{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T00:25:07Z","timestamp":1767831907412,"version":"3.49.0"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T00:00:00Z","timestamp":1767830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T00:00:00Z","timestamp":1767830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Phishing email attacks have evolved into a significant threat, causing substantial economic and political harm. However, existing detection methods often neglect the data heterogeneity resulting from diverse email sources and are trained on balanced email datasets, which do not accurately reflect real-world scenarios. Meanwhile, with increasing privacy protection regulations, it is crucial to develop methods that enhance phishing email detection capabilities while preserving user privacy. To address these challenges, we propose PhFL, a framework based on heterogeneous federated learning, for detecting phishing emails. PhFL decouples clients\u2019 models into representation learning models and classifiers. The representation learning models can be tailored to clients\u2019 specific needs, and the classifiers are globally shared and re-trained on the server, leveraging the class feature means generated by the representation learning models. Our framework allows each client to leverage its private data locally without providing emails to other clients or the server. The collaboration of class feature means and re-training of classifiers effectively address the challenges of class imbalance and data heterogeneity, enabling improved model performance. Experimental results demonstrate that PhFL outperforms other federated learning methods, particularly when different clients have email datasets from diverse sources and face imbalanced class distributions.<\/jats:p>","DOI":"10.1186\/s42400-025-00420-2","type":"journal-article","created":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T23:02:28Z","timestamp":1767826948000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Heterogeneous federated learning for imbalanced phishing email detection"],"prefix":"10.1186","volume":"9","author":[{"given":"Xiaoyang","family":"Yi","sequence":"first","affiliation":[]},{"given":"Linyu","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5970-0824","authenticated-orcid":false,"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zedong","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,8]]},"reference":[{"issue":"1","key":"420_CR1","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/TKDE.2015.2458858","volume":"28","author":"L Abdi","year":"2016","unstructured":"Abdi L, Hashemi S (2016) To combat multi-class imbalanced problems by means of over-sampling techniques. IEEE Trans Knowl Data Eng 28(1):238\u2013251. https:\/\/doi.org\/10.1109\/TKDE.2015.2458858","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"420_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2021.102414","volume":"110","author":"AA Alhogail","year":"2021","unstructured":"Alhogail AA, Alsabih A (2021) Applying machine learning and natural language processing to detect phishing email. Comput Secur 110:102414. https:\/\/doi.org\/10.1016\/J.COSE.2021.102414","journal-title":"Comput Secur"},{"key":"420_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2024.103843","volume":"141","author":"S Asiri","year":"2024","unstructured":"Asiri S, Xiao Y, Alzahrani S, Li T (2024) Phishingrtds: a real-time detection system for phishing attacks using a deep learning model. Comput Secur 141:103843. https:\/\/doi.org\/10.1016\/J.COSE.2024.103843","journal-title":"Comput Secur"},{"key":"420_CR4","doi-asserted-by":"publisher","unstructured":"Bethany M, Galiopoulos A, Bethany E, Karkevandi MB, Vishwamitra N, Najafirad P (2024) Large language model lateral spear phishing: a comparative study in large-scale organizational settings. CoRR https:\/\/doi.org\/10.48550\/ARXIV.2401.09727arXiv:2401.09727","DOI":"10.48550\/ARXIV.2401.09727"},{"key":"420_CR5","doi-asserted-by":"publisher","unstructured":"Chatterjee M, Namin AS (2019) Detecting phishing websites through deep reinforcement learning. In: Getov V, Gaudiot J, Yamai N, Cimato S, Chang JM, Teranishi Y, Yang J, Leong HV, Shahriar H, Takemoto M, Towey D, Takakura H, El\u00e7i A, Takeuchi S, Puri S (eds). 