{"id":"https://openalex.org/W7118648463","doi":"https://doi.org/10.1186/s42400-025-00420-2","title":"Heterogeneous federated learning for imbalanced phishing email detection","display_name":"Heterogeneous federated learning for imbalanced phishing email detection","publication_year":2026,"publication_date":"2026-01-07","ids":{"openalex":"https://openalex.org/W7118648463","doi":"https://doi.org/10.1186/s42400-025-00420-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00420-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00420-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00420-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00420-2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122189344","display_name":"Xiaoyang Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]},{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyang Yi","raw_affiliation_strings":["College of Cryptology and Cyber Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","Key Laboratory of Data and Intelligent System Security Ministry of Education, Tongyan Road 38, Tianjin, 300350, China","Tianjin Key Laboratory of Network and Data Security Technology, Tongyan Road 38, Tianjin, 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Cryptology and Cyber Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"Key Laboratory of Data and Intelligent System Security Ministry of Education, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I890469752"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Network and Data Security Technology, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122127562","display_name":"Linyu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linyu Li","raw_affiliation_strings":["College of Computer Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122206717","display_name":"Jian Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]},{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Zhang","raw_affiliation_strings":["College of Computer Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","College of Cryptology and Cyber Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","Key Laboratory of Data and Intelligent System Security Ministry of Education, Tongyan Road 38, Tianjin, 300350, China","Tianjin Key Laboratory of Network and Data Security Technology, Tongyan Road 38, Tianjin, 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"College of Cryptology and Cyber Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"Key Laboratory of Data and Intelligent System Security Ministry of Education, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I890469752"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Network and Data Security Technology, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051211164","display_name":"Zedong Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zedong Jia","raw_affiliation_strings":["College of Computer Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nankai University, Tongyan Road 38, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5122206717"],"corresponding_institution_ids":["https://openalex.org/I136765683","https://openalex.org/I205237279","https://openalex.org/I890469752"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02248439,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7268999814987183},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6815000176429749},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5641000270843506},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5339999794960022},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5016000270843506},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4632999897003174},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.446399986743927},{"id":"https://openalex.org/keywords/external-data-representation","display_name":"External Data Representation","score":0.3910999894142151}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8317999839782715},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7268999814987183},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6815000176429749},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5641000270843506},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5339999794960022},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5324000120162964},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5016000270843506},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4632999897003174},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.446399986743927},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42649999260902405},{"id":"https://openalex.org/C116409475","wikidata":"https://www.wikidata.org/wiki/Q1385056","display_name":"External Data Representation","level":2,"score":0.3910999894142151},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3831999897956848},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3463999927043915},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.320499986410141},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31209999322891235},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2827000021934509},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25380000472068787}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00420-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00420-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00420-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a70ea66cf05747d7aaa186c15da1aa0e","is_oa":true,"landing_page_url":"https://doaj.org/article/a70ea66cf05747d7aaa186c15da1aa0e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-19 