{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:39:24Z","timestamp":1775018364424,"version":"3.50.1"},"reference-count":30,"publisher":"Pleiades Publishing Ltd","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1134\/s0361768824700816","type":"journal-article","created":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T17:50:30Z","timestamp":1736704230000},"page":"875-899","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["SPAM: An Enhanced Performance of Security and Privacy-Aware Model over Split Learning in Consumer Electronics"],"prefix":"10.1134","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7131-1389","authenticated-orcid":false,"given":"Kaushal","family":"Kishor","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5788-9136","authenticated-orcid":false,"given":"Krishna Kant","family":"Agrawal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2634-5600","authenticated-orcid":false,"given":"Satya Prakash","family":"Yadav","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2954-1308","authenticated-orcid":false,"given":"Hardeo Kumar","family":"Thakur","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4106-0547","authenticated-orcid":false,"given":"Mahaveer Singh","family":"Naruka","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2025,1,12]]},"reference":[{"key":"3905_CR1","doi-asserted-by":"publisher","first-page":"3728","DOI":"10.1109\/TDSC.2021.3105099","volume":"19","author":"V. Koutsos","year":"2021","unstructured":"Koutsos, V., Papadopoulos, D., Chatzopoulos, D., Tarkoma, S., and Hui, P., Agora: A privacy-aware data marketplace, IEEE Trans. Dependable and Secure Comput., 2021, vol. 19, no. 6, pp. 3728\u20133740.","journal-title":"IEEE Trans. Dependable and Secure Comput."},{"key":"3905_CR2","doi-asserted-by":"crossref","unstructured":"Alromih, A., Clark, J.A., and Gope, P., Privacy-aware split learning based energy theft detection for smart grids, in Proc. Int. Conf. on Information and Communications Security, Cham: Springer International Publ., 2022, pp. 281\u2013300.","DOI":"10.1007\/978-3-031-15777-6_16"},{"key":"3905_CR3","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/COMST.2015.2425958","volume":"17","author":"S. Finster","year":"2015","unstructured":"Finster, S. and Baumgart, I., Privacy-aware smart metering: A survey, IEEE Commun. Surv. Tutorials, 2015, vol. 17, no. 2, pp. 1088\u20131101.","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"3905_CR4","doi-asserted-by":"crossref","unstructured":"Carvalho, M., Ennaffi, O., Chateau, S., and Bachir, S.A., On the design of privacy-aware cameras: A study on deep neural networks, in Proc. European Conf. on Computer Vision, Cham: Springer Nature Switzerland, 2022, pp. 223\u2013237.","DOI":"10.1007\/978-3-031-25075-0_17"},{"key":"3905_CR5","doi-asserted-by":"crossref","unstructured":"Zerr, S., Siersdorfer, S., Hare, J., and Demidova, E., Privacy-aware image classification and search, Proc. 35th Int. ACM SIGIR Conf. on Research and Development in Information Retrieval, Oregon, Aug. 2012, pp.\u00a0\u00a035\u201344.","DOI":"10.1145\/2348283.2348292"},{"key":"3905_CR6","doi-asserted-by":"crossref","unstructured":"Logeshwaran, J., Shanmugasundaram, N., and Lloret, J., L-RUBI: An efficient load-based resource utilization algorithm for bi-partite scatternet in wireless personal area networks, Int. J. Commun. Syst., 2023, vol.\u00a036, no.\u00a04, p. e5439.","DOI":"10.1002\/dac.5439"},{"key":"3905_CR7","doi-asserted-by":"crossref","unstructured":"Steil, J., Hagestedt, I., Huang, M.X., and Bulling, A., Privacy-aware eye tracking using differential privacy, Proc. 11th ACM Symp. on Eye Tracking Research & Applications, Denver, CO, June 2019, pp. 1\u20139.","DOI":"10.1145\/3314111.3319915"},{"key":"3905_CR8","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jpdc.2017.12.015","volume":"127","author":"F. Zhang","year":"2019","unstructured":"Zhang, F., Lee, V.E., Jin, R., Garg, S., Choo, K.K.R., Maasberg, M., and Cheng, C., Privacy-aware smart city: a case study in collaborative filtering recommender systems, J. Parallel Distrib. Comput., 2019, vol. 127, pp.\u00a0145\u2013159.","journal-title":"J. Parallel Distrib. Comput."