43rd IEEE annual computer software and applications conference, COMPSAC 2019, Milwaukee, WI, USA, July 15\u201319, 2019, Volume 2, pp 227\u2013232. IEEE. Piscataway. https:\/\/doi.org\/10.1109\/COMPSAC.2019.10211","DOI":"10.1109\/COMPSAC.2019.10211"},{"issue":"4","key":"420_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MIS.2020.2988604","volume":"35","author":"Y Chen","year":"2020","unstructured":"Chen Y, Qin X, Wang J, Yu C, Gao W (2020) Fedhealth: a federated transfer learning framework for wearable healthcare. IEEE Intell Syst 35(4):83\u201393. https:\/\/doi.org\/10.1109\/MIS.2020.2988604","journal-title":"IEEE Intell Syst"},{"key":"420_CR7","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) Xgboost: A scalable tree boosting system. In: Krishnapuram B, Shah M, Smola AJ, Aggarwal CC, Shen D, Rastogi R (eds) Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, San Francisco, CA, USA, August 13-17, 2016, pp 785\u2013794. ACM, New York. https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"420_CR8","unstructured":"Chen T, Kornblith S, Norouzi M, Hinton GE (2020) A simple framework for contrastive learning of visual representations. In: Proceedings of the 37th international conference on machine learning, ICML 2020, 13-18 July 2020, Virtual Event. Proceedings of Machine Learning Research, vol 119, pp 1597\u20131607. PMLR, New York"},{"key":"420_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2024.103780","volume":"140","author":"A Chrysanthou","year":"2024","unstructured":"Chrysanthou A, Pantis Y, Patsakis C (2024) The anatomy of deception: measuring technical and human factors of a large-scale phishing campaign. Comput Secur 140:103780. https:\/\/doi.org\/10.1016\/J.COSE.2024.103780","journal-title":"Comput Secur"},{"key":"420_CR10","first-page":"1291","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019","author":"A Cidon","year":"2019","unstructured":"Cidon A, Gavish L, Bleier I, Korshun N, Schweighauser M, Tsitkin A (2019) High precision detection of business email compromise. In: Heninger N, Traynor P (eds) 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019. USENIX Association, Berkeley, pp 1291\u20131307"},{"key":"420_CR11","unstructured":"Collins L, Hassani H, Mokhtari A, Shakkottai S (2021) Exploiting shared representations for personalized federated learning. In: Meila M, Zhang T (eds) Proceedings of the 38th international conference on machine learning, ICML 2021, 18\u201324 July 2021, Virtual Event. Proceedings of Machine Learning Research, vol 139, pp 2089\u20132099. PMLR, New York"},{"issue":"1","key":"420_CR12","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TPDS.2020.3009406","volume":"32","author":"M Duan","year":"2021","unstructured":"Duan M, Liu D, Chen X, Liu R, Tan Y, Liang L (2021) Self-balancing federated learning with global imbalanced data in mobile systems. IEEE Trans Parallel Distrib Syst 32(1):59\u201371. https:\/\/doi.org\/10.1109\/TPDS.2020.3009406","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"420_CR13","doi-asserted-by":"publisher","unstructured":"Fette I, Sadeh NM, Tomasic A (2007) Learning to detect phishing emails. In: Williamson CL, Zurko ME, Patel-Schneider PF, Shenoy PJ (eds) Proceedings of the 16th international conference on world wide Web, WWW 2007, Banff, Alberta, Canada, May 8\u201312, 2007, pp 649\u2013656. ACM, New York. https:\/\/doi.org\/10.1145\/1242572.1242660","DOI":"10.1145\/1242572.1242660"},{"key":"420_CR14","doi-asserted-by":"publisher","unstructured":"Fredrikson M, Jha S, Ristenpart T (2015) Model inversion attacks that exploit confidence information and basic countermeasures. In: Ray I, Li N, Kruegel C (eds) Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, Denver, CO, USA, October 12-16, 2015, pp 1322\u20131333. ACM, New York. https:\/\/doi.org\/10.1145\/2810103.2813677","DOI":"10.1145\/2810103.2813677"},{"key":"420_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2023.103671","volume":"139","author":"L Gallo","year":"2024","unstructured":"Gallo L, Gentile D, Ruggiero S, Botta A, Ventre G (2024) The human factor in phishing: collecting and analyzing user behavior when reading emails. Comput Secur 139:103671. https:\/\/doi.org\/10.1016\/J.COSE.2023.103671","journal-title":"Comput Secur"},{"key":"420_CR16","unstructured":"Gao C, Lowy A, Zhou X, Wright SJ (2024) Private heterogeneous federated learning without a trusted server revisited: Error-optimal and communication-efficient algorithms for convex losses. In: Forty-first international conference on machine learning, ICML 2024, Vienna, Austria, July 21-27, 2024. OpenReview.net, New York. https:\/\/openreview.net\/forum?id=sSAEhcdB9N"},{"key":"420_CR17","unstructured":"Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: a client level perspective. CoRR arXiv:1712.07557"},{"issue":"6","key":"420_CR18","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TDSC.2018.2864993","volume":"15","author":"CN Gutierrez","year":"2018","unstructured":"Gutierrez CN, Kim T, Corte RD, Avery J, Goldwasser D, Cinque M, Bagchi S (2018) Learning from the ones that got away: detecting new forms of phishing attacks. IEEE Trans Depend Secur Comput 15(6):988\u20131001. https:\/\/doi.org\/10.1109\/TDSC.2018.2864993","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"420_CR19","doi-asserted-by":"publisher","unstructured":"Han H, Wang W, Mao B (2005) Borderline-smote: A new over-sampling method