{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T04:27:35Z","timestamp":1773203255948,"version":"3.50.1"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072336"],"award-info":[{"award-number":["62072336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019062","name":"Tianjin Research Innovation Project for Postgraduate Students","doi-asserted-by":"publisher","award":["2022SKY189"],"award-info":[{"award-number":["2022SKY189"]}],"id":[{"id":"10.13039\/501100019062","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1016\/j.future.2024.107559","type":"journal-article","created":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T10:50:36Z","timestamp":1729335036000},"page":"107559","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Toward data efficient anomaly detection in heterogeneous edge\u2013cloud environments using clustered federated learning"],"prefix":"10.1016","volume":"164","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0009-0007-0089-1412","authenticated-orcid":false,"given":"Zongpu","family":"Wei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-6484-7142","authenticated-orcid":false,"given":"Jinsong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-8303-8861","authenticated-orcid":false,"given":"Zening","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Shi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2024.107559_b1","doi-asserted-by":"crossref","unstructured":"R. Kerkouche, G. Acs, C. Castelluccia, P. Genev\u00e8s, Privacy-preserving and bandwidth-efficient federated learning: An application to in-hospital mortality prediction, in: Proceedings of the Conference on Health, Inference, and Learning, 2021, pp. 25\u201335.","DOI":"10.1145\/3450439.3451859"},{"key":"10.1016\/j.future.2024.107559_b2","series-title":"Applied federated learning: Improving google keyboard query suggestions","author":"Yang","year":"2018"},{"issue":"12","key":"10.1016\/j.future.2024.107559_b3","doi-asserted-by":"crossref","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","article-title":"A novel intrusion detection method based on lightweight neural network for internet of things","volume":"9","author":"Zhao","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.future.2024.107559_b4","doi-asserted-by":"crossref","first-page":"4944","DOI":"10.1109\/JIOT.2020.3034156","article-title":"Hybrid deep learning for botnet attack detection in the internet-of-things networks","volume":"8","author":"Popoola","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.future.2024.107559_b5","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial IoT","volume":"16","author":"Lu","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"8","key":"10.1016\/j.future.2024.107559_b6","doi-asserted-by":"crossref","first-page":"7751","DOI":"10.1109\/JIOT.2020.2991401","article-title":"Privacy-preserving traffic flow prediction: A federated learning approach","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.future.2024.107559_b7","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1109\/JBHI.2022.3167256","article-title":"Federated learning for IoMT applications: A standardization and benchmarking framework of intrusion detection systems","volume":"27","author":"Alamleh","year":"2022","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"10.1016\/j.future.2024.107559_b8","doi-asserted-by":"crossref","DOI":"10.1109\/TPDS.2023.3290650","article-title":"Collaborative intrusion detection system for SDVN: A fairness federated deep learning approach","author":"Cui","year":"2023","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.future.2024.107559_b9","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.future.2024.107559_b10","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"Li","year":"2020","journal-title":"Proc. Mach. Learn. Syst."},{"key":"10.1016\/j.future.2024.107559_b11","series-title":"International Conference on Machine Learning","first-page":"5132","article-title":"Scaffold: Stochastic controlled averaging for federated learning","author":"Karimireddy","year":"2020"},{"key":"10.1016\/j.future.2024.107559_b12","series-title":"2022 IEEE 38th International Conference on Data Engineering","first-page":"965","article-title":"Federated learning on non-iid data silos: An experimental study","author":"Li","year":"2022"},{"key":"10.1016\/j.future.2024.107559_b13","series-title":"2019 IEEE 37th International Conference on Computer Design","first-page":"246","article-title":"Astraea: Self-balancing federated learning for improving classification accuracy of mobile deep learning applications","author":"Duan","year":"2019"},{"key":"10.1016\/j.future.2024.107559_b14","series-title":"On the convergence of fedavg on non-iid data","author":"Li","year":"2019"},{"issue":"9","key":"10.1016\/j.future.2024.107559_b15","doi-asserted-by":"crossref","first-page":"3400","DOI":"10.1109\/TNNLS.2019.2944481","article-title":"Robust and communication-efficient federated learning from non-iid data","volume":"31","author":"Sattler","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"9","key":"10.1016\/j.future.2024.107559_b16","doi-asserted-by":"crossref","first-page":"6961","DOI":"10.1109\/TWC.2022.3153495","article-title":"Asynchronous federated learning over wireless communication networks","volume":"21","author":"Wang","year":"2022","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.future.2024.107559_b17","first-page":"19586","article-title":"An efficient framework for clustered federated learning","volume":"33","author":"Ghosh","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.future.2024.107559_b18","series-title":"IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops","first-page":"1","article-title":"Fedcluster: A federated learning framework for cross-device private ecg classification","author":"Lin","year":"2022"},{"key":"10.1016\/j.future.2024.107559_b19","series-title":"ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing","first-page":"8861","article-title":"On the byzantine robustness of clustered federated learning","author":"Sattler","year":"2020"},{"issue":"6","key":"10.1016\/j.future.2024.107559_b20","doi-asserted-by":"crossref","first-page":"898","DOI":"10.3390\/electronics11060898","article-title":"A deep learning model for network intrusion detection with imbalanced data","volume":"11","author":"Fu","year":"2022","journal-title":"Electronics"},{"issue":"20","key":"10.1016\/j.future.2024.107559_b21","doi-asserted-by":"crossref","first-page":"19706","DOI":"10.1109\/JIOT.2022.3167005","article-title":"Intrusion detection in the iot under data and concept drifts: Online deep learning approach","volume":"9","author":"Wahab","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.future.2024.107559_b22","doi-asserted-by":"crossref","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","article-title":"DeepFed: Federated deep learning for intrusion detection in industrial