{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:30:42Z","timestamp":1774539042981,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tnsm.2024.3385385","type":"journal-article","created":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T18:42:25Z","timestamp":1712342545000},"page":"4816-4829","source":"Crossref","is-referenced-by-count":21,"title":["Evaluating Federated Learning-Based Intrusion Detection Scheme for Next Generation Networks"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5833-9549","authenticated-orcid":false,"given":"Gurpreet","family":"Singh","sequence":"first","affiliation":[{"name":"School of Information Technology, Deakin University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2127-1438","authenticated-orcid":false,"given":"Keshav","family":"Sood","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7252-6728","authenticated-orcid":false,"given":"P.","family":"Rajalakshmi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology Hyderabad, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8106-7703","authenticated-orcid":false,"given":"Dinh Duc Nha","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-7863","authenticated-orcid":false,"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2100115"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233777"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00077-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000286"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref6","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488776"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS53615.2022.9668482"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100391"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587389"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1249"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.02.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD46524.2019.00038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3007662"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17219"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108661"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3181436"},{"key":"ref18","article-title":"Dataset augmentation in feature space","author":"DeVries","year":"2017","journal-title":"arXiv:1702.05538"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3088938"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100755"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.03.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3076780"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN54338.2022.00029"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00648-6"},{"key":"ref29","article-title":"Federated learning under distributed concept drift","author":"Jothimurugesan","year":"2023","journal-title":"arXiv:2206.00799"},{"key":"ref30","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","volume-title":"Proc. 34th Adv. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref31","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","author":"Li"},{"key":"ref32","first-page":"5132","article-title":"Scaffold: Stochastic controlled averaging for federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Karimireddy"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref34","first-page":"4175","article-title":"Balanced meta-Softmax for long-tailed visual recognition","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ren"},{"key":"ref35","article-title":"Measuring the effects of non-identical data distribution for federated visual classification","author":"Hsu","year":"2019","journal-title":"arXiv:1909.06335"},{"key":"ref36","article-title":"FedVal: Different good or different bad in federated learning","author":"Valadi","year":"2023","journal-title":"arXiv:2306.04040"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"ref39","volume-title":"Iot network intrusion dataset","author":"Kang","year":"2019"},{"key":"ref40","volume-title":"Wustl-iiot-2o2l Dataset for IIoT Cybersecurity Research","author":"Zolanvari","year":"2021"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref43","article-title":"5G-NIDD: A comprehensive network intrusion detection dataset generated over 5G wireless network","author":"Samarakoon","year":"2022","journal-title":"arXiv:2212.01298"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10643497\/10492991.pdf?arnumber=10492991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T17:38:43Z","timestamp":1746725923000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10492991\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":43,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3385385","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}