in imbalanced data sets learning. In: Huang D, Zhang XS, Huang G (eds) Advances in intelligent computing, international conference on intelligent computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I. Lecture Notes in Computer Science, vol 3644, pp 878\u2013887. Springer, Berlin, German. https:\/\/doi.org\/10.1007\/11538059_91","DOI":"10.1007\/11538059_91"},{"key":"420_CR20","first-page":"1309","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019","author":"A Heijden","year":"2019","unstructured":"Heijden A, Allodi L (2019) Cognitive triaging of phishing attacks. In: Heninger N, Traynor P (eds) 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019. USENIX Association, Berkeley, pp 1309\u20131326"},{"key":"420_CR21","first-page":"1273","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019","author":"G Ho","year":"2019","unstructured":"Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner DA (2019) Detecting and characterizing lateral phishing at scale. In: Heninger N, Traynor P (eds) 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019. USENIX Association, Berkeley, pp 1273\u20131290"},{"key":"420_CR22","doi-asserted-by":"publisher","unstructured":"Islam MM, Al-Shaer E, Rahim MABU (2020) Email address mutation for proactive deterrence against lateral spear-phishing attacks. In: Park N, Sun K, Foresti S, Butler KRB, Saxena N (eds) Security and privacy in communication networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 335, pp 1\u201322. Springer, Berlin, German. https:\/\/doi.org\/10.1007\/978-3-030-63086-7_1","DOI":"10.1007\/978-3-030-63086-7_1"},{"key":"420_CR23","doi-asserted-by":"publisher","DOI":"10.1186\/S13635-016-0034-3","author":"AK Jain","year":"2016","unstructured":"Jain AK, Gupta BB (2016) A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J Inf Secur. https:\/\/doi.org\/10.1186\/S13635-016-0034-3","journal-title":"EURASIP J Inf Secur"},{"issue":"2","key":"420_CR24","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1007\/S10462-022-10195-4","volume":"56","author":"F J\u00e1\u00f1ez-Martino","year":"2023","unstructured":"J\u00e1\u00f1ez-Martino F, Ala\u00edz-Rodr\u00edguez R, Gonz\u00e1lez-Castro V, Fidalgo E, Alegre E (2023) A review of spam email detection: analysis of spammer strategies and the dataset shift problem. Artif Intell Rev 56(2):1145\u20131173. https:\/\/doi.org\/10.1007\/S10462-022-10195-4","journal-title":"Artif Intell Rev"},{"key":"420_CR25","unstructured":"Kang B, Xie S, Rohrbach M, Yan Z, Gordo A, Feng J, Kalantidis Y (2020) Decoupling representation and classifier for long-tailed recognition. In: 8th international conference on learning representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020. OpenReview.net, New York. https:\/\/openreview.net\/forum?id=r1gRTCVFvB"},{"key":"420_CR26","doi-asserted-by":"publisher","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. In: Moschitti A, Pang B, Daelemans W (eds) Proceedings of the 2014 conference on empirical methods in natural language processing, EMNLP 2014, October 25-29, 2014, Doha, Qatar, A Meeting of SIGDAT, a Special Interest Group of The ACL, pp 1746\u20131751. ACL, Stroudsburg. https:\/\/doi.org\/10.3115\/V1\/D14-1181","DOI":"10.3115\/V1\/D14-1181"},{"key":"420_CR27","doi-asserted-by":"publisher","unstructured":"Kim H, Kwak Y, Jung M, Shin J, Kim Y, Kim C (2023) Protofl: Unsupervised federated learning via prototypical distillation. In: IEEE\/CVF international conference on computer vision, ICCV 2023, Paris, France, October 1-6, 2023, pp 6447\u20136456. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/ICCV51070.2023.00595","DOI":"10.1109\/ICCV51070.2023.00595"},{"key":"420_CR28","unstructured":"Kini GR, Paraskevas O, Oymak S, Thrampoulidis C (2021) Label-imbalanced and group-sensitive classification under overparameterization. In: Ranzato M, Beygelzimer A, Dauphin YN, Liang P, Vaughan JW (eds) Advances in neural information processing systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, Virtual, pp 18970\u201318983"},{"key":"420_CR29","unstructured":"Kornblith S, Norouzi M, Lee H, Hinton GE (2019) Similarity of neural network representations revisited. In: Chaudhuri K, Salakhutdinov R (eds) Proceedings of the 36th international conference on machine learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA. Proceedings of Machine Learning Research, vol 97, pp 3519\u20133529. PMLR, New York"},{"key":"420_CR30","doi-asserted-by":"publisher","unstructured":"Lain D, Kostiainen K, Capkun S (2022) Phishing in organizations: Findings from a large-scale and long-term study. In: 43rd IEEE symposium on security and privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, pp 842\u2013859. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/SP46214.2022.9833766","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"420_CR31","doi-asserted-by":"publisher","unstructured":"Laszka A, Vorobeychik Y, Koutsoukos XD (2015) Optimal personalized filtering against spear-phishing attacks. In: Bonet B, Koenig S (eds) Proceedings of the twenty-ninth AAAI conference on artificial intelligence, January 25-30, 2015, Austin, Texas, USA, pp 958\u2013964. AAAI Press, Menlo Park. https:\/\/doi.org\/10.1609\/AAAI.V29I1.9327","DOI":"10.1609\/AAAI.V29I1.9327"},{"key":"420_CR32","unstructured":"Lee R, Fern\u00e1ndez-Marqu\u00e9s J, Hu SX, Li D, Laskaridis S, Dudziak L, Hospedales TM, Husz\u00e1r F, Lane ND (2024) Recurrent early exits for federated learning with heterogeneous clients. In: Forty-first international conference on machine learning, ICML 2024, Vienna, Austria, July 21-27, 2024. OpenReview.net, New York. https:\/\/openreview.net\/forum?id=w4B42sxNq3"},{"key":"420_CR33","doi-asserted-by":"publisher","unstructured":"Lee H, Park M, Kim J (2016) Plankton classification on imbalanced large scale database via convolutional neural networks with transfer learning. In: 2016 IEEE international conference on image processing, ICIP 2016, Phoenix, AZ, USA, September 25-28, 2016, pp 3713\u20133717. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/ICIP.2016.7533053","DOI":"10.1109\/ICIP.2016.7533053"},{"issue":"11","key":"420_CR34","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1080\/0144929X.2013.875221","volume":"33","author":"L Li","year":"2014","unstructured":"Li L, Berki E, Helenius M, Ovaska S (2014) Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? Behav Inf Technol 33(11):1136\u20131147. https:\/\/doi.org\/10.1080\/0144929X.2013.875221","journal-title":"Behav Inf Technol"},{"issue":"4","key":"420_CR35","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1007\/S10994-022-06241-5","volume":"113","author":"L Li","year":"2024","unstructured":"Li L, Zhan D, Li X (2024) Aligning model outputs for class imbalanced non-iid federated learning. Mach Learn 113(4):1861\u20131884. https:\/\/doi.org\/10.1007\/S10994-022-06241-5","journal-title":"Mach Learn"},{"key":"420_CR36","unstructured":"Liang PP, Liu T, Liu Z, Salakhutdinov R, Morency L (2020) Think locally, act globally: Federated learning with local and global representations. CoRR arXiv:2001.01523"},{"issue":"11","key":"420_CR37","doi-asserted-by":"publisher","first-page":"10598","DOI":"10.1109\/TMC.2024.3379659","volume":"23","author":"G Liao","year":"2024","unstructured":"Liao G, Luo B, Feng Y, Zhang M, Chen X (2024) Optimal mechanism design for heterogeneous client sampling in federated learning. IEEE Trans Mob Comput 23(11):10598\u201310609. https:\/\/doi.org\/10.1109\/TMC.2024.3379659","journal-title":"IEEE Trans Mob Comput"},{"key":"420_CR38","doi-asserted-by":"publisher","unstructured":"Li L, Duan M, Liu D, Zhang Y, Ren A, Chen X, Tan Y, Wang C (2021) Fedsae: a novel self-adaptive federated learning framework in heterogeneous systems. In: International joint conference on neural networks, IJCNN 2021, Shenzhen, China, July 18-22, 2021, pp 1\u201310. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9533876","DOI":"10.1109\/IJCNN52387.2021.9533876"},{"key":"420_CR39","doi-asserted-by":"publisher","unstructured":"Li Q, He B, Song D (2021) Model-contrastive federated learning. In: IEEE conference on computer vision and pattern recognition, CVPR 2021, Virtual, June 19-25, 2021, pp 10713\u201310722. Computer Vision Foundation \/ IEEE, Piscataway. https:\/\/doi.org\/10.1109\/CVPR46437.2021.01057","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"420_CR40","unstructured":"Li X, Jiang M, Zhang X, Kamp M, Dou Q (2021) Fedbn: Federated learning on non-iid features via local batch normalization. In: 9th international conference on learning representations, ICLR 2021, Virtual Event, Austria, May 3\u20137, 2021, pp 1\u201327. OpenReview.net, New York. https:\/\/openreview.net\/forum?id=6YEQUn0QICG"},{"key":"420_CR41","unstructured":"Lin T, Kong L, Stich SU, Jaggi M (2020) Ensemble distillation for robust model fusion in federated learning. In: Larochelle H, Ranzato M, Hadsell R, Balcan M, Lin H (eds) Advances in neural information processing systems 33: annual conference on neural information processing systems 2020, NeurIPS 2020, December 6-12, 2020, Virtual, pp 2351\u20132363"},{"key":"420_CR42","unstructured":"Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2020) Federated optimization in heterogeneous networks. In: Dhillon IS, Papailiopoulos DS, Sze V (eds) Proceedings of the third conference on machine learning and systems, MLSys 2020, Austin, TX, USA, March 2-4, 2020, pp 429\u2013450. mlsys.org, Austin"},{"key":"420_CR43","doi-asserted-by":"publisher","unstructured":"Liu Z, Cao W, Gao Z, Bian J, Chen H, Chang Y, Liu T (2020) Self-paced ensemble for highly imbalanced massive data classification. In: 36th IEEE international conference on data engineering, ICDE 2020, Dallas, TX, USA, April 20-24, 2020, pp 841\u2013852. