{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:10:32Z","timestamp":1763345432654,"version":"3.45.0"},"reference-count":35,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066898","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T09:10:48Z","timestamp":1753693848000},"page":"1185-1220","source":"Crossref","is-referenced-by-count":0,"title":["FedCognis: An Adaptive Federated Learning Framework for Secure Anomaly Detection in Industrial IoT-Enabled Cognitive Cities"],"prefix":"10.32604","volume":"85","author":[{"given":"Abdulatif","family":"Alabdulatif","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"8378187","article-title":"Anomaly detection in QAR data using VAE-LSTM with multihead self-attention mechanism","volume":"2022","author":"Rong","year":"2022","journal-title":"Mob Inf Syst"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"9059","DOI":"10.1109\/TII.2024.3381790","article-title":"A robust anomaly detection model for pumps based on the spectral residual with self-attention variational autoencoder","volume":"209","author":"Xie","year":"2024","journal-title":"IEEE Trans Ind Inform"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"15964","DOI":"10.1109\/TITS.2024.3415435","article-title":"Time series anomaly detection in vehicle sensors using self-attention mechanisms","volume":"25","author":"Zhang","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref4","first-page":"129","author":"Mishra","year":"2021","journal-title":"Artificial Neural Networks and Machine Learning\u2014ICANN 2021"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"10509","DOI":"10.1007\/s00500-023-08467-4","article-title":"ALAE: self-attention reconstruction network for multivariate time series anomaly identification","volume":"27","author":"Jiang","year":"2023","journal-title":"Soft Comput"},{"key":"ref6","series-title":"Proceedings of the GLOBECOM 2020\u20142020 IEEE Global Communications Conference","article-title":"Communication-efficient federated learning for anomaly detection in industrial Internet of Things","author":"Liu","year":"2020 Dec 7\u201311"},{"key":"ref7","series-title":"Proceedings of the 2023 IEEE 5th International Conference on Artificial Intelligence Circuits and Systems (AICAS)","article-title":"Multi-head attention based Bi-LSTM for anomaly detection in multivariate ticme-series of WSN","author":"Matar","year":"2023 Jun 11\u201313"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/978-3-031-24378-3_5","author":"Najari","year":"2023","journal-title":"Advanced analytics and learning on temporal data"},{"key":"ref9","first-page":"777","author":"You","year":"2021","journal-title":"Intelligent systems and applications"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"124847","DOI":"10.1109\/ACCESS.2021.3110798","article-title":"Generative adversarial networks for abnormal event detection in videos based on self-attention mechanism","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Access"},{"key":"ref11","first-page":"102987","article-title":"Federated learning for smart cities: a comprehensive survey","volume":"55","author":"Pandya","year":"2023","journal-title":"Sustain Energy Technol Assess"},{"key":"ref12","first-page":"e1035","article-title":"Integration of federated learning with IoT for smart cities applications: challenges and opportunities","volume":"8","author":"Ghadi","year":"2022","journal-title":"PeerJ Comput Sci"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"E6230","DOI":"10.3390\/s20216230","article-title":"Federated learning in smart city sensing: challenges and opportunities","volume":"20","author":"Jiang","year":"2020","journal-title":"Sensors"},{"key":"ref14","series-title":"Proceedings of the 2021 International Conference on ICT for Smart Society (ICIS)","article-title":"Anomaly detection techniques in smart cities: a review from a framework perspective","author":"Prabow","year":"2021 Aug 2\u20134"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"Poorazad SK, Benzaid C, Taleb T. A novel buffered federated learning framework for privacy-driven anomaly detection in IIoT. arXiv:2408.08722. 2024. doi:10.48550\/arXiv.2408.08722.","DOI":"10.1109\/GLOBECOM52923.2024.10901786"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.gltp.2021.08.069","article-title":"IoT in smart cities: a contemporary survey","volume":"2","author":"Janani","year":"2021","journal-title":"Glob Transit Proc"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","article-title":"Toward accurate anomaly detection in industrial Internet of Things using hierarchical federated learning","volume":"9","author":"Wang","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"103509","DOI":"10.1016\/j.compind.2021.103509","article-title":"Detecting cyberattacks using anomaly detection in industrial control systems: a federated learning