{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:10:32Z","timestamp":1768241432964,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T00:00:00Z","timestamp":1765065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":36,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01338-9","type":"journal-article","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T20:44:59Z","timestamp":1765140299000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A temporal federated learning of neural network for enhancing controllability temporal network robustness on federated social internet of things networks"],"prefix":"10.1186","volume":"13","author":[{"given":"Xiang","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Peyman","family":"Arebi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,7]]},"reference":[{"key":"1338_CR1","doi-asserted-by":"crossref","unstructured":"Duan Y, Nurek M, Guan Q, Michalski R, Holme P. Temporal Link Prediction in Social Networks Based on Agent Behavior Synchrony and a Cognitive Mechanism, arXiv preprint arXiv:2406.06814, 2024.","DOI":"10.1109\/TCSS.2025.3547120"},{"key":"1338_CR2","unstructured":"Heeg F, Scholtes I. Using Time-Aware Graph Neural Networks to Predict Temporal Centralities in Dynamic Graphs, in The Thirty-eighth Annual Conference on Neural Information Processing Systems, 2024."},{"issue":"1","key":"1338_CR3","doi-asserted-by":"publisher","first-page":"3752","DOI":"10.1038\/s41598-023-30810-w","volume":"13","author":"S Alizadeh","year":"2023","unstructured":"Alizadeh S, P\u00f3sfai M, Ghasemi A. Input node placement restricting the longest control chain in controllability of complex networks. Sci Rep. 2023;13(1):3752.","journal-title":"Sci Rep"},{"key":"1338_CR4","unstructured":"Said A, Ahmad OU, Abbas W, Shabbir M, Koutsoukos X. Network controllability perspectives on graph representation. IEEE Trans Knowl Data Eng. 2023;36(8)."},{"issue":"18","key":"1338_CR5","doi-asserted-by":"publisher","first-page":"7792","DOI":"10.3390\/s23187792","volume":"23","author":"X Fernando","year":"2023","unstructured":"Fernando X, L\u0103z\u0103roiu G. Spectrum sensing, clustering algorithms, and energy-harvesting technology for cognitive-radio-based internet-of-things networks. Sensors. 2023;23(18):7792.","journal-title":"Sensors"},{"key":"1338_CR6","doi-asserted-by":"crossref","unstructured":"Shahab S, Agarwal P, Mufti T, Obaid AJ. SIoT (Social Internet of Things): a review. In: Fong S, Dey N, Joshi A, editors. ICT analysis and applications. Lecture notes in networks and systems, vol. 314. Singapore; Springer: 2022.","DOI":"10.1007\/978-981-16-5655-2_28"},{"issue":"1","key":"1338_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/fi13010004","volume":"13","author":"A Zannou","year":"2020","unstructured":"Zannou A, Boulaalam A, Nfaoui EH. Siot: a new strategy to improve the network lifetime with an efficient search process. Future Internet. 2020;13(1):4.","journal-title":"Future Internet"},{"key":"1338_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2024.101992","volume":"105","author":"Z Aghaee","year":"2024","unstructured":"Aghaee Z, Fatemi A, Arebi P. A controllability method on the social Internet of Things (SIoT) network. Pervasive Mob Comput. 2024;105:101992.","journal-title":"Pervasive Mob Comput"},{"issue":"1","key":"1338_CR9","doi-asserted-by":"publisher","DOI":"10.1155\/cplx\/2919169","volume":"2025","author":"W Deng","year":"2025","unstructured":"Deng W, Deng J, Arebi P. Detection of effective devices in information dissemination on the complex social internet of things networks based on device centrality measures. Complexity. 2025;2025(1):2919169.","journal-title":"Complexity"},{"key":"1338_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejcon.2024.101046","volume":"80","author":"LCG Lebon","year":"2024","unstructured":"Lebon LCG, Lo Iudice F, Altafini C. On controllability of temporal networks. Eur J Control. 2024;80:101046.","journal-title":"Eur J Control"},{"issue":"3","key":"1338_CR11","doi-asserted-by":"publisher","first-page":"101976","DOI":"10.1016\/j.jksuci.2024.101976","volume":"36","author":"F Li","year":"2024","unstructured":"Li F. Improving the efficiency of network controllability processes on temporal networks. J King Saud University-Computer Inform Sci. 2024;36(3):101976.","journal-title":"J King Saud University-Computer Inform Sci"},{"issue":"3","key":"1338_CR12","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1049\/cth2.12228","volume":"16","author":"Y Cui","year":"2022","unstructured":"Cui Y, Wu M, Shao C, He S. A temporal segmentation algorithm for restoring the controllability of networked control systems. IET Control Theory Appl. 2022;16(3):318\u201329.","journal-title":"IET Control Theory Appl"},{"issue":"12","key":"1338_CR13","doi-asserted-by":"publisher","first-page":"7692","DOI":"10.1109\/TSMC.2022.3161408","volume":"52","author":"F Jing","year":"2022","unstructured":"Jing