{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T07:50:01Z","timestamp":1764748201254,"version":"3.46.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,20]]},"DOI":"10.1109\/wimob66857.2025.11257463","type":"proceedings-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T18:45:02Z","timestamp":1764701102000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Communication-Efficient Federated Learning Approach for Intrusion Detection in IoT"],"prefix":"10.1109","author":[{"given":"Oumaima","family":"Ennasri","sequence":"first","affiliation":[{"name":"National Institute of Posts and Telecommunications (INPT),STRS Laboratory,Rabat,Morocco"}]},{"given":"Manal","family":"Abbassi","sequence":"additional","affiliation":[{"name":"National Institute of Posts and Telecommunications (INPT),STRS Laboratory,Rabat,Morocco"}]},{"given":"Yann","family":"Ben Maissa","sequence":"additional","affiliation":[{"name":"National Institute of Posts and Telecommunications (INPT),STRS Laboratory,Rabat,Morocco"}]},{"given":"Rachid","family":"El Mokadem","sequence":"additional","affiliation":[{"name":"National Institute of Posts and Telecommunications (INPT),STRS Laboratory,Rabat,Morocco"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics","author":"McMahan","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04242-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10589-022-00389-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"volume-title":"XFL_IDS: Federated intrusion detection system implementation","year":"2025","author":"Ennasri","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108661"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102189"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.46572\/naturengs.1524394"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09691-3"},{"key":"ref10","first-page":"1","article-title":"Privacy-preserving network intrusion detection using federated learning","volume":"11","author":"Chunduru","year":"2023","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017793"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-015-0892-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03776-z"},{"volume-title":"Anomaly-based detection","year":"2025","key":"ref14"},{"key":"ref15","article-title":"Flower: A friendly federated learning research framework","author":"Beutel","year":"2020","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"106775","DOI":"10.1016\/j.knosys.2021.106775","article-title":"A survey on federated learning","volume":"216","author":"Zhang","year":"2021","journal-title":"Knowledge-Based Systems"},{"volume-title":"Types of intrusion detection systems: Nids vs hids","year":"2020","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9663052"}],"event":{"name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2025,10,20]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2025,10,22]]}},"container-title":["2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11253544\/11257435\/11257463.pdf?arnumber=11257463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T07:45:26Z","timestamp":1764747926000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11257463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wimob66857.2025.11257463","relation":{},"subject":[],"published":{"date-parts":[[2025,10,20]]}}}