{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T18:02:37Z","timestamp":1770141757434,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/trustcom66490.2025.00377","type":"proceedings-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:42:41Z","timestamp":1770064961000},"page":"3158-3163","source":"Crossref","is-referenced-by-count":0,"title":["Fed-CMA: Federated Clustering and Matched Averaging for Personalized Intra-Vehicular Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Louis","family":"Agnese","sequence":"first","affiliation":[{"name":"University of Technology,Global Big Data Technologies Centre,Sydney,Australia"}]},{"given":"Xiaojie","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Technology,Global Big Data Technologies Centre,Sydney,Australia"}]},{"given":"Guangsheng","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Technology,Global Big Data Technologies Centre,Sydney,Australia"}]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Technology,Global Big Data Technologies Centre,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref2","article-title":"Security threats to automotive can networks","author":"Hoppe","year":"2011","journal-title":"ESCAR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/vtcspring.2016.7504089"},{"key":"ref4","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics.","author":"McMahan","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref6","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proceedings of Machine learning and systems","volume":"2","author":"Li"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref8","first-page":"3437","article-title":"Clustered federated learning: Model-agnostic distributed multitask learning under data heterogeneity","volume-title":"2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).","author":"Sattler"},{"key":"ref9","article-title":"Federated learning with matched averaging","author":"Wang","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2022.3192506"},{"key":"ref11","first-page":"3557","article-title":"Personalized federated learning with theoretical guarantees: A model-agnostic meta-learning approach","volume":"33","author":"Fallah","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref12","first-page":"1","article-title":"Personalized federated learning for intelligent iot applications: A cloud-edge approach","volume-title":"IEEE GLOBECOM 2020 Workshop: Edge Learning for 5G Mobile Networks and Beyond.","author":"Chen"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207469"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00042"},{"key":"ref15","article-title":"FedAC: An adaptive clustered federated learning framework for heterogeneous data","author":"Zhang","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2024.100837"},{"key":"ref17","first-page":"5972","article-title":"No fear of heterogeneity: Classifier calibration for federated learning with non-iid data","volume":"34","author":"Luo","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.5805004","article-title":"Secure cluster-based hierarchical federated learning in vehicular networks","author":"HaghighiFard","year":"2025"},{"key":"ref19","article-title":"Car hacking: Attack & defense challenge 2020 dataset","author":"Kang","year":"2021"}],"event":{"name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","location":"Guiyang, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,17]]}},"container-title":["2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11354467\/11354567\/11354737.pdf?arnumber=11354737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T06:16:05Z","timestamp":1770099365000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11354737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/trustcom66490.2025.00377","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}