F, Liu C, Wu J-L, Zhang Z-K. Toward structural controllability and predictability in directed networks. IEEE Trans Syst Man Cybern Syst. 2022;52(12):7692\u2013701.","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"7","key":"1338_CR14","doi-asserted-by":"publisher","first-page":"1571","DOI":"10.1109\/JAS.2023.123504","volume":"10","author":"L Wang","year":"2023","unstructured":"Wang L, Li Z, Zhao G, Guo G, Kong Z. Input structure design for structural controllability of complex networks. IEEE CAA J Autom Sin. 2023;10(7):1571\u201381.","journal-title":"IEEE CAA J Autom Sin"},{"issue":"7","key":"1338_CR15","doi-asserted-by":"publisher","first-page":"4673","DOI":"10.1109\/TAC.2024.3355806","volume":"69","author":"K Sato","year":"2024","unstructured":"Sato K, Terasaki S. Controllability scores for selecting control nodes of large-scale network systems. IEEE Trans Automat Contr. 2024;69(7):4673\u201380.","journal-title":"IEEE Trans Automat Contr"},{"issue":"1","key":"1338_CR16","volume":"1","author":"G Chen","year":"2022","unstructured":"Chen G. Controllability robustness of complex networks. J Autom Intell. 2022;1(1):100004.","journal-title":"J Autom Intell"},{"key":"1338_CR17","doi-asserted-by":"publisher","first-page":"5103","DOI":"10.1109\/ACCESS.2022.3141011","volume":"10","author":"Y Lou","year":"2022","unstructured":"Lou Y, Yang D, Wang L, Tang C-B, Chen G. Controllability robustness of Henneberg-growth complex networks. IEEE Access. 2022;10:5103\u201314.","journal-title":"IEEE Access"},{"key":"1338_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3391793","author":"Y Zhang","year":"2024","unstructured":"Zhang Y, Ding J, Li X. Network controllability robustness learning via spatial graph neural networks. IEEE Trans Netw Sci Eng. 2024;11(5). https:\/\/doi.org\/10.1109\/TNSE.2024.3391793.","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1338_CR19","doi-asserted-by":"crossref","unstructured":"Wang F, Kooij R. Robustness of network controllability with respect to node removals, in International Conference on Complex Networks and Their Applications, 2022, pp. 383\u2013394.","DOI":"10.1007\/978-3-031-21131-7_30"},{"issue":"5","key":"1338_CR20","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1504\/IJCNDS.2023.133163","volume":"29","author":"P Geng","year":"2023","unstructured":"Geng P, Yang A, Wei L, Chen R, Pan Z. Effect of different attack strategies on controllability robustness of directed complex networks. Int J Communication Networks Distrib Syst. 2023;29(5):513\u201331.","journal-title":"Int J Communication Networks Distrib Syst"},{"issue":"10","key":"1338_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/cancers15102714","volume":"15","author":"A Meyer-Baese","year":"2023","unstructured":"Meyer-Baese A, et al. Controllability and robustness of functional and structural connectomic networks in glioma patients. Cancers (Basel). 2023;15(10):2714.","journal-title":"Cancers (Basel)"},{"issue":"7","key":"1338_CR22","doi-asserted-by":"publisher","first-page":"4531","DOI":"10.1109\/TCYB.2022.3207878","volume":"53","author":"Y Lou","year":"2022","unstructured":"Lou Y, Wu R, Li J, Wang L, Li X, Chen G. A learning convolutional neural network approach for network robustness prediction. IEEE Trans Cybern. 2022;53(7):4531\u201344.","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"1338_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.31763\/ijrcs.v2i1.523","volume":"2","author":"AJ Abougarair","year":"2022","unstructured":"Abougarair AJ, Aburakhis MKI, Edardar MM. Adaptive neural networks based robust output feedback controllers for nonlinear systems. Int J Rob Control Syst. 2022;2(1):37\u201356.","journal-title":"Int J Rob Control Syst"},{"issue":"10","key":"1338_CR24","first-page":"2374","volume":"48","author":"L Yang","year":"2022","unstructured":"Yang L, Jun-Li L, Sheng L, Hao D. Recent prog\u2043 Ress in controllability robustness of complex networks. Acta Autom Sin. 2022;48(10):2374\u201391.","journal-title":"Acta Autom Sin"},{"issue":"5","key":"1338_CR25","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1108\/RIA-04-2023-0048","volume":"43","author":"Z Wang","year":"2023","unstructured":"Wang Z, Huang Q, Yu J. Neural network-based direct robust adaptive non-fragile fault-tolerant control of amorphous flattened air-ground wireless self-assembly system. Robotic Intell Autom. 2023;43(5):537\u201350.","journal-title":"Robotic Intell Autom"},{"key":"1338_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100851","volume":"23","author":"X-H Nguyen","year":"2023","unstructured":"Nguyen X-H, Le K-H. Robust detection of unknown DoS\/DDoS attacks in IoT networks using a hybrid learning model. Internet of Things. 