{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:26:49Z","timestamp":1763346409236,"version":"3.45.0"},"reference-count":44,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:00:00Z","timestamp":1762041600000},"content-version":"vor","delay-in-days":305,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.069641","type":"journal-article","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T09:13:42Z","timestamp":1758186822000},"page":"5183-5206","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Interpretable Federated Learning Model for Cyber Intrusion Detection in Smart Cities with Privacy-Preserving Feature Selection"],"prefix":"10.32604","volume":"85","author":[{"given":"Muhammad Sajid","family":"Farooq","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Saleem","sequence":"additional","affiliation":[]},{"given":"M.A.","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Muhammad Farrukh","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Shahan Yamin","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Muhammad Shoukat","family":"Aslam","sequence":"additional","affiliation":[]},{"given":"Khan M.","family":"Adnan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"e4897","DOI":"10.1002\/ett.4897","article-title":"Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: a comprehensive study on the cloud of things","volume":"35","author":"Nag","year":"2024","journal-title":"Trans Emerging Tel Tech"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3390\/su14010071","article-title":"Revolutionary strategies analysis and proposed system for future infrastructure in Internet of Things","volume":"14","author":"Kumar","year":"2022","journal-title":"Sustainability"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s10796-020-10044-1","article-title":"Security, privacy and risks within smart cities: literature review and development of a smart city interaction framework","volume":"24","author":"Ismagilova","year":"2022","journal-title":"Inf Syst Front"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"114562","DOI":"10.1109\/ACCESS.2023.3323932","article-title":"Privacy and security in distributed learning: a review of challenges, solutions, and open research issues","volume":"11","author":"Afzal","year":"2023","journal-title":"IEEE Access"},{"key":"ref5","article-title":"Network intrusion detection in cloud environments: a comparative analysis of approaches","volume":"15","author":"Ahmadi","year":"2024","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.3390\/electronics12041020","article-title":"A survey of explainable artificial intelligence for smart cities","volume":"12","author":"Javed","year":"2023","journal-title":"Electronics"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"e13066","DOI":"10.1111\/exsy.13066","article-title":"Network intrusion detection system: a survey on artificial intelligence-based techniques","volume":"39","author":"Habeeb","year":"2022","journal-title":"Expert Syst"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-030-72139-8_2","author":"Ahmed","year":"2021","journal-title":"Data-driven mining, learning and analytics for secured smart cities"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"105844","DOI":"10.1016\/j.est.2022.105844","article-title":"Prediction of hydrogen storage in dibenzyltoluene empowered with machine learning","volume":"55","author":"Ali","year":"2022","journal-title":"J Energy Storage"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1186\/s13677-024-00685-x","article-title":"Enhancing intrusion detection: a hybrid machine and deep learning approach","volume":"13","author":"Sajid","year":"2024","journal-title":"J Cloud Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"4744","DOI":"10.3390\/electronics13234744","article-title":"Federated learning: navigating the landscape of collaborative intelligence","volume":"13","author":"Lazaros","year":"2024","journal-title":"Electronics"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3846","DOI":"10.3390\/math10203846","article-title":"Hydrogen storage prediction in dibenzyltoluene as liquid organic hydrogen carrier empowered with weighted federated machine learning","volume":"10","author":"Ali","year":"2022","journal-title":"Mathematics"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"60108","DOI":"10.1109\/ACCESS.2025.3556906","article-title":"An optimal two-step approach for defense against poisoning attacks in federated learning","volume":"13","author":"Ali","year":"2025","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"84643","DOI":"10.1109\/ACCESS.2024.3413069","article-title":"A multifaceted survey on federated learning: fundamentals, paradigm shifts, practical issues, recent developments, partnerships, trade-offs, trustworthiness, and ways forward","volume":"12","author":"Majeed","year":"2024","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4100","DOI":"10.3390\/app14104100","article-title":"Analysis of federated learning paradigm in medical domain: taking COVID-19 as an application use case","volume":"14","author":"Hwang","year":"2024","journal-title":"Appl Sci"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.3390\/electronics12051250","article-title":"Federated learning-based lightweight two-factor authentication framework with privacy preservation for mobile sink in the social IoMT","volume":"12","author":"Deebak","year":"2023","journal-title":"Electronics"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"127","DOI":"10.3390\/bdcc6040127","article-title":"Applications and challenges of federated learning paradigm in the big data era with special emphasis on COVID-19","volume":"6","author":"Majeed","year":"2022","journal-title":"Big Data Cogn Comput"},{"key":"ref18","article-title":"Explainable artificial intelligence (XAI) for industry applications: enhancing transparency, trust, and informed decision-making in business operation","author":"Patil","year":"2024 [Internet]. [cited 2025 Aug 17]","journal-title":"SSRN"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.23880\/art-16000110","article-title":"Transparency in AI decision making: a survey of explainable AI methods and applications","volume":"2","author":"Jain","year":"2024","journal-title":"Adv Rob Technol"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"19223","DOI":"10.1038\/s41598-025-03358-0","article-title":"Deep learning driven interpretable and