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/ICDE48307.2020.00078","DOI":"10.1109\/ICDE48307.2020.00078"},{"key":"420_CR44","unstructured":"Li D, Wang J (2019) Fedmd: Heterogenous federated learning via model distillation. CoRR arXiv:1910.03581"},{"key":"420_CR45","unstructured":"Li M, Zhang X, Thrampoulidis C, Chen J, Oymak S (2021) Autobalance: Optimized loss functions for imbalanced data. In: Ranzato M, Beygelzimer A, Dauphin YN, Liang P, Vaughan JW (eds) Advances in neural information processing systems 34: annual conference on neural information processing systems 2021, NeurIPS 2021, December 6-14, 2021, Virtual, pp 3163\u20133177"},{"issue":"10","key":"420_CR46","doi-asserted-by":"publisher","first-page":"9663","DOI":"10.1109\/TMC.2024.3368473","volume":"23","author":"B Luo","year":"2024","unstructured":"Luo B, Xiao W, Wang S, Huang J, Tassiulas L (2024) Adaptive heterogeneous client sampling for federated learning over wireless networks. IEEE Trans Mob Comput 23(10):9663\u20139677. https:\/\/doi.org\/10.1109\/TMC.2024.3368473","journal-title":"IEEE Trans Mob Comput"},{"key":"420_CR47","unstructured":"Luo M, Chen F, Hu D, Zhang Y, Liang J, Feng J (2021) No fear of heterogeneity: Classifier calibration for federated learning with non-iid data. In: Ranzato M, Beygelzimer A, Dauphin YN, Liang P, Vaughan JW (eds) Advances in neural information processing systems 34: annual conference on neural information processing systems 2021, NeurIPS 2021, December 6-14, 2021, Virtual, pp 5972\u20135984"},{"issue":"6","key":"420_CR48","doi-asserted-by":"publisher","first-page":"118","DOI":"10.3390\/COMPUTERS12060118","volume":"12","author":"A Maci","year":"2023","unstructured":"Maci A, Santorsola A, Coscia A, Iannacone A (2023) Unbalanced web phishing classification through deep reinforcement learning. Comput 12(6):118. https:\/\/doi.org\/10.3390\/COMPUTERS12060118","journal-title":"Comput"},{"key":"420_CR49","doi-asserted-by":"publisher","unstructured":"Maci A, Tamma N, Coscia A (2024) Deep reinforcement learning-based malicious URL detection with feature selection. In: 3rd IEEE international conference on AI in cybersecurity, ICAIC 2024, Houston, TX, USA, February 7-9, 2024, pp 1\u20137. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/ICAIC60265.2024.10433827","DOI":"10.1109\/ICAIC60265.2024.10433827"},{"key":"420_CR50","doi-asserted-by":"publisher","unstructured":"Ma B, Yin X, Tan J, Chen Y, Huang H, Wang H, Xue W, Ban X (2024) Fedst: Federated style transfer learning for non-iid image segmentation. In: Wooldridge MJ, Dy JG, Natarajan S (eds) Thirty-eighth AAAI conference on artificial intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp 4053\u20134061. AAAI Press, Menlo Park. https:\/\/doi.org\/10.1609\/AAAI.V38I5.28199","DOI":"10.1609\/AAAI.V38I5.28199"},{"key":"420_CR51","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Singh A, Zhu XJ (eds) Proceedings of the 20th international conference on artificial intelligence and statistics, AISTATS 2017, 20-22 April 2017, Fort Lauderdale, FL, USA. Proceedings of Machine Learning Research, vol 54, pp 1273\u20131282. PMLR, New York"},{"key":"420_CR52","unstructured":"Mora A, Tenison I, Bellavista P, Rish I (2024) Knowledge distillation in federated learning: A practical guide. In: Proceedings of the thirty-third international joint conference on artificial intelligence, IJCAI 2024, Jeju, South Korea, August 3-9, 2024, pp 8188\u20138196. ijcai.org, San Francisco"},{"key":"420_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2023.103545","volume":"136","author":"A Prasad","year":"2024","unstructured":"Prasad A, Chandra S (2024) Phiusiil: a diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. Comput Secur 136:103545. https:\/\/doi.org\/10.1016\/J.COSE.2023.103545","journal-title":"Comput Secur"},{"key":"420_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2024.104123","volume":"148","author":"YB Prasad","year":"2025","unstructured":"Prasad YB, Dondeti V (2025) PDSMV3-DCRNN: a novel ensemble deep learning framework for enhancing phishing detection and URL extraction. Comput Secur 148:104123. https:\/\/doi.org\/10.1016\/J.COSE.2024.104123","journal-title":"Comput Secur"},{"key":"420_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2024.110398","volume":"245","author":"F Rashid","year":"2024","unstructured":"Rashid F, Doyle B, Han SC, Seneviratne S (2024) Phishing URL detection generalisation using unsupervised domain adaptation. Comput Netw 245:110398. https:\/\/doi.org\/10.1016\/J.COMNET.2024.110398","journal-title":"Comput Netw"},{"key":"420_CR56","doi-asserted-by":"publisher","unstructured":"Rebuffi S, Kolesnikov A, Sperl G, Lampert CH (2017) icarl: Incremental classifier and representation learning. In: 2017 IEEE conference on computer vision and pattern