{"id":"https://openalex.org/W4412691943","doi":"https://doi.org/10.32604/cmc.2025.066898","title":"FedCognis: An Adaptive Federated Learning Framework for Secure Anomaly Detection in Industrial IoT-Enabled Cognitive Cities","display_name":"FedCognis: An Adaptive Federated Learning Framework for Secure Anomaly Detection in Industrial IoT-Enabled Cognitive Cities","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412691943","doi":"https://doi.org/10.32604/cmc.2025.066898"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.066898","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066898","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.066898","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005820254","display_name":"Abdulatif Alabdulatif","orcid":"https://orcid.org/0000-0002-3167-8020"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Abdulatif Alabdulatif","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5005820254"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24356835,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"1","first_page":"1185","last_page":"1220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.95169997215271,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9452999830245972,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7720414400100708},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6462437510490417},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5606889128684998},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5585421323776245},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.535845160484314},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5074352622032166},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2666979134082794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2232632339000702},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.214718759059906},{"id":"https://openalex.org/keywords/neuroscience","display_name":"Neuroscience","score":0.05594027042388916}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7720414400100708},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6462437510490417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5606889128684998},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5585421323776245},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.535845160484314},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5074352622032166},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2666979134082794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2232632339000702},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.214718759059906},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.05594027042388916},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.066898","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066898","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.066898","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066898","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W3097060730","https://openalex.org/W3113308842","https://openalex.org/W3154459044","https://openalex.org/W3157680283","https://openalex.org/W3186788521","https://openalex.org/W3194525286","https://openalex.org/W3198471657","https://openalex.org/W4205368719","https://openalex.org/W4220895253","https://openalex.org/W4225161501","https://openalex.org/W4318486183","https://openalex.org/W4328022266","https://openalex.org/W4380154050","https://openalex.org/W4387060097","https://openalex.org/W4387609350","https://openalex.org/W4394627570","https://openalex.org/W4396817532","https://openalex.org/W4399621500","https://openalex.org/W4402124787","https://openalex.org/W4403252092","https://openalex.org/W4405965607","https://openalex.org/W4408325241","https://openalex.org/W4408793049"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"FedCognis":[0,97,133],"is":[1],"a":[2,27,40,121,135],"secure":[3],"and":[4,36,39,65,72,89,105,120,137],"scalable":[5],"federated":[6],"learning":[7],"framework":[8,115],"designed":[9],"for":[10,33,47,103,143],"continuous":[11],"anomaly":[12,50,139],"detection":[13,140],"in":[14,55,145],"Industrial":[15],"Internet":[16],"of":[17,124],"Things-enabled":[18],"Cognitive":[19],"Cities":[20],"(IIoTCC).":[21],"It":[22],"introduces":[23],"two":[24],"key":[25],"innovations:":[26],"Quantum":[28],"Secure":[29],"Authentication":[30],"(QSA)":[31],"mechanism":[32],"adversarial":[34],"defense":[35],"integrity":[37],"validation,":[38],"Self-Attention":[41],"Long":[42],"Short-Term":[43],"Memory":[44],"(SALSTM)":[45],"model":[46,61],"high-accuracy":[48],"spatiotemporal":[49],"detection.":[51],"Addressing":[52],"core":[53],"challenges":[54],"traditional":[56],"Federated":[57],"Learning":[58],"(FL)\u2014such":[59],"as":[60,134],"poisoning,":[62],"communication":[63],"overhead,":[64],"concept":[66],"drift\u2014FedCognis":[67],"integrates":[68],"dynamic":[69],"trust-based":[70],"aggregation":[71],"lightweight":[73],"cryptographic":[74],"verification":[75],"to":[76],"ensure":[77],"secure,":[78],"real-time":[79],"operation":[80],"across":[81,126],"heterogeneous":[82],"IIoT":[83],"domains":[84],"including":[85],"utilities,":[86],"public":[87],"safety,":[88],"traffic":[90],"systems.":[91],"Evaluated":[92],"on":[93],"the":[94],"WUSTL-IIoTCC-2021":[95],"dataset,":[96],"achieves":[98],"94.5%":[99],"accuracy,":[100],"0.941":[101],"AUC":[102],"precision-recall,":[104],"0.896":[106],"ROC-AUC,":[107],"while":[108],"reducing":[109],"bandwidth":[110],"consumption":[111],"by":[112],"72%.":[113],"The":[114],"demonstrates":[116],"sublinear":[117],"computational":[118],"complexity":[119],"resilience":[122],"score":[123],"96.56%":[125],"six":[127],"security":[128],"dimensions.":[129],"These":[130],"results":[131],"confirm":[132],"robust":[136],"adaptive":[138],"solution":[141],"suitable":[142],"deployment":[144],"large-scale":[146],"cognitive":[147],"urban":[148],"infrastructures.":[149]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
