{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:12:11Z","timestamp":1772554331372,"version":"3.50.1"},"reference-count":49,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T00:00:00Z","timestamp":1756080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Artif. Intell."],"abstract":"<jats:sec><jats:title>Introduction<\/jats:title><jats:p>The fusion of deep-learning-based and federated methods has brought great progress in anomaly detection. Yet the systems of today still suffer from certain glaring issues. First, aggregation of data on a central entity poses dangerous privacy hazards. Second, such models could not scale and adapt to heterogeneous and distributed environments. Lastly, fine consideration has hardly been given to quantum-inspired computational paradigms that may promise to improve both speed and security of such systems. To fill in these gaps, this research proposes a completely novel quantum-inspired federated learning approach to anomaly detection that keeps data private and allows for further implementations of quantum computing applications.<\/jats:p><\/jats:sec><jats:sec><jats:title>Methods<\/jats:title><jats:p>The proposed system works on a client-server architecture comprising multiple clients, which either run training of local feedforward neural networks on different private subsets of their data or choose to not participate during an iteration. Clients never pass raw data to the server but instead alternate by sending the server the parameters of the trained model. The server aggregates these local updates by the FedAvg algorithm and produces the global model. The present implementation focuses mainly on utilizing classical deep learning; however, the architecture is made flexible enough to intertwine smoothly with quantum machine-learning paradigms in the future, thus enabling quantum technological enhancement down the road without requiring the entire system to be rebuilt.<\/jats:p><\/jats:sec><jats:sec><jats:title>Results<\/jats:title><jats:p>The framework could produce up to 79% of anomalous detection accuracy. The system had effective learning across distributed clients whilst ensuring that no piece of private data was being shared or spilled (exposed) between clients. These results ensured that the framework maintained its performance while keeping its privacy intact, a very crucial consideration on which to ever really deploy such in sensitive areas.<\/jats:p><\/jats:sec><jats:sec><jats:title>Discussion<\/jats:title><jats:p>The approach allows privacy-preserving anomaly detection across multiple domains and serves as a framework for enlarging and scaling the system. Being quantum-inspired compatible allows for future-proofing and further expediting and enhancing security. The system, having the capability to securely work in a distributed manner, can, thus, be utilized in critical information domains like cybersecurity, finance, and healthcare, where privacy of data is deemed extremely important. This work, thereby, offers a useful federated learning approach towards anomaly detection while going a step further towards the incorporation of quantum computing into secure, distributed AI systems.<\/jats:p><\/jats:sec>","DOI":"10.3389\/frai.2025.1648609","type":"journal-article","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T05:26:57Z","timestamp":1756099617000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Federated quantum-inspired anomaly detection using collaborative neural clients"],"prefix":"10.3389","volume":"8","author":[{"given":"Deepthi","family":"Godavarthi","sequence":"first","affiliation":[]},{"given":"Venkata Charan Sathvik","family":"Rekapalli","sequence":"additional","affiliation":[]},{"given":"Sribidhya","family":"Mohanty","sequence":"additional","affiliation":[]},{"given":"J. V. S. D. Vigneswara","family":"Jaswanth","sequence":"additional","affiliation":[]},{"given":"Dinesh","family":"Polisetty","sequence":"additional","affiliation":[]},{"given":"Bibhuti Bhusan","family":"Dash","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Moreira","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2025,8,25]]},"reference":[{"key":"ref1","article-title":"Federated learning with anomaly detection via gradient and reconstruction analysis","volume-title":"Arxiv","author":"Alsulaimawi","year":"2024"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/FLTA63145.2024.10839838","article-title":"FedAD-bench: a unified benchmark for federated unsupervised anomaly detection in tabular data","volume-title":"Arxiv","author":"Anwar","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1088\/2058-9565\/acfc61","article-title":"Federated convolutional neural network: a new paradigm for collaborative quantum learning","volume":"8","author":"Bhatia","year":"2023","journal-title":"Quantum Sci. Technol."