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00420-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00420-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00420-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6101236343383789,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3633636046","display_name":null,"funder_award_id":"2022YFB3103202","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7118648463.pdf","grobid_xml":"https://content.openalex.org/works/W7118648463.grobid-xml"},"referenced_works_count":62,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W2022477494","https://openalex.org/W2051267297","https://openalex.org/W2081721100","https://openalex.org/W2119191234","https://openalex.org/W2132791018","https://openalex.org/W2134750673","https://openalex.org/W2185967890","https://openalex.org/W2195906484","https://openalex.org/W2295598076","https://openalex.org/W2345652415","https://openalex.org/W2513863019","https://openalex.org/W2565355925","https://openalex.org/W2888558158","https://openalex.org/W2958447199","https://openalex.org/W2964189064","https://openalex.org/W3018464563","https://openalex.org/W3027686430","https://openalex.org/W3031232306","https://openalex.org/W3042621011","https://openalex.org/W3111885128","https://openalex.org/W3176639943","https://openalex.org/W3182158470","https://openalex.org/W3184796286","https://openalex.org/W3199079404","https://openalex.org/W3206613716","https://openalex.org/W4280649903","https://openalex.org/W4283796083","https://openalex.org/W4285603347","https://openalex.org/W4285815152","https://openalex.org/W4288057710","https://openalex.org/W4311833787","https://openalex.org/W4380082195","https://openalex.org/W4385767857","https://openalex.org/W4386230966","https://openalex.org/W4386767075","https://openalex.org/W4387826905","https://openalex.org/W4387886163","https://openalex.org/W4387967373","https://openalex.org/W4390277872","https://openalex.org/W4390788106","https://openalex.org/W4390872418","https://openalex.org/W4390873050","https://openalex.org/W4391046090","https://openalex.org/W4391877241","https://openalex.org/W4392024287","https://openalex.org/W4392124235","https://openalex.org/W4392979593","https://openalex.org/W4393154185","https://openalex.org/W4393156671","https://openalex.org/W4393970641","https://openalex.org/W4394015528","https://openalex.org/W4402568979","https://openalex.org/W4402572661","https://openalex.org/W4402692203","https://openalex.org/W4402742416","https://openalex.org/W4402896775","https://openalex.org/W4403296901","https://openalex.org/W4403534301","https://openalex.org/W4403931466","https://openalex.org/W4405304342","https://openalex.org/W4407865050"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Phishing":[1],"email":[2,28,35,59,186],"attacks":[3],"have":[4,185],"evolved":[5],"into":[6,88],"a":[7,73],"significant":[8],"threat,":[9],"causing":[10],"substantial":[11],"economic":[12],"and":[13,30,92,105,111,153,164,191],"political":[14],"harm.":[15],"However,":[16],"existing":[17],"detection":[18,60],"methods":[19,55],"often":[20],"neglect":[21],"the":[22,106,114,117,123,145,159],"data":[23,136,165],"heterogeneity":[24],"resulting":[25],"from":[26,188],"diverse":[27,189],"sources":[29,190],"are":[31,108],"trained":[32],"on":[33,76,113],"balanced":[34],"datasets,":[36],"which":[37],"do":[38],"not":[39],"accurately":[40],"reflect":[41],"real-world":[42],"scenarios.":[43],"Meanwhile,":[44],"with":[45],"increasing":[46],"privacy":[47],"protection":[48],"regulations,":[49],"it":[50],"is":[51],"crucial":[52],"to":[53,101,132,141],"develop":[54],"that":[56,174],"enhance":[57],"phishing":[58,82],"capabilities":[61],"while":[62],"preserving":[63],"user":[64],"privacy.":[65],"To":[66],"address":[67,158],"these":[68],"challenges,":[69],"we":[70],"propose":[71],"PhFL,":[72],"framework":[74,128],"based":[75],"heterogeneous":[77],"federated":[78,178],"learning,":[79],"for":[80],"detecting":[81],"emails.":[83],"PhFL":[84,175],"decouples":[85],"clients\u2019":[86,102],"models":[87,91,97],"representation":[89,95,124],"learning":[90,96,125,179],"classifiers.":[93],"The":[94,147],"can":[98],"be":[99],"tailored":[100],"specific":[103],"needs,":[104],"classifiers":[107,156],"globally":[109],"shared":[110],"re-trained":[112],"server,":[115],"leveraging":[116],"class":[118,150,162,194],"feature":[119,151],"means":[120,152],"generated":[121],"by":[122],"models.":[126],"Our":[127],"allows":[129],"each":[130],"client":[131],"leverage":[133],"its":[134],"private":[135],"locally":[137],"without":[138],"providing":[139],"emails":[140],"other":[142,177],"clients":[143,184],"or":[144],"server.":[146],"collaboration":[148],"of":[149,155,161],"re-training":[154],"effectively":[157],"challenges":[160],"imbalance":[163],"heterogeneity,":[166],"enabling":[167],"improved":[168],"model":[169],"performance.":[170],"Experimental":[171],"results":[172],"demonstrate":[173],"outperforms":[176],"methods,":[180],"particularly":[181],"when":[182],"different":[183],"datasets":[187],"face":[192],"imbalanced":[193],"distributions.":[195]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-01-08T00:00:00"}
