{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:49:05Z","timestamp":1774716545437,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSFC Overseas Outstanding Youth Fund"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12371519"],"award-info":[{"award-number":["12371519"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771013"],"award-info":[{"award-number":["61771013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Asiainfo Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds of Shanghai Jiading District"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tccn.2025.3538020","type":"journal-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T13:45:19Z","timestamp":1738676719000},"page":"3384-3396","source":"Crossref","is-referenced-by-count":5,"title":["Asynchronous Decentralized Federated Anomaly Detection for 6G Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4562-7654","authenticated-orcid":false,"given":"Ya","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5983-198X","authenticated-orcid":false,"given":"Kai","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.123.2200094"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3131332"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800079"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3244674"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/math9141638"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1360\/SSI-2021-0280"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12153300"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.171"},{"key":"ref10","first-page":"7987","article-title":"Distributed distributionally robust optimization with non-convex objectives","volume-title":"Proc. 36th Adv. Neural Inf. Process. Syst.","author":"Jiao"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315746"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900652"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3357713.3384284"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051935"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2023.103494"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit54941.2022.9815754"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS59514.2023.10387644"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.03.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2021.10.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3107783"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939783"},{"issue":"1","key":"ref28","first-page":"72","article-title":"Temporal patterns discovery of evolving graphs for graph neural network (GNN)-based anomaly detection in heterogeneous networks","volume":"12","author":"Kim","year":"2022","journal-title":"J. Internet Services Inf. Secur."},{"key":"ref29","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2017","journal-title":"arXiv:1609.02907"},{"key":"ref30","article-title":"Graph attention networks","author":"Velickovic","year":"2018","journal-title":"arXiv:1710.10903"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05318-5"},{"key":"ref32","article-title":"A comprehensive overview and survey of recent advances in meta-learning","author":"Peng","year":"2020","journal-title":"arXiv:2004.11149"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00433"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_8"},{"key":"ref35","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Finn"},{"key":"ref36","article-title":"MetaGAD: Learning to meta transfer for few-shot graph anomaly detection","author":"Xu","year":"2023","journal-title":"arXiv:2305.10668"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11081-012-9198-y"},{"key":"ref38","volume-title":"VPNFilter update\u2014VPNFilter exploits endpoints, targets new devices","author":"Largent","year":"2018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00943"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299064"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467415"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313562"},{"key":"ref44","article-title":"On differentiating parameterized argmin and argmax problems with application to bi-level optimization","author":"Gould","year":"2016","journal-title":"arXiv:1607.05447"},{"key":"ref45","article-title":"Local stochastic bilevel optimization with momentum-based variance reduction","author":"Li","year":"2022","journal-title":"arXiv:2205.01608"},{"key":"ref46","first-page":"1","article-title":"Meta-learning with implicit gradients","volume-title":"Proc. 33rd Adv. Neural Inf. Process. Syst.","author":"Rajeswaran"},{"key":"ref47","first-page":"1","article-title":"Asynchronous distributed bilevel optimization","volume-title":"Proc. 11th Int. Conf. Learn. Represent.","author":"Jiao"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-022-01919-z"},{"key":"ref50","volume-title":"Localization and cutting-plane methods","author":"Boyd","year":"2007"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.26087"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57942-4_22"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348244"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103106"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11195912\/10870116.pdf?arnumber=10870116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:36:27Z","timestamp":1760160987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10870116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":57,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3538020","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}