},{"key":"ref4","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1038\/nature23474","article-title":"Quantum machine learning","volume":"549","author":"Biamonte","year":"2017","journal-title":"Nature"},{"key":"ref5","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"ref6","article-title":"Towards federated learning at scale: system design","author":"Bonawitz","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.ijmedinf.2018.01.007","article-title":"Federated learning of predictive models from federated electronic health records","volume":"112","author":"Brisimi","year":"2018","journal-title":"Int. J. Med. Inform."},{"key":"ref8","volume-title":"Future Research (pp. 236-C12P102)","author":"Burke","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","first-page":"6116","DOI":"10.1109\/TCOMM.2021.3078067","article-title":"Robust federated learning against adversarial attacks","volume":"69","author":"Chen","year":"2021","journal-title":"IEEE Trans. Commun."},{"key":"ref10","first-page":"218","article-title":"Federated learning for network anomaly detection in a distributed industrial environment","author":"Dehlaghi-Ghadim","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","first-page":"102693","DOI":"10.1016\/j.sysarc.2023.102693","article-title":"Efficient federated learning for anomaly detection in edge computing systems","volume":"135","author":"Fan","year":"2023","journal-title":"J. Syst. Archit."},{"key":"ref12","article-title":"Differentially private federated learning: a client level perspective","volume-title":"Arxiv","author":"Geyer","year":"2018"},{"key":"ref13","article-title":"Efficient federated learning for mobile edge computing","volume-title":"Arxiv","author":"Ghosh","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","first-page":"9901","DOI":"10.3390\/app12199901","article-title":"Privacy and security in federated learning: a survey","volume":"12","author":"Gosselin","year":"2022","journal-title":"Appl. Sci."},{"key":"ref15","article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","volume-title":"Arxiv","author":"Hardy","year":"2017"},{"key":"ref16","article-title":"Security and privacy issues of federated learning","volume-title":"Arxiv","author":"Hasan","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1038\/s41586-019-0980-2","article-title":"Supervised learning with quantum enhanced feature spaces","volume":"567","author":"Havlek","year":"2019","journal-title":"Nature"},{"key":"ref18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/jiot.2021.3095077","article-title":"A survey on federated learning for resource-constrained IoT devices","volume":"9","author":"Imteaj","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref19","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1038\/s42256-021-00303-7","article-title":"The challenges and opportunities of federated learning","volume":"3","author":"Kairouz","year":"2021","journal-title":"Nat. Mach. Intell."},{"key":"ref20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Foundat. Trends Mach. Learn."},{"key":"ref21","article-title":"Federated learning: Strategies for improving communication efficiency","volume-title":"Arxiv","author":"Kone\u010dn\u00fd","year":"2016"},{"key":"ref22","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/TBDATA.2020.2996601","article-title":"Practical one-shot federated learning for cross-silo settings","volume":"7","author":"Li","year":"2021","journal-title":"IEEE Trans Big Data"},{"key":"ref23","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","article-title":"Federated learning: challenges, methods, and future directions","volume":"37","author":"Li","year":"2020","journal-title":"IEEE Signal Process. Mag."},{"key":"ref24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2023.324874","article-title":"Quantum-enhanced federated learning: a review and perspectives","volume":"4","author":"Li","year":"2023","journal-title":"IEEE Trans. Quantum Eng."},{"key":"ref25","doi-asserted-by":"publisher","first-page":"8490","DOI":"10.3390\/app14188490","article-title":"Federated learning in dynamic and heterogeneous environments: advantages, performances, and privacy problems","volume":"14","author":"Liberti","year":"2024","journal-title":"Appl. Sci."