cyber\u2013physical systems","volume":"17","author":"Li","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"10","key":"10.1016\/j.future.2024.107559_b23","doi-asserted-by":"crossref","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","article-title":"Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.future.2024.107559_b24","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","article-title":"Federated-learning-based anomaly detection for IoT security attacks","volume":"9","author":"Mothukuri","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2024.107559_b25","article-title":"Semi-supervised federated learning based intrusion detection method for internet of things","author":"Zhao","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2024.107559_b26","article-title":"Federated learning for distributed IIoT intrusion detection using transfer approaches","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.future.2024.107559_b27","article-title":"PBFL: Privacy-preserving and Byzantine-robust federated learning empowered industry 4.0","author":"Li","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.future.2024.107559_b28","doi-asserted-by":"crossref","first-page":"3710","DOI":"10.1109\/TNNLS.2020.3015958","article-title":"Clustered federated learning: Model-agnostic distributed multitask optimization under privacy constraints","volume":"32","author":"Sattler","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"1","key":"10.1016\/j.future.2024.107559_b29","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s11280-022-01046-x","article-title":"Multi-center federated learning: clients clustering for better personalization","volume":"26","author":"Long","year":"2023","journal-title":"World Wide Web"},{"issue":"10","key":"10.1016\/j.future.2024.107559_b30","doi-asserted-by":"crossref","first-page":"7773","DOI":"10.1109\/JIOT.2021.3113927","article-title":"Federated learning with soft clustering","volume":"9","author":"Li","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.future.2024.107559_b31","first-page":"2661","article-title":"Flexible clustered federated learning for client-level data distribution shift","volume":"33","author":"Duan","year":"2021","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.future.2024.107559_b32","doi-asserted-by":"crossref","unstructured":"L. Cai, N. Chen, Y. Cao, J. He, Y. Li, FedCE: Personalized Federated Learning Method based on Clustering Ensembles, in: Proceedings of the 31st ACM International Conference on Multimedia, 2023, pp. 1625\u20131633.","DOI":"10.1145\/3581783.3612217"},{"key":"10.1016\/j.future.2024.107559_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103299","article-title":"Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks","volume":"131","author":"S\u00e1ez-de C\u00e1mara","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.future.2024.107559_b34","doi-asserted-by":"crossref","unstructured":"H. Chen, W. Dai, M. Kim, Y. Song, Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference, in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 395\u2013412.","DOI":"10.1145\/3319535.3363207"},{"key":"10.1016\/j.future.2024.107559_b35","doi-asserted-by":"crossref","first-page":"4574","DOI":"10.1109\/TIFS.2021.3108434","article-title":"Privacy-enhanced federated learning against poisoning adversaries","volume":"16","author":"Liu","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2024.107559_b36","unstructured":"C. Naesseth, F. Lindsten, D. Blei, Markovian Score Climbing: Variational Inference with KL(p \u2225 q), in: Conference on Neural Information Processing Systems (NeurIPS), vol. 33, Vancouver, BC, Canada, 2020, pp. 15499\u201315510."},{"key":"10.1016\/j.future.2024.107559_b37","series-title":"PFLlib: Personalized federated learning algorithm library","author":"Zhang","year":"2023"},{"key":"10.1016\/j.future.2024.107559_b38","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.future.2023.09.019","article-title":"FL-IIDS: A novel federated learning-based incremental intrusion detection system","volume":"151","author":"Jin","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2024.107559_b39","series-title":"2015 Military Communications and Information Systems Conference","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"},{"key":"10.1016\/j.future.2024.107559_b40","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"ICISSp"},{"key":"10.1016\/j.future.2024.107559_b41","series-title":"2019 International Carnahan Conference on Security Technology","first-page":"1","article-title":"Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy","author":"Sharafaldin","year":"2019"},{"issue":"4","key":"10.1016\/j.future.2024.107559_b42","doi-asserted-by":"crossref","first-page":"195","DOI":"10.3390\/info15040195","article-title":"Toward generating a new cloud-based Distributed Denial of Service (DDoS) dataset and cloud intrusion traffic characterization","volume":"15","author":"Shafi","year":"2024","journal-title":"Information"},{"key":"10.1016\/j.future.2024.107559_b43","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume":"33","author":"Lin","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"1","key":"10.1016\/j.future.2024.107559_b44","first-page":"20","article-title":"A review of principal component analysis algorithm for dimensionality reduction","volume":"2","author":"Hasan","year":"2021","journal-title":"J. Soft Comput. Data Min."},{"key":"10.1016\/j.future.2024.107559_b45","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","article-title":"Federated learning for intrusion detection system: Concepts, challenges and future directions","volume":"195","author":"Agrawal","year":"2022","journal-title":"Comput. Commun."},{"key":"10.1016\/j.future.2024.107559_b46","doi-asserted-by":"crossref","unstructured":"Q. Li, B. He, D. Song, Model-contrastive federated learning, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 10713\u201310722.","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"10.1016\/j.future.2024.107559_b47","series-title":"Unlocking the potential of federated learning for deeper models","author":"Wang","year":"2023"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0167739X24005235?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0167739X24005235?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T14:02:17Z","timestamp":1739368937000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X24005235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":47,"alternative-id":["S0167739X24005235"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.future.2024.107559","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Toward data efficient anomaly detection in heterogeneous edge\u2013cloud environments using clustered federated learning","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.future.2024.107559","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"107559"}}