recognition, CVPR 2017, Honolulu, HI, USA, July 21-26, 2017, pp 5533\u20135542. IEEE Computer Society, Los Alamitos. https:\/\/doi.org\/10.1109\/CVPR.2017.587","DOI":"10.1109\/CVPR.2017.587"},{"issue":"2","key":"420_CR57","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1109\/TNET.2023.3324257","volume":"32","author":"A Rodio","year":"2024","unstructured":"Rodio A, Faticanti F, Marfoq O, Neglia G, Leonardi E (2024) Federated learning under heterogeneous and correlated client availability. IEEE\/ACM Trans Netw 32(2):1451\u20131460. https:\/\/doi.org\/10.1109\/TNET.2023.3324257","journal-title":"IEEE\/ACM Trans Netw"},{"key":"420_CR58","doi-asserted-by":"publisher","unstructured":"Shang X, Lu Y, Huang G, Wang H (2022) Federated learning on heterogeneous and long-tailed data via classifier re-training with federated features. In: Raedt LD (ed) Proceedings of the thirty-first international joint conference on artificial intelligence, IJCAI 2022, Vienna, Austria, 23-29 July 2022, pp 2218\u20132224. ijcai.org, San Francisco. https:\/\/doi.org\/10.24963\/IJCAI.2022\/308","DOI":"10.24963\/IJCAI.2022\/308"},{"key":"420_CR59","doi-asserted-by":"publisher","unstructured":"Shuai X, Shen Y, Jiang S, Zhao Z, Yan Z, Xing G (2022) Balancefl: Addressing class imbalance in long-tail federated learning. In: 21st ACM\/IEEE international conference on information processing in sensor networks, IPSN 2022, Milano, Italy, May 4-6, 2022, pp 271\u2013284. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/IPSN54338.2022.00029","DOI":"10.1109\/IPSN54338.2022.00029"},{"issue":"2","key":"420_CR60","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/S10994-013-5422-Z","volume":"95","author":"MR Smith","year":"2014","unstructured":"Smith MR, Martinez TR, Giraud-Carrier CG (2014) An instance level analysis of data complexity. Mach Learn 95(2):225\u2013256. https:\/\/doi.org\/10.1007\/S10994-013-5422-Z","journal-title":"Mach Learn"},{"key":"420_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2024.104129","volume":"148","author":"D Sturman","year":"2025","unstructured":"Sturman D, Auton JC, Morrison BW (2025) Security awareness, decision style, knowledge, and phishing email detection: Moderated mediation analyses. Comput Secur 148:104129. https:\/\/doi.org\/10.1016\/J.COSE.2024.104129","journal-title":"Comput Secur"},{"key":"420_CR62","doi-asserted-by":"publisher","unstructured":"Tan Y, Long G, Liu L, Zhou T, Lu Q, Jiang J, Zhang C (2022) Fedproto: Federated prototype learning across heterogeneous clients. In: Thirty-Sixth AAAI conference on artificial intelligence, AAAI 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, IAAI 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, EAAI 2022 Virtual Event, February 22 - March 1, 2022, pp 8432\u20138440. AAAI Press, Menlo Park. https:\/\/doi.org\/10.1609\/AAAI.V36I8.20819","DOI":"10.1609\/AAAI.V36I8.20819"},{"issue":"2","key":"420_CR63","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TDSC.2021.3118931","volume":"19","author":"R Valecha","year":"2022","unstructured":"Valecha R, Mandaokar P, Rao HR (2022) Phishing email detection using persuasion cues. IEEE Trans Depend Secur Comput 19(2):747\u2013756. https:\/\/doi.org\/10.1109\/TDSC.2021.3118931","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"420_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2024.104188","volume":"148","author":"P Vidyasri","year":"2025","unstructured":"Vidyasri P, Suresh S (2025) FDN-SA: fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering. Comput Secur 148:104188. https:\/\/doi.org\/10.1016\/J.COSE.2024.104188","journal-title":"Comput Secur"},{"issue":"1","key":"420_CR65","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1109\/TMC.2024.3461852","volume":"24","author":"X Wang","year":"2025","unstructured":"Wang X, Li Z, Jin S, Zhang J (2025) Achieving linear speedup in asynchronous federated learning with heterogeneous clients. IEEE Trans Mob Comput 24(1):435\u2013448. https:\/\/doi.org\/10.1109\/TMC.2024.3461852","journal-title":"IEEE Trans Mob Comput"},{"key":"420_CR66","unstructured":"Wang L, Bian J, Zhang L, Chen C, Xu J (2024) Taming cross-domain representation variance in federated prototype learning with heterogeneous data domains. In: Globersons A, Mackey L, Belgrave D, Fan A, Paquet U, Tomczak JM, Zhang C (eds) Advances in neural information processing systems 38: annual conference on neural information processing systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10 - 15, 2024"},{"key":"420_CR67","doi-asserted-by":"publisher","unstructured":"Wang L, Xu S, Wang X, Zhu Q (2021) Addressing class imbalance in federated learning. In: Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The eleventh symposium on educational advances in artificial intelligence, EAAI 2021, Virtual Event, February 2-9, 2021, pp 10165\u201310173. AAAI Press, Menlo