informed decision making model for brain tumour prediction using explainable AI","volume":"15","author":"Adnan","year":"2025","journal-title":"Sci Rep"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1016\/j.egyr.2025.01.063","article-title":"Smart buildings: federated learning-driven secure, transparent and smart energy management system using XAI","volume":"13","author":"Khan","year":"2025","journal-title":"Energy Rep"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1109\/ACCESS.2024.3522080","article-title":"Developing a transparent anaemia prediction model empowered with explainable artificial intelligence","volume":"13","author":"Sajid Farooq","year":"2025","journal-title":"IEEE Access"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"6618","DOI":"10.3390\/s24206618","article-title":"Smart vision transparency: efficient ocular disease prediction model using explainable artificial intelligence","volume":"24","author":"Abbas","year":"2024","journal-title":"Sensors"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1520741","DOI":"10.3389\/fcomp.2025.1520741","article-title":"Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability","volume":"7","author":"Mohale","year":"2025","journal-title":"Front Comput Sci"},{"key":"ref25","series-title":"International Conference on Machine Learning and Intelligent Systems Engineering (MLISE); 2022 Aug 5\u20137","first-page":"317","article-title":"Anomaly detection in dynamic graph based on deep graph auto-encoder","author":"Gao","year":"2022"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-319-94295-7_15","author":"Zhu","year":"2018","journal-title":"Cloud computing\u2014CLOUD 2018"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"101003","DOI":"10.1016\/j.measen.2023.101003","article-title":"Intrusion detection based on phishing detection with machine learning","volume":"31","author":"Jayaraj","year":"2024","journal-title":"Meas Sens"},{"key":"ref28","first-page":"2607","article-title":"A fused machine learning approach for intrusion detection system","volume":"74","author":"Sajid Farooq","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.aej.2024.01.073","article-title":"Optimizing intrusion detection using intelligent feature selection with machine learning model","volume":"91","author":"Aljehane","year":"2024","journal-title":"Alex Eng J"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"121751","DOI":"10.1016\/j.eswa.2023.121751","article-title":"Explainable artificial intelligence for intrusion detection in IoT networks: a deep learning based approach","volume":"238","author":"Sharma","year":"2024","journal-title":"Expert Syst Appl"},{"journal-title":"Cryptography Secur","article-title":"Multi-class network intrusion detection with class imbalance via LSTM & SMOTE","author":"Nawaz","key":"ref31"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/j.aej.2023.11.078","article-title":"Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security","volume":"86","author":"Aljehane","year":"2024","journal-title":"Alex Eng J"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"132434","DOI":"10.1109\/ACCESS.2024.3443202","article-title":"Distributed multiclass cyberattack detection using golden jackal optimization with deep learning model for securing IoT networks","volume":"12","author":"Alrayes","year":"2024","journal-title":"IEEE Access"},{"key":"ref34","first-page":"60","article-title":"Empowering intrusion detection systems: a synergistic hybrid approach with optimization and deep learning techniques for network security","volume":"22","author":"Chinnasamy","year":"2025","journal-title":"Int Arab J Inf Technol"},{"key":"ref35","unstructured":"Kuldeep research [Internet]. [cited 2025 Aug 17]. Available from: https:\/\/www.kaggle.com\/code\/thotakuldeep\/kuldeep-research\/input."},{"article-title":"Security of machine learning-based anomaly detection in cyber physical systems","series-title":"2022 International Conference on Computer Communications and Networks (ICCCN); 2022 Jul 25\u201328","author":"Jadidi","key":"ref36"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.future.2020.09.002","article-title":"Autonomous mitigation of cyber risks in the Cyber\u2013Physical Systems","volume":"115","author":"Kholidy","year":"2021","journal-title":"Future Gener Comput Syst"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s00521-021-06400-0","article-title":"Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system","volume":"34","author":"Kure","year":"2022","journal-title":"Neural Comput Appl"},{"key":"ref39","first-page":"42","article-title":"Detection of power grid disturbances and cyber-attacks based on machine learning","volume":"46","author":"Wang","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1109\/TII.2020.2974520","article-title":"Deep learning-based DDoS-attack detection for cyber\u2013physical system over 5G network","volume":"17","author":"Hussain","year":"2021","journal-title":"IEEE Trans Ind Inf"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2574","DOI":"10.3390\/math10152574","article-title":"Deep machine learning model-based cyber-attacks detection in smart power systems","volume":"10","author":"Almalaq","year":"2022","journal-title":"Mathematics"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"5522","DOI":"10.1109\/TII.2020.3040968","article-title":"A blockchain-based deep learning approach for cyber security in next generation industrial cyber-physical systems","volume":"17","author":"Rathore","year":"2021","journal-title":"IEEE Trans Ind Inf"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","article-title":"A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework","volume":"199","author":"Kasongo","year":"2023","journal-title":"Comput Commun"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"3697536","DOI":"10.1155\/2021\/3697536","article-title":"Network threat detection based on group CNN for privacy protection","volume":"2021","author":"Xu","year":"2021","journal-title":"Wirel Commun Mob Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_69641\/TSP_CMC_69641.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:24:32Z","timestamp":1763346272000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":44,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.069641","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-06-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}