2023;23:100851.","journal-title":"Internet of Things"},{"issue":"7","key":"1338_CR27","doi-asserted-by":"publisher","first-page":"5733","DOI":"10.1109\/JIOT.2022.3151945","volume":"10","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, et al. Robust semisupervised federated learning for images automatic recognition in internet of drones. IEEE Internet Things J. 2022;10(7):5733\u201346.","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1338_CR28","doi-asserted-by":"publisher","first-page":"14402","DOI":"10.48084\/etasr.7115","volume":"14","author":"S Othmen","year":"2024","unstructured":"Othmen S, Mansouri W, Asklany S. Robust and secure routing protocol based on group key management for internet of things systems. Eng Technol Appl Sci Res. 2024;14(3):14402\u201310.","journal-title":"Eng Technol Appl Sci Res"},{"key":"1338_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100699","volume":"22","author":"AS Dina","year":"2023","unstructured":"Dina AS, Siddique AB, Manivannan D. A deep learning approach for intrusion detection in Internet of Things using focal loss function. Internet of Things. 2023;22:100699.","journal-title":"Internet of Things"},{"issue":"1","key":"1338_CR30","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/JIOT.2022.3203559","volume":"10","author":"L Deng","year":"2022","unstructured":"Deng L, Yang J, Yuan S, Zou H, Lu CX, Xie L. Gaitfi: robust device-free human identification via WiFi and vision multimodal learning. IEEE Internet Things J. 2022;10(1):625\u201336.","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"1338_CR31","doi-asserted-by":"publisher","first-page":"8726","DOI":"10.1109\/TNNLS.2022.3216981","volume":"35","author":"L Lyu","year":"2022","unstructured":"Lyu L, et al. Privacy and robustness in federated learning: attacks and defenses. IEEE Trans Neural Netw Learn Syst. 2022;35(7):8726\u201346.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1338_CR32","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.future.2024.04.009","volume":"158","author":"S Nabavirazavi","year":"2024","unstructured":"Nabavirazavi S, Taheri R, Iyengar SS. Enhancing federated learning robustness through randomization and mixture. Future Gener Comput Syst. 2024;158:28\u201343.","journal-title":"Future Gener Comput Syst"},{"key":"1338_CR33","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/TSP.2022.3153135","volume":"70","author":"K Pillutla","year":"2022","unstructured":"Pillutla K, Kakade SM, Harchaoui Z. Robust aggregation for federated learning. IEEE Trans Signal Process. 2022;70:1142\u201354.","journal-title":"IEEE Trans Signal Process"},{"key":"1338_CR34","doi-asserted-by":"publisher","first-page":"6693","DOI":"10.1109\/TIFS.2024.3420126","volume":"19","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Karimipour H, Srivastava G, Parizi RM. A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans Inf Forensics Secur. 2024;19:6693\u2013708.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1338_CR35","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.future.2022.04.010","volume":"134","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Zhang Y, Guo D, Yao L, Li Z. SecFedNIDS: robust defense for poisoning attack against federated learning-based network intrusion detection system. Future Gener Comput Syst. 2022;134:154\u201369.","journal-title":"Future Gener Comput Syst"},{"key":"1338_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103692","volume":"140","author":"HT Truong","year":"2022","unstructured":"Truong HT, et al. Light-weight federated learning-based anomaly detection for time-series data in industrial control systems. Comput Ind. 2022;140:103692.","journal-title":"Comput Ind"},{"issue":"18","key":"1338_CR37","doi-asserted-by":"publisher","first-page":"16835","DOI":"10.1109\/JIOT.2022.3153343","volume":"9","author":"Y Li","year":"2022","unstructured":"Li Y, Chen Y, Zhu K, Bai C, Zhang J. An effective federated learning verification strategy and its applications for fault diagnosis in industrial IOT systems. IEEE Internet Things J. 2022;9(18):16835\u201349.","journal-title":"IEEE Internet Things J"},{"key":"1338_CR38","doi-asserted-by":"publisher","first-page":"53854","DOI":"10.1109\/ACCESS.2022.3173288","volume":"10","author":"TT Huong","year":"2022","unstructured":"Huong TT, et al. Federated learning-based explainable anomaly detection for industrial control systems. IEEE Access. 2022;10:53854\u201372.","journal-title":"IEEE Access"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01338-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01338-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01338-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T14:40:42Z","timestamp":1768228842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s40537-025-01338-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,7]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["1338"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01338-9","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,7]]},"assertion":[{"value":"24 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}