{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:36:14Z","timestamp":1775579774942,"version":"3.50.1"},"reference-count":36,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063734","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:13:06Z","timestamp":1745208786000},"page":"4623-4658","source":"Crossref","is-referenced-by-count":3,"title":["Securing Internet of Things Devices with Federated Learning: A Privacy-Preserving Approach for Distributed Intrusion Detection"],"prefix":"10.32604","volume":"83","author":[{"given":"Sulaiman Al","family":"Amro","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.3390\/electronics12163382","article-title":"Enhancing privacy-preserving intrusion detection through federated learning","volume":"12","author":"Singh","year":"2023","journal-title":"Electronics"},{"key":"ref2","first-page":"20341","article-title":"Privacy-preserving federated learning for intrusion detection in IoT environments: a survey","volume":"12","author":"Hwang","year":"2024","journal-title":"IEEE Access"},{"key":"ref3","author":"Andras","year":"2021","journal-title":"A review of privacy-preserving federated learning for the Internet-of-Things"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3695998","article-title":"Towards enhancing privacy-preservation of a federated learning CNN intrusion detection system in IoT: method and empirical study","volume":"34","author":"Torre","year":"2025","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"ref5","first-page":"134231","article-title":"An ensemble multi-view federated learning intrusion detection for IoT","volume":"9","author":"Parizi","year":"2021","journal-title":"IEEE Access"},{"key":"ref6","first-page":"4258","article-title":"Two-level privacy-preserving framework: federated learning for attack detection in the consumer IoT","volume":"70","author":"Hwang","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref7","first-page":"108299","article-title":"Evaluating federated learning for intrusion detection in Internet of Things: review and challenges","volume":"201","author":"Gonz\u00e1lez-Vidal","year":"2022","journal-title":"Comput Netw"},{"key":"ref8","first-page":"342","article-title":"Federated learning for distributed IIoT intrusion detection using transfer approaches","volume":"19","author":"Hang","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref9","series-title":"2024 IEEE International Conference on Big Data & Machine Learning (ICBDML)","article-title":"Privacy-preserving detection of DDoS attacks in IoT using federated learning techniques","author":"Banerjee","year":"2024 Feb 24\u201325"},{"key":"ref10","first-page":"8123","article-title":"Blockchain-based federated learning for IoT security","volume":"8","author":"Wang","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref11","series-title":"2024 IEEE 22nd Mediterranean Electrotechnical Conference (MELECON)","article-title":"Privacy-preserving defense: intrusion detection in IoT using federated learning","author":"Teixeira","year":"2024 Jun 25\u201327"},{"key":"ref12","first-page":"7778","article-title":"Security and privacy-enhanced federated learning for anomaly detection in IoT infrastructures","volume":"17","author":"Xie","year":"2021","journal-title":"IEEE Trans Ind Inform"},{"key":"ref13","series-title":"ICC 2024-IEEE International Conference on Communications","first-page":"2402","article-title":"A novel federated learning based intrusion detection system for IoT networks","author":"Benameur","year":"2024"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"158","DOI":"10.3390\/network3010008","article-title":"A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks","volume":"3","author":"Rashid","year":"2023","journal-title":"Network"},{"key":"ref15","series-title":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","article-title":"Federated mimic learning for privacy-preserving intrusion detection","author":"Al-Shammari","year":"2020 May 26\u201329"},{"key":"ref16","first-page":"200","article-title":"FELIDS: federated learning-based intrusion detection system for agricultural internet of things","volume":"151","author":"Shu","year":"2022","journal-title":"Parallel Distrib Comput"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"103097","DOI":"10.1016\/j.cose.2023.103097","article-title":"2DF-IDS: decentralized and differentially private federated learning-based intrusion detection system for industrial IoT","volume":"127","author":"Friha","year":"2023","journal-title":"Comput Secur"},{"key":"ref18","first-page":"4829","article-title":"Intrusion detection based on privacy-preserving federated learning for the industrial IoT","volume":"18","author":"Gonz\u00e1lez-Vidal","year":"2021","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref19","series-title":"Network and System Security: 15th International Conference","article-title":"A secure and privacy-preserving federated learning approach for IoT intrusion detection system","author":"Duy","year":"2021 Oct 23"},{"key":"ref20","first-page":"1135","article-title":"Secure aggregation for federated learning in IoT environments","volume":"19","author":"Patel","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref21","first-page":"8409","article-title":"Semisupervised federated-learning-based intrusion detection method for Internet of Things","volume":"9","author":"Xue","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/MNET.011.2000286","article-title":"Internet of Things intrusion detection: centralized, on-device, or federated learning?","volume":"34","author":"Talhi","year":"2020","journal-title":"IEEE Netw"},{"key":"ref23","first-page":"1344","article-title":"Differentially private federated learning for privacy-preserving intrusion detection in IoT","volume":"16","author":"Yang","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref24","series-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 dataset","author":"Tavallaee","year":"2009 Jul 8\u221210"},{"key":"ref25","unstructured":"Moustafa D. BoT-IoT dataset: generating IoT network intrusion dataset. Canberra, Australia: Cyber Range Lab of the Australian Centre for Cyber Security (ACCS), UNSW Canberra; 2018."},{"key":"ref26","series-title":"Proceedings of the 2015 IEEE Military Communications and Information Systems Conference (MilCIS)","first-page":"1","article-title":"The UNSW-NB15 dataset for network intrusion detection systems (NIDS) and machine learning","author":"Moustafa","year":"2015 Nov 10\u201312"},{"key":"ref27","first-page":"1273","author":"McMahan","year":"2017 Apr 20\u201322","journal-title":"Artificial Intelligence and Statistics (AISTATS)"},{"key":"ref28","first-page":"50","article-title":"Federated learning: challenges, methods, and future directions","volume":"37","author":"Li","year":"2020","journal-title":"IEEE Signal Process Mag"},{"key":"ref29","series-title":"International Conference on Machine Learning (ICML)","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","author":"Karimireddy","year":"2020 Jul 13\u201318"},{"key":"ref30","series-title":"2010 IEEE Symposium on Security and Privacy","first-page":"305","article-title":"Outside the closed world: on using machine learning for network intrusion detection","author":"Sommer","year":"2010 May 16\u201319"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3339474","article-title":"Federated machine learning: concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans Intell Syst Technol"},{"key":"ref32","series-title":"International Conference on Theory and Applications of Models of Computation","first-page":"1","article-title":"Differential privacy: a survey of results","author":"Dwork","year":"2008 Apr 25\u201329"},{"key":"ref33","series-title":"2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS)","article-title":"Understanding distributed poisoning attack in federated learning","author":"Cao","year":"2019"},{"key":"ref34","series-title":"International Conference on Learning Representations (ICLR)","article-title":"Witches\u2019 brew: industrial scale data poisoning via gradient matching","author":"Geiping","year":"2021 May 3\u20137"},{"key":"ref35","series-title":"European Symposium on Research in Computer Security","article-title":"Have you poisoned my data? Defending neural networks against data poisoning","author":"De Gaspari","year":"2024 Sep 16\u201320"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1109\/TDSC.2023.3288215","article-title":"Federated learning as a medium for covert communication","volume":"21","author":"Hitaj","year":"2024","journal-title":"IEEE Trans Dependable Secur Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63734\/TSP_CMC_63734.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:30:56Z","timestamp":1763343056000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":36,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063734","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}