Park. https:\/\/doi.org\/10.1609\/AAAI.V35I11.17219","DOI":"10.1609\/AAAI.V35I11.17219"},{"key":"420_CR68","unstructured":"Wei W, Liu L, Loper M, Chow KH, Gursoy ME, Truex S, Wu Y (2020) A framework for evaluating gradient leakage attacks in federated learning. CoRR arXiv:2004.10397"},{"key":"420_CR69","unstructured":"Weng P, Hoang M, Nguyen L, Thai MT, Weng L, Hoang TN (2024) Probabilistic federated prompt-tuning with non-iid and imbalanced data. In: Globersons A, Mackey L, Belgrave D, Fan A, Paquet U, Tomczak JM, Zhang C (eds) Advances in neural information processing systems 38: annual conference on neural information processing systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10\u201315, 2024"},{"key":"420_CR70","unstructured":"Wu F, Wang X, Wang Y, Liu T, Su L, Gao J (2024) FIARSE: model-heterogeneous federated learning via importance-aware submodel extraction. In: Globersons A, Mackey L, Belgrave D, Fan A, Paquet U, Tomczak JM, Zhang C (eds) Advances in neural information processing systems 38: annual conference on neural information processing systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10\u201315, 2024"},{"key":"420_CR71","doi-asserted-by":"publisher","unstructured":"Wu N, Yu L, Jiang X, Cheng K, Yan Z (2023) Fednoro: Towards noise-robust federated learning by addressing class imbalance and label noise heterogeneity. In: Proceedings of the thirty-second international joint conference on artificial intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China, pp 4424\u20134432. ijcai.org, San Francisco. https:\/\/doi.org\/10.24963\/IJCAI.2023\/492","DOI":"10.24963\/IJCAI.2023\/492"},{"key":"420_CR72","unstructured":"Xie L, Lin M, Luan T, Li C, Fang Y, Shen Q, Wu Z (2024) Mh-pflid: Model heterogeneous personalized federated learning via injection and distillation for medical data analysis. In: Forty-first international conference on machine learning, ICML 2024, Vienna, Austria, July 21-27, 2024. OpenReview.net, New York. https:\/\/openreview.net\/forum?id=Jvh8HM9YEJ"},{"issue":"5","key":"420_CR73","doi-asserted-by":"publisher","first-page":"5446","DOI":"10.1109\/TMC.2023.3309497","volume":"23","author":"Y Xu","year":"2024","unstructured":"Xu Y, Jiang Z, Xu H, Wang Z, Qian C, Qiao C (2024) Federated learning with client selection and gradient compression in heterogeneous edge systems. IEEE Trans Mob Comput 23(5):5446\u20135461. https:\/\/doi.org\/10.1109\/TMC.2023.3309497","journal-title":"IEEE Trans Mob Comput"},{"key":"420_CR74","unstructured":"Xu H, Shen D, Wang M, Wang B (2024) Adaptive group personalization for federated mutual transfer learning. In: Forty-first international conference on machine learning, ICML 2024, Vienna, Austria, July 21-27, 2024. OpenReview.net, New York. https:\/\/openreview.net\/forum?id=DqC9XiI71U"},{"issue":"4","key":"420_CR75","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TC.2024.3353455","volume":"73","author":"B Yan","year":"2024","unstructured":"Yan B, Zhang H, Xu M, Yu D, Cheng X (2024) Fedrfq: prototype-based federated learning with reduced redundancy, minimal failure, and enhanced quality. IEEE Trans Comput 73(4):1086\u20131098. https:\/\/doi.org\/10.1109\/TC.2024.3353455","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"420_CR76","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1109\/TNSE.2020.2996612","volume":"8","author":"H Yang","year":"2021","unstructured":"Yang H, He H, Zhang W, Cao X (2021) Fedsteg: a federated transfer learning framework for secure image steganalysis. IEEE Trans Netw Sci Eng 8(2):1084\u20131094. https:\/\/doi.org\/10.1109\/TNSE.2020.2996612","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"1","key":"420_CR77","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TC.2023.3315066","volume":"73","author":"D Yao","year":"2024","unstructured":"Yao D, Pan W, Dai Y, Wan Y, Ding X, Yu C, Jin H, Xu Z, Sun L (2024) Fedgkd: toward heterogeneous federated learning via global knowledge distillation. IEEE Trans Comput 73(1):3\u201317. https:\/\/doi.org\/10.1109\/TC.2023.3315066","journal-title":"IEEE Trans Comput"},{"key":"420_CR78","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/TIFS.2024.3516564","volume":"20","author":"W Yu","year":"2025","unstructured":"Yu W, Li Q, Lopuha\u00e4-Zwakenberg M, Christensen MG, Heusdens R (2025) Provable privacy advantages of decentralized federated learning via distributed optimization. IEEE Trans Inf For Secur 20:822\u2013838. https:\/\/doi.org\/10.1109\/TIFS.2024.3516564","journal-title":"IEEE Trans Inf For Secur"},{"issue":"1","key":"420_CR79","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1186\/S42400-024-00309-6","volume":"8","author":"H Zhang","year":"2025","unstructured":"Zhang H, Shi Y, Liu M, Chen L, Wu S, Xue Z (2025) A combined feature selection approach for malicious email detection based on a comprehensive email