{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:10:38Z","timestamp":1777043438418,"version":"3.51.4"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council through the DECRA Project","doi-asserted-by":"publisher","award":["DE210100651"],"award-info":[{"award-number":["DE210100651"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada through Its Discovery Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,6,1]]},"DOI":"10.1109\/jiot.2025.3535792","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T13:48:31Z","timestamp":1738072111000},"page":"16478-16492","source":"Crossref","is-referenced-by-count":19,"title":["Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1057-8332","authenticated-orcid":false,"given":"Bui","family":"Duc Manh","sequence":"first","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology Sydney, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6903-0163","authenticated-orcid":false,"given":"Chi-Hieu","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology Sydney, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9528-0863","authenticated-orcid":false,"given":"Dinh","family":"Thai Hoang","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology Sydney, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2659-8648","authenticated-orcid":false,"given":"Diep N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology Sydney, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8446-9225","authenticated-orcid":false,"given":"Ming","family":"Zeng","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Engineering, Universit&#x00E9; Laval, Quebec City, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9485-9216","authenticated-orcid":false,"given":"Quoc-Viet","family":"Pham","sequence":"additional","affiliation":[{"name":"School of Computer Science and Statistics, Trinity College Dublin, The University of Dublin, Dublin 2, Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref2","volume-title":"Number of IoT Connections Worldwide 2022-2033, With Forecasts to 2030","author":"Vailshery","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"ref5","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume-title":"Proc. Decentralized Bus. Rev.","author":"Nakatomo"},{"key":"ref6","volume-title":"What is IoT With Blockchain?","year":"2024"},{"key":"ref7","volume-title":"Enabling privacy and control of healthcare data","year":"2024"},{"key":"ref8","volume-title":"Slowmist hacked statistical","year":"2024"},{"key":"ref9","article-title":"BTC Turk hack: Exchange reports cyber attack with 51 million stolen","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205643"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2024.3374280"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2906657"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3038639"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.8805"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3090959"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-32168-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3365815"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925010"},{"key":"ref24","volume-title":"IBM Blockchain Platform Technical Overview","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref27","article-title":"Efficient logistic regression on large encrypted data","author":"Han","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.12.012"},{"key":"ref30","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"ref32","article-title":"Flower: A friendly federated learning research framework","author":"Beutel","year":"2022","journal-title":"arXiv:2007.14390"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref34","volume-title":"Official go implementation of the Ethereum protocol","year":"2024"},{"key":"ref35","volume-title":"Prysm: An Ethereum consensus implementation written in go","year":"2024"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11008454\/10856250.pdf?arnumber=10856250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T21:09:38Z","timestamp":1771362578000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10856250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,1]]},"references-count":35,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3535792","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,1]]}}}