{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:58:14Z","timestamp":1774540694774,"version":"3.50.1"},"reference-count":33,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063242","type":"journal-article","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T03:32:37Z","timestamp":1749785557000},"page":"3893-3910","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Healthcare Data Privacy in Cloud IoT Networks Using Anomaly Detection and Optimization with Explainable AI (ExAI)"],"prefix":"10.32604","volume":"84","author":[{"given":"Jitendra Kumar","family":"Samriya","sequence":"first","affiliation":[]},{"given":"Virendra","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Gourav","family":"Bathla","sequence":"additional","affiliation":[]},{"given":"Meena","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Wadee","family":"Alhalabi","sequence":"additional","affiliation":[]},{"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"84486","DOI":"10.1109\/ACCESS.2022.3197671","article-title":"Explainable AI for Healthcare 5.0: opportunities and challenges","volume":"13","author":"Saraswat","year":"2022","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.inffus.2023.03.008","article-title":"A systematic review of trustworthy and explainable artificial intelligence in healthcare: assessment of quality, bias risk, and data fusion","volume":"96","author":"Albahri","year":"2023","journal-title":"Inf Fusion"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/s41666-022-00114-1","article-title":"Explainable artificial intelligence for predictive modeling in healthcare","volume":"6","author":"Yang","year":"2022","journal-title":"J Healthcare Inform Res"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3103","DOI":"10.3390\/su16083103","article-title":"A sustainable W-RLG model for attack detection in healthcare IoT systems","volume":"16","author":"Gupta","year":"2024","journal-title":"Sustainability"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2365","DOI":"10.1109\/JBHI.2023.3336721","article-title":"Explainable AI for medical image analysis in medical cyber-physical systems: enhancing transparency and trustworthiness of iomt","volume":"29","author":"Liu","year":"2023","journal-title":"IEEE J Biomed Health Inform"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"110119","DOI":"10.1016\/j.asoc.2023.110119","article-title":"Explainable AI in big data intelligence of community detection for digitalization e-healthcare services","volume":"136","author":"Sangaiah","year":"2023","journal-title":"Appl Soft Comput"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-030-96630-0_12","author":"Ahmed","year":"2022","journal-title":"Explainable artificial intelligence for cyber security: next generation artificial intelligenc"},{"key":"ref8","first-page":"12566","article-title":"Fog-enabled secure and efficient fine-grained searchable data sharing and management scheme for IoT-based healthcare systems","volume":"71","author":"Gupta","year":"2022","journal-title":"IEEE Trans Eng Manag"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"107763","DOI":"10.1016\/j.knosys.2021.107763","article-title":"Designing ECG monitoring healthcare system with federated transfer learning and explainable AI","volume":"236","author":"Raza","year":"2022","journal-title":"Knowl Based Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"14719","DOI":"10.1109\/ACCESS.2024.3359033","article-title":"A comparative study of anomaly detection techniques for IoT security using AMoT (adaptive machine learning for IoT threats)","volume":"12","author":"Alsalman","year":"2024","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSWIS.345934","article-title":"A secure data e-governance for healthcare application in cyber physical systems","volume":"20","author":"Rathee","year":"2024","journal-title":"Int J Sem Web Inform Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2058","DOI":"10.1109\/TCE.2023.3341696","article-title":"Adversarial ML-based secured cloud architecture for consumer Internet of Things of smart healthcare","volume":"70","author":"Samriya","year":"2023","journal-title":"IEEE Transact Consum Electr"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"14469","DOI":"10.1007\/s00500-023-09037-4","article-title":"A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things","volume":"32","author":"Xu","year":"2023","journal-title":"Soft Comput"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"19024","DOI":"10.1109\/ACCESS.2023.3246660","article-title":"Deep learning based anomaly detection for fog-assisted IoVs network","volume":"14","author":"Yaqoob","year":"2023","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"104680","DOI":"10.1016\/j.bspc.2023.104680","article-title":"Improving intrusion detection in cloud-based healthcare