dataset. Cybersecur 8(1):14. https:\/\/doi.org\/10.1186\/S42400-024-00309-6","journal-title":"Cybersecur"},{"issue":"1","key":"420_CR80","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/TC.2024.3477971","volume":"74","author":"B Zhang","year":"2025","unstructured":"Zhang B, Mao Y, He X, Huang H, Wu J (2025) Balancing privacy and accuracy using significant gradient protection in federated learning. IEEE Trans Comput 74(1):278\u2013292. https:\/\/doi.org\/10.1109\/TC.2024.3477971","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"420_CR81","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TPAMI.2024.3469188","volume":"47","author":"H Zhang","year":"2025","unstructured":"Zhang H, Li C, Dai W, Zheng Z, Zou J, Xiong H (2025) Stabilizing and accelerating federated learning on heterogeneous data with partial client participation. IEEE Trans Pattern Anal Mach Intell 47(1):67\u201383. https:\/\/doi.org\/10.1109\/TPAMI.2024.3469188","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"420_CR82","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/TMC.2024.3466227","volume":"24","author":"J Zhang","year":"2025","unstructured":"Zhang J, Guo S, Ma X, Xu W, Zhou Q, Guo J, Hong Z, Shan J (2025) Model decomposition and reassembly for purified knowledge transfer in personalized federated learning. IEEE Trans Mob Comput 24(1):379\u2013393. https:\/\/doi.org\/10.1109\/TMC.2024.3466227","journal-title":"IEEE Trans Mob Comput"},{"key":"420_CR83","doi-asserted-by":"publisher","unstructured":"Zhang J, Hua Y, Wang H, Song T, Xue Z, Ma R, Cao J, Guan H (2023) GPFL: simultaneously learning global and personalized feature information for personalized federated learning. In: IEEE\/CVF international conference on computer vision, ICCV 2023, Paris, France, October 1-6, 2023, pp 5018\u20135028. IEEE, Piscataway. https:\/\/doi.org\/10.1109\/ICCV51070.2023.00465","DOI":"10.1109\/ICCV51070.2023.00465"},{"key":"420_CR84","doi-asserted-by":"publisher","unstructured":"Zhang J, Liu Y, Hua Y, Cao J (2024) Fedtgp: Trainable global prototypes with adaptive-margin-enhanced contrastive learning for data and model heterogeneity in federated learning. In: Wooldridge MJ, Dy JG, Natarajan S (eds) Thirty-eighth AAAI conference on artificial intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp 16768\u201316776. AAAI Press, Menlo Park. https:\/\/doi.org\/10.1609\/AAAI.V38I15.29617","DOI":"10.1609\/AAAI.V38I15.29617"},{"key":"420_CR85","doi-asserted-by":"publisher","unstructured":"Zhao M, An B, Kiekintveld C (2016) Optimizing personalized email filtering thresholds to mitigate sequential spear phishing attacks. In: Schuurmans D, Wellman MP (eds) Proceedings of the thirtieth AAAI conference on artificial intelligence, February 12-17, 2016, Phoenix, Arizona, USA, pp 658\u2013665. AAAI Press, Menlo Park. https:\/\/doi.org\/10.1609\/AAAI.V30I1.10030","DOI":"10.1609\/AAAI.V30I1.10030"},{"issue":"1","key":"420_CR86","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TKDE.2006.17","volume":"18","author":"Z Zhou","year":"2006","unstructured":"Zhou Z, Liu X (2006) Training cost-sensitive neural networks with methods addressing the class imbalance problem. IEEE Trans Knowl Data Eng 18(1):63\u201377. https:\/\/doi.org\/10.1109\/TKDE.2006.17","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"420_CR87","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2023.103561","volume":"136","author":"E Zhu","year":"2024","unstructured":"Zhu E, Cheng K, Zhang Z, Wang H (2024) PDHF: effective phishing detection model combining optimal artificial and automatic deep features. Comput Secur 136:103561. https:\/\/doi.org\/10.1016\/J.COSE.2023.103561","journal-title":"Comput Secur"},{"issue":"2","key":"420_CR88","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TMC.2024.3476340","volume":"24","author":"J Zhu","year":"2025","unstructured":"Zhu J, Zheng H, Xu W, Wang H, He Z, Liu Y, Wang S, Sun Q (2025) Harmonizing global and local class imbalance for federated learning. IEEE Trans Mob Comput 24(2):1120\u20131131. https:\/\/doi.org\/10.1109\/TMC.2024.3476340","journal-title":"IEEE Trans Mob Comput"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00420-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00420-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00420-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T23:02:34Z","timestamp":1767826954000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00420-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,8]]},"references-count":88,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["420"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00420-2","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,8]]},"assertion":[{"value":"10 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that theyhave no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"10"}}