{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:45:12Z","timestamp":1778345112903,"version":"3.51.4"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tce.2024.3349490","type":"journal-article","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T19:34:25Z","timestamp":1704310465000},"page":"4258-4265","source":"Crossref","is-referenced-by-count":57,"title":["Two-Level Privacy-Preserving Framework: Federated Learning for Attack Detection in the Consumer Internet of Things"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7730-9065","authenticated-orcid":false,"given":"Elnaz","family":"Rabieinejad","sequence":"first","affiliation":[{"name":"Cyber Science Lab, Canada Cyber Foundry, School of Computer Science, University of Guelph, Guelph, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8669-9777","authenticated-orcid":false,"given":"Abbas","family":"Yazdinejad","sequence":"additional","affiliation":[{"name":"Cyber Science Lab, Canada Cyber Foundry, School of Computer Science, University of Guelph, Guelph, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9294-7554","authenticated-orcid":false,"given":"Ali","family":"Dehghantanha","sequence":"additional","affiliation":[{"name":"Cyber Science Lab, Canada Cyber Foundry, School of Computer Science, University of Guelph, Guelph, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Brandon University, Brandon, MB, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2023.3293993"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-019-00211-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3318369"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103801"},{"key":"ref6","article-title":"Who let the smart toaster hack the house? An investigation into the security vulnerabilities of consumer IoT devices","author":"Li","year":"2023","journal-title":"arXiv:2306.09017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103723"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00042"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103201"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2023.3239391"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2023.3318509"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-01820-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2974555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2941244"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3142030"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s22186741"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948068"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2906657"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3168011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09691-3"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/30\/10510045\/10380116.pdf?arnumber=10380116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:44:27Z","timestamp":1714761867000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10380116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":24,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2024.3349490","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}