},{"key":"ref26","article-title":"A communication efficient vertical federated learning framework","volume-title":"Arxiv","author":"Liu","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.future.2022.01.013","article-title":"Blockchain and federated learning for privacy-preserving data analysis: a survey","volume":"130","author":"Lu","year":"2022","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref28","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume":"30","author":"Lundberg","year":"2017","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"ref29","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1109\/TNNLS.2021.3088254","article-title":"On the generalization of federated learning under client drift","volume":"33","author":"Ma","year":"2022","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1109\/ICNC64010.2025.10993658","article-title":"Federated learning for efficient condition monitoring and anomaly detection in industrial cyber-physical systems","volume-title":"Arxiv","author":"Marfo","year":"2025"},{"key":"ref31","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"ref32","first-page":"19","article-title":"SecureML: A system for scalable privacy-preserving machine learning","author":"Mohassel","year":"2017"},{"key":"ref33","article-title":"Agnostic federated learning","author":"Mohri","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474124","article-title":"Federated learning for smart healthcare: a survey","volume":"55","author":"Nguyen","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref35","doi-asserted-by":"publisher","first-page":"40195","DOI":"10.1109\/ACCESS.2022.3167101","article-title":"Quantum federated learning for healthcare data","volume":"10","author":"Park","year":"2022","journal-title":"IEEE Access"},{"key":"ref36","first-page":"1","volume-title":"Federated learning based anomaly detection for distributed energy resource communication","author":"Purohit","year":"2024"},{"key":"ref37","first-page":"1135","article-title":"\"Why should I trust you?\": explaining the predictions of any classifier","author":"Ribeiro","year":"2016"},{"key":"ref38","doi-asserted-by":"publisher","first-page":"82896","DOI":"10.1109\/access.2022.3196391","article-title":"A framework for verifiable and auditable collaborative anomaly detection","volume":"10","author":"Santin","year":"2022","journal-title":"IEEE Access"},{"key":"ref39","doi-asserted-by":"publisher","first-page":"3400","DOI":"10.1109\/TNNLS.2019.2944486","article-title":"Robust and communication-efficient federated learning from non-IID data","volume":"31","author":"Sattler","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref40","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1103\/PhysRevLett.122.040504","article-title":"Quantum machine learning in feature Hilbert spaces","volume":"122","author":"Schuld","year":"2019","journal-title":"Phys. Rev. Lett."},{"key":"ref41","first-page":"92","volume-title":"Multi-institutional deep learning modeling without sharing patient data: A feasibility study on brain tumor segmentation","author":"Sheller","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1109\/JSAC.2020.2993425","article-title":"Adaptive federated learning in resource-constrained edge computing systems","volume":"38","author":"Wang","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref43","first-page":"3933","article-title":"FedHarmony: communication-efficient federated learning via local update skipping and global parameter interpolation","author":"Xu","year":"2021"},{"key":"ref44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intellig. Syst. Technol."},{"key":"ref45","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MNET.011.2000102","article-title":"Federated edge learning for smart cities","volume":"34","author":"Yang","year":"2020","journal-title":"IEEE Netw."},{"key":"ref46","first-page":"9469","article-title":"Gradient compression and differential privacy in federated learning","volume":"35","author":"Yin","year":"2021","journal-title":"Proc. AAAI Conf. Art. Intellig."},{"key":"ref47","article-title":"Federated learning with non-IID data","volume-title":"Arxiv","author":"Zhao","year":"2018"},{"key":"ref48","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.patrec.2020.12.024","article-title":"Federated semi-supervised anomaly detection with communication-efficient training","volume":"145","author":"Zhao","year":"2021","journal-title":"Pattern Recogn. Lett."},{"key":"ref49","doi-asserted-by":"publisher","first-page":"53875","DOI":"10.1109\/ACCESS.2020.2987349","article-title":"A comprehensive survey on federated learning: concepts, applications, challenges, and future directions","volume":"8","author":"Zhuang","year":"2020","journal-title":"IEEE Access"}],"container-title":["Frontiers in Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2025.1648609\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T13:16:31Z","timestamp":1756214191000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2025.1648609\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,25]]},"references-count":49,"alternative-id":["10.3389\/frai.2025.1648609"],"URL":"https:\/\/doi.org\/10.3389\/frai.2025.1648609","relation":{},"ISSN":["2624-8212"],"issn-type":[{"value":"2624-8212","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,25]]},"article-number":"1648609"}}