approach","volume":"132","author":"Huong","year":"2021","journal-title":"Comput Ind"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","article-title":"Federated-learning-based anomaly detection for IoT security attacks","volume":"9","author":"Mothukuri","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"158","DOI":"10.3390\/network3010008","article-title":"A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks","volume":"3","author":"Rashid","year":"2023","journal-title":"Network"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dcan.2022.02.007","article-title":"Enhancing IoT anomaly detection performance for federated learning","volume":"8","author":"Weinger","year":"2022","journal-title":"Digit Commun Netw"},{"article-title":"Enhancing quantum security over federated learning via post-quantum cryptography","series-title":"Proceedings of the 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA); 2024 Oct 28\u201331; Washington, DC, USA","author":"Li","key":"ref22"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"8442","DOI":"10.1109\/TII.2020.3043458","article-title":"Fed-IIoT: a robust federated malware detection architecture in industrial IoT","volume":"17","author":"Taheri","year":"2021","journal-title":"IEEE Trans Ind Inf"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"103692","DOI":"10.1016\/j.compind.2022.103692","article-title":"Light-weight federated learning-based anomaly detection for time-series data in industrial control systems","volume":"140","author":"Truong","year":"2022","journal-title":"Comput Ind"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"8414","DOI":"10.1109\/JIOT.2023.3321793","article-title":"QFDSA: a quantum-secured federated learning system for smart grid dynamic security assessment","volume":"11","author":"Ren","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.future.2024.06.023","article-title":"Quantum-empowered federated learning and 6G wireless networks for IoT security: concept, challenges and future directions","volume":"160","author":"Javeed","year":"2024","journal-title":"Future Gener Comput Syst"},{"article-title":"Quantum-safe federated learning: enhancing data privacy and security","series-title":"Proceedings of the 2024 International Conference on Emerging Research in Computational Science (ICERCS); 2024 Dec 12\u201314; Coimbatore, India","author":"Kannan","key":"ref27"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"8090","DOI":"10.3390\/s23198090","article-title":"Enhancing IoT security through a green and sustainable federated learning platform: leveraging efficient encryption and the quondam signature algorithm","volume":"23","author":"Aljrees","year":"2023","journal-title":"Sensors"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/COMST.2024.3399612","article-title":"Transitioning from federated learning to quantum federated learning in Internet of Things: a comprehensive survey","volume":"27","author":"Qiao","year":"2025","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1109\/TITS.2021.3130906","article-title":"OQFL: an optimized quantum-based federated learning framework for defending against adversarial attacks in intelligent transportation systems","volume":"24","author":"Yamany","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"23553","DOI":"10.1038\/s41598-024-74377-6","article-title":"PQSF: post-quantum secure privacy-preserving federated learning","volume":"14","author":"Zhang","year":"2024","journal-title":"Sci Rep"},{"key":"ref32","first-page":"41","article-title":"Dynamic resource allocation framework for resilient and secure IoT communication using federated learning and quantum cryptography","volume":"7","author":"Veeramachaneni","year":"2025","journal-title":"J Adv Comput Intell Theory"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"190","DOI":"10.3390\/s25010190","article-title":"A survey of deep anomaly detection in multivariate time series: taxonomy, applications, and directions","volume":"25","author":"Wang","year":"2025","journal-title":"Sensors"},{"key":"ref34","first-page":"119362","article-title":"A hybrid graph neural network and convolutional autoencoder for robust time series anomaly detection","volume":"642","author":"Liu","year":"2024","journal-title":"Inf Sci"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"73468","DOI":"10.1109\/ACCESS.2025.3554083","article-title":"Intrusion detection in IoT and IIoT: comparing lightweight machine learning techniques using TON_IoT, WUSTL-IIOT-2021, and EdgeIIoTset datasets","volume":"13","author":"Ismail","year":"2025","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_66898\/TSP_CMC_66898.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:08:39Z","timestamp":1763345319000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63554"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066898","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}