},{"key":"3905_CR9","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.1109\/SURV.2014.052914.00090","volume":"16","author":"S. Finster","year":"2014","unstructured":"Finster, S. and Baumgart, I., Privacy-aware smart metering: A survey, IEEE Commun. Surv. Tutorials, 2014, vol 16, no. 3, pp. 1732\u20131745.","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"3905_CR10","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.3390\/electronics12081821","volume":"12","author":"J. Logeshwaran","year":"2023","unstructured":"Logeshwaran, J., Kiruthiga, T., Kannadasan, R., Vijayaraja, L., Alqahtani, A., Alqahtani, N., and Alsu-lami,\u00a0A.A., Smart load-based resource optimization model to enhance the performance of device-to-device communication in 5G-WPAN, Electronics, 2023, vol.\u00a012, no. 8, p. 1821.","journal-title":"Electronics"},{"key":"3905_CR11","doi-asserted-by":"crossref","unstructured":"Sp\u00e4th, J., Matschinske, J., Kamanu, F.K., Murphy, S.A., Zolotareva, O., Bakhtiari, M., and Baumbach, J., Privacy-aware multi-institutional time-to-event studies, PLOS Digital Health, 2022, vol. 1, no. 9, p.\u00a0e0000101.","DOI":"10.1371\/journal.pdig.0000101"},{"key":"3905_CR12","doi-asserted-by":"publisher","first-page":"6566","DOI":"10.1109\/JIOT.2020.2974257","volume":"7","author":"J. Sun","year":"2020","unstructured":"Sun, J., Xiong, H., Liu, X., Zhang, Y., Nie, X., and Deng, R.H., Lightweight and privacy-aware fine-grained access control for IoT-oriented smart health, IEEE Internet Things J., 2020, vol. 7, no. 7, pp. 6566\u20136575.","journal-title":"IEEE Internet Things J."},{"key":"3905_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.pmcj.2015.01.006","volume":"25","author":"I. Bilogrevic","year":"2016","unstructured":"Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., and Hubaux, J.P., A machine-learning based approach to privacy-aware information-sharing in mobile social networks, Pervasive Mobile Comput., 2016, vol. 25, pp. 125\u2013142.","journal-title":"Pervasive Mobile Comput."},{"key":"3905_CR14","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.comnet.2018.11.019","volume":"148","author":"U. Sarfraz","year":"2019","unstructured":"Sarfraz, U., Alam, M., Zeadally, S., and Khan, A., Privacy aware IOTA ledger: decentralized mixing and unlinkable IOTA transactions, Comput. Networks, 2019, vol. 148, pp. 361\u2013372.","journal-title":"Comput. Networks"},{"key":"3905_CR15","doi-asserted-by":"crossref","unstructured":"Kanwal, T., Jabbar, A.A., Anjum, A., Malik, S.U., Khan, A., Ahmad, N., and Balubaid, M.A., Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud, Int. J. Distrib. Sensor Networks, 2019, vol. 15, no.\u00a06, p. 1550147719846050.","DOI":"10.1177\/1550147719846050"},{"key":"3905_CR16","doi-asserted-by":"crossref","unstructured":"Bhardwaj, A., Al-Turjman, F., Sapra, V., Kumar, M., and Stephan, T., Privacy-aware detection framework to mitigate new-age phishing attacks, Comput. Electr. Eng., 2021, vol. 96, p. 107546.","DOI":"10.1016\/j.compeleceng.2021.107546"},{"key":"3905_CR17","doi-asserted-by":"crossref","unstructured":"Zhao, S., Bharati, R., Borcea, C., and Chen, Y., Privacy-aware federated learning for page recommendation, Proc. IEEE Int. Conf. on Big Data (Big Data), Virtual, Dec. 2020, pp. 1071\u20131080.","DOI":"10.1109\/BigData50022.2020.9377942"},{"key":"3905_CR18","doi-asserted-by":"crossref","unstructured":"Mothukuri, V., Parizi, R.M., Pouriyeh, S., and Mashhadi, A., CloudFL: A zero-touch federated learning framework for privacy-aware sensor cloud, Proc. 17th Int. Conf. on Availability, Reliability and Security, Vienna, Aug. 2022, pp. 1\u20138.","DOI":"10.1145\/3538969.3543783"},{"key":"3905_CR19","doi-asserted-by":"crossref","unstructured":"Ahamed, F., Shahrestani, S., and Cheung, H., Privacy-aware IoT based fall detection with infrared sensors and deep learning, in Proc. Int. Conf. on Interactive Collaborative Robotics, Cham: Springer Nature Switzerland, 2023, pp. 392\u2013401.","DOI":"10.1007\/978-3-031-35308-6_33"},{"key":"3905_CR20","doi-asserted-by":"crossref","unstructured":"Stach, C., Secure candy castle\u2014A prototype for privacy-aware mhealth apps, Proc. 17th IEEE Int. Conf. on Mobile Data Management (MDM), Porto, June 2016, vol. 1, pp. 361\u2013364.","DOI":"10.1109\/MDM.2016.64"},{"key":"3905_CR21","doi-asserted-by":"crossref","unstructured":"Hassan, K.N. and