{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:11:47Z","timestamp":1776784307814,"version":"3.51.2"},"reference-count":34,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066498","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T03:41:45Z","timestamp":1750650105000},"page":"3943-3960","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning"],"prefix":"10.32604","volume":"84","author":[{"given":"Fatima","family":"Asiri","sequence":"first","affiliation":[]},{"given":"Wajdan Al","family":"Malwi","sequence":"additional","affiliation":[]},{"given":"Fahad","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Mohammed S.","family":"Alshehri","sequence":"additional","affiliation":[]},{"given":"Tamara","family":"Zhukabayeva","sequence":"additional","affiliation":[]},{"given":"Syed Aziz","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","article-title":"A survey on the edge computing for the Internet of Things","volume":"6","author":"Yu","year":"2017","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","article-title":"A survey on security and privacy issues in edge-computing-assisted internet of things","volume":"8","author":"Alwarafy","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3744","DOI":"10.3390\/s22103744","article-title":"Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets","volume":"22","author":"Gyamfi","year":"2022","journal-title":"Sensors"},{"key":"ref4","first-page":"52509","article-title":"Design of an intrusion detection model for IoT-enabled smart home","volume":"11","author":"Rani","year":"2023","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"117761","DOI":"10.1109\/ACCESS.2024.3422999","article-title":"Optimizing smart home intrusion detection with harmony-enhanced extra trees","volume":"12","author":"Abdusalomov","year":"2024","journal-title":"IEEE Access"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"5206","DOI":"10.3390\/en16135206","article-title":"Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems","volume":"16","author":"Mtukushe","year":"2023","journal-title":"Energies"},{"key":"ref7","first-page":"1801","article-title":"Towards machine learning based intrusion detection in IoT networks","volume":"69","author":"Islam","year":"2021","journal-title":"Comput Mater Contin"},{"key":"ref8","first-page":"4149","article-title":"Robust network security: a deep learning approach to intrusion detection in IoT","volume":"81","author":"Odeh","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref9","first-page":"881","article-title":"5DGWO-GAN: a novel five-dimensional gray wolf optimizer for generative adversarial network-enabled intrusion detection in IoT systems","volume":"82","author":"Khatami","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TCE.2023.3277856","article-title":"An intelligent intrusion detection system for smart consumer electronics network","volume":"69","author":"Javeed","year":"2023","journal-title":"IEEE Trans Consum Electron"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"110072","DOI":"10.1016\/j.comnet.2023.110072","article-title":"TNN-IDS: transformer neural network-based intrusion detection system for MQTT-enabled IoT networks","volume":"237","author":"Ullah","year":"2023","journal-title":"Comput Netw"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"7988","DOI":"10.1109\/TII.2022.3170347","article-title":"When federated learning meets game theory: a cooperative framework to secure IIoT applications on edge computing","volume":"18","author":"Abou El Houda","year":"2022 Apr 26","journal-title":"IEEE Trans Ind Inform"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.comcom.2020.01.005","article-title":"Anomaly detection in wireless sensor network using machine learning algorithm","volume":"151","author":"Poornima","year":"2020","journal-title":"Comput Commun"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"100059","DOI":"10.1016\/j.iot.2019.100059","article-title":"Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches","volume":"7","author":"Hasan","year":"2019","journal-title":"Internet Things"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439950","article-title":"Deep learning for anomaly detection: a review","volume":"54","author":"Pang","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"446","DOI":"10.3390\/s21020446","article-title":"An experimental analysis of attack classification using machine learning in IoT networks","volume":"21","author":"Churcher","year":"2021","journal-title":"Sensors"},{"key":"ref17","first-page":"4109","article-title":"Cuckoo search-optimized deep CNN for enhanced cyber security in IoT networks","volume":"81","author":"Gupta","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","article-title":"Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref19","first-page":"4535","article-title":"An intrusion detection system based on HiTar-2024 dataset generation from LOG files for smart industrial internet-of-things environment","volume":"82","author":"Dhaouadi","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref20","first-page":"3223","article-title":"End-to-end encryption enabled lightweight mutual authentication scheme for resource constrained IoT network","volume":"82","author":"Ullah","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"4976","DOI":"10.1109\/TCE.2024.3373126","article-title":"Resource-constraint deep forest based intrusion detection method in internet of things for consumer electronic","volume":"70","author":"Chen","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system","volume":"9","author":"Zhou","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.future.2023.09.028","article-title":"EGNN: energy-efficient anomaly detection for IoT multivariate time series data using graph neural network","volume":"151","author":"Guo","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.comcom.2023.01.004","article-title":"AERF: adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing","volume":"200","author":"Jiang","year":"2023","journal-title":"Comput Commun"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"12588","DOI":"10.1109\/JIOT.2021.3077449","article-title":"Deep-learning-enhanced multitarget detection for end-edge\u2013cloud surveillance in smart IoT","volume":"8","author":"Zhou","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","article-title":"A private and efficient mechanism for data uploading in smart cyber-physical systems","volume":"7","author":"Cai","year":"2018","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"53646","DOI":"10.1109\/ACCESS.2024.3387529","article-title":"An edge computing-based preventive framework with machine learning-integration for anomaly detection and risk management in maritime wireless communications","volume":"12","author":"Algarni","year":"2024","journal-title":"IEEE Access"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"7104","DOI":"10.3390\/app14167104","article-title":"Combining edge computing-assisted internet of things security with artificial intelligence: applications, challenges, and opportunities","volume":"14","author":"Rupanetti","year":"2024","journal-title":"Appl Sci"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"302","DOI":"10.3390\/electronics10030302","article-title":"Edge computing for data anomaly detection of multi-sensors in underground mining","volume":"10","author":"Liu","year":"2021","journal-title":"Electronics"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3480172","article-title":"Adaptive anomaly detection for internet of things in hierarchical edge computing: a contextual-bandit approach","volume":"3","author":"Ngo","year":"2021","journal-title":"ACM Trans Internet Things"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"4763","DOI":"10.1109\/JIOT.2023.3300073","article-title":"Wireless IoT monitoring system in Hong Kong\u2013Zhuhai\u2013Macao bridge and edge computing for anomaly detection","volume":"11","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10586-021-03472-4","article-title":"An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing","volume":"26","author":"Mansour","year":"2023","journal-title":"Cluster Comput"},{"key":"ref33","series-title":"International Conference on Algorithms and Architectures for Parallel Processing","first-page":"261","article-title":"A dual defense self-balancing framework against bilateral model attacks in federated learning","author":"Wu","year":"2024"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"107706","DOI":"10.1016\/j.future.2025.107706","article-title":"FedShufde: a privacy preserving framework of federated learning for edge-based smart UAV delivery system","volume":"166","author":"Yao","year":"2025","journal-title":"Future Gener Comput Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_66498\/TSP_CMC_66498.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:54:03Z","timestamp":1763344443000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066498","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}