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.11.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00724"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref19","volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108651"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3126728"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109048"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3336977"},{"key":"ref24","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3558005"},{"key":"ref26","first-page":"3557","article-title":"Personalized federated learning with theoretical guarantees: A model-agnostic meta-learning approach","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Fallah"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref28","volume-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic","author":"Garc\u00eda","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623123"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100755"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279423"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279368"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA60987.2023.10302497"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3335385"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51664.2024.10454669"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3160699"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483278"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20936-9_26"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103299"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625505"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21280-2_20"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622262"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12153295"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3304556"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612217"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-04753-8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref50","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Finn"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.08.141"},{"key":"ref52","article-title":"An introduction to autoencoders","author":"Michelucci","year":"2022","journal-title":"arXiv:2201.03898"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000633"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking57963.2023.10186438"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3365976"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3208815"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2837078"},{"key":"ref58","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. 3rd Conf. Mach. Learn. Syst.","author":"Li"},{"key":"ref59","first-page":"1","article-title":"Federated learning based on dynamic regularization","volume-title":"Proc. 9th Int. Conf. Learn. Represent.","author":"Acar"},{"key":"ref60","first-page":"1","article-title":"Eliminating domain bias for federated learning in representation space","volume-title":"Proc. 37th Conf. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3627345.3627367"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3629188.3629197"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467827"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103106"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC52403.2022.9712491"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22677-9_17"},{"key":"ref67","article-title":"PFLlib: Personalized federated learning algorithm library","author":"Zhang","year":"2023","journal-title":"arXiv:2312.04992"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i9.26330"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10993477\/10835067.pdf?arnumber=10835067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T04:18:29Z","timestamp":1746764309000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10835067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,15]]},"references-count":68,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3526379","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,15]]}}}