Haque, M.A., SS+ CEDNet: Aspeech privacy aware cough detection pipeline by separating sources, Proc. 10th IEEE Region 10 Humanitarian Technology Conf. (R10-HTC), Hyderabad, Sept. 2022, pp. 32\u201337.","DOI":"10.1109\/R10-HTC54060.2022.9929794"},{"key":"3905_CR22","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TNSE.2019.2892583","volume":"7","author":"H. Wu","year":"2019","unstructured":"Wu, H., Wang, L., and Xue, G., Privacy-aware task allocation and data aggregation in fog-assisted spatial crowdsourcing, IEEE Trans. Network Sci. Eng., 2019, vol. 7, no. 1, pp. 589\u2013602.","journal-title":"IEEE Trans. Network Sci. Eng."},{"key":"3905_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2009.102","volume":"7","author":"Q. Ni","year":"2009","unstructured":"Ni, Q., Bertino, E., Lobo, J., and Calo, S.B., Privacy-aware role-based access control, IEEE Secur. Privacy, 2009, vol. 7, no. 4, pp. 35\u201343.","journal-title":"IEEE Secur. Privacy"},{"key":"3905_CR24","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1134\/S0361768824700130","volume":"50","author":"N.Q. Luc","year":"2024","unstructured":"Luc, N.Q., Nguyen, T.T., Vu, C.H., et al., Secure messaging application development: Based on post-quantum algorithms CSIDH, Falcon, and AES symmetric key cryptosystem, Program. Comput. Software, 2024, vol. 50, pp. 322\u2013333. https:\/\/doi.org\/10.1134\/S0361768824700130","journal-title":"Program. Comput. Software"},{"key":"3905_CR25","doi-asserted-by":"crossref","unstructured":"Konno, T., Awai, S., and Chikano, M., Privacy-aware user watching system using 2D pose estimation, Proc. 9th IEEE Global Conf. on Consumer Electronics (GCCE), Kobe, Oct. 2020, pp. 314\u2013315.","DOI":"10.1109\/GCCE50665.2020.9292004"},{"key":"3905_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhou, X., Chen, Y., Wang, X., and Ruan, Y., Sedic: Privacy-aware data intensive computing on hybrid clouds, Proc. 18th ACM Conf. on Computer and Communications Security, Chicago, Oct. 2011, pp. 515\u2013526.","DOI":"10.1145\/2046707.2046767"},{"key":"3905_CR27","unstructured":"K\u00f8ien, G.M, Security update and incident handling for IoT-devices a privacy-aware approach, Proc. 10th Int. Conf. on Emerging Security Information, Systems and Technologies SECURWARE 2016, Nice, 2016, pp. 309\u2013315."},{"key":"3905_CR28","doi-asserted-by":"publisher","first-page":"7868","DOI":"10.1109\/TVT.2016.2541862","volume":"65","author":"M.H. Eiza","year":"2016","unstructured":"Eiza, M.H., Ni, Q., and Shi, Q., Secure and privacy-aware cloud-assisted video reporting service in 5G-enabled vehicular networks, IEEE Trans. Veh. Technol., 2016, vol. 65, no. 10, pp. 7868\u20137881.","journal-title":"IEEE Trans. Veh. Technol."},{"key":"3905_CR29","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TDSC.2017.2679711","volume":"16","author":"G. Acs","year":"2017","unstructured":"Acs, G., Conti, M., Gasti, P., Ghali, C., Tsudik, G., and Wood, C.A., Privacy-aware caching in information-centric networking, IEEE Trans. Dependable Secure Comput., 2017, vol. 16, no. 2, pp. 313\u2013328.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"3905_CR30","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1134\/S0361768823040126","volume":"49","author":"A.M. Vulfin","year":"2023","unstructured":"Vulfin, A.M., Detection of network attacks in a heterogeneous industrial network based on machine learning, Program. Comput. Software, 2023, vol. 49, pp. 333\u2013345. https:\/\/doi.org\/10.1134\/S0361768823040126","journal-title":"Program. Comput. Software"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768824700816.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768824700816","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768824700816.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:52:00Z","timestamp":1775011920000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768824700816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["3905"],"URL":"https:\/\/doi.org\/10.1134\/s0361768824700816","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"29 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}},{"value":"Source data and their information are mentioned in the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"CODE AVAILABILITY"}}]}}