using neural network","volume":"83","author":"Patel","year":"2023","journal-title":"Biomed Signal Process Control"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"145869","DOI":"10.1109\/ACCESS.2023.3346320","article-title":"Machine learning for healthcare-IoT security: a review and risk mitigation","volume":"11","author":"Khatun","year":"2023","journal-title":"IEEE Access"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"24975","DOI":"10.1007\/s11227-024-06392-3","article-title":"Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things","volume":"80","author":"Bezanjani","year":"2024","journal-title":"J Supercomput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSWIS.340938","article-title":"Semantic-based optimization of deep learning for efficient real-time medical image segmentation","volume":"20","author":"Wei","year":"2024","journal-title":"Int J Sem Web Informat Syst (IJSWIS)"},{"key":"ref19","series-title":"International Conference on Emerging Trends in Expert Applications & Security","first-page":"427","article-title":"Detecting deviations: anomaly detection in healthcare IoT data streams using advanced machine learning techniques","author":"Rai","year":"2024"},{"key":"ref20","series-title":"International Conference on Smart Trends in Computing and Communications","first-page":"259","article-title":"Anomaly detection in medical IoT devices using federated learning","author":"Namratha","year":"2023"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1201\/9781003403678-16","author":"Krishnamoorthy","year":"2023","journal-title":"5G-based smart hospitals and healthcare systems"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.comcom.2024.02.023","article-title":"GEMLIDS-MIOT: a green effective machine learning intrusion detection system based on federated learning for medical IoT network security hardening","volume":"218","author":"Ioannou","year":"2024","journal-title":"Comput Commun"},{"key":"ref23","first-page":"298","article-title":"An internet-of-things-based security scheme for healthcare environment for robust location privacy","volume":"21","author":"Tewari","year":"2020","journal-title":"Int J Computat Sci Eng"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"101162","DOI":"10.1016\/j.iot.2024.101162","article-title":"A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks","volume":"31","author":"Inuwa","year":"2024","journal-title":"Int Things"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"10125","DOI":"10.1109\/TII.2022.3231424","article-title":"A secure ensemble learning-based fog-cloud approach for cyberattack detection in IoMT","volume":"19","author":"Khan","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MNET.011.2000458","article-title":"Explainable AI and mass surveillance system-based healthcare framework to combat COVID-I9 like pandemics","volume":"34","author":"Hossain","year":"2020","journal-title":"IEEE Netw"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"113859","DOI":"10.1016\/j.jbusres.2023.113859","article-title":"Analysis of security and privacy issues of information management of big data in B2B based healthcare systems","volume":"162","author":"Gupta","year":"2023","journal-title":"J Bus Res"},{"key":"ref28","first-page":"8167821","article-title":"From blackbox to explainable AI in healthcare: existing tools and case studies","volume":"2022","author":"Srinivasu","year":"2022","journal-title":"Mob Inf Syst"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"153316","DOI":"10.1109\/ACCESS.2021.3127881","article-title":"A systematic review of human-computer interaction and explainable artificial intelligence in healthcare with artificial intelligence techniques","volume":"9","author":"Nazar","year":"2021","journal-title":"IEEE Access"},{"key":"ref30","series-title":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","first-page":"481","article-title":"X-NET: explainable AI-based network data security framework for Healthcare 4.0","author":"Patel","year":"2024 Jun 9\u201313"},{"key":"ref31","series-title":"Recent Advances in Intrusion Detection, RAID 99 Conference","first-page":"829","article-title":"Results of the darpa 1998 offline intrusion detection evaluation","author":"Lippmann","year":"1999 Sep 7\u20139"},{"key":"ref32","article-title":"CAIDA UCSD DDoS 2007 Attack Dataset","author":"Shirsath","year":"2023","journal-title":"IEEE Dataport"},{"key":"ref33","first-page":"111","author":"Nehinbe","year":"2009","journal-title":"Information security and digital forensics (ISDF 2009)"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_63242\/TSP_CMC_63242.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:47:25Z","timestamp":1763344045000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063242","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}