{"id":"https://openalex.org/W4414184292","doi":"https://doi.org/10.32604/cmc.2025.067521","title":"Adaptive Multi-Layer Defense Mechanism for Trusted Federated Learning in Network Security Assessment","display_name":"Adaptive Multi-Layer Defense Mechanism for Trusted Federated Learning in Network Security Assessment","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414184292","doi":"https://doi.org/10.32604/cmc.2025.067521"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067521","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067521","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067521","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027257208","display_name":"Lincong Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lincong Zhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062119190","display_name":"Liandong Chen","orcid":"https://orcid.org/0000-0003-4685-1102"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liandong Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112537355","display_name":"Peipei Shen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peipei Shen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076224515","display_name":"Zizhou Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zizhou Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023409764","display_name":"C. H. Li","orcid":"https://orcid.org/0000-0003-2765-2589"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengzhu Li","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5021772015","display_name":"Fanqin Zhou","orcid":"https://orcid.org/0000-0002-4158-6517"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fanqin Zhou","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027257208"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29879211,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"3","first_page":"5057","last_page":"5071"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9294999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9294999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9060999751091003,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6265000104904175},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5776000022888184},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.510200023651123},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4611000120639801},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4099000096321106},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4027999937534332},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3878999948501587},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.36079999804496765}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8276000022888184},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6265000104904175},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5776000022888184},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.510200023651123},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4611000120639801},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4368000030517578},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4250999987125397},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4099000096321106},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4074000120162964},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4027999937534332},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3878999948501587},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36959999799728394},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.36079999804496765},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3476000130176544},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3361000120639801},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.32739999890327454},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3188999891281128},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29919999837875366},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.2711000144481659},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C61326573","wikidata":"https://www.wikidata.org/wiki/Q1496376","display_name":"Gaussian process","level":3,"score":0.2612000107765198},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067521","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067521","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067521","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067521","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W4226256841","https://openalex.org/W4298342756","https://openalex.org/W4310225030","https://openalex.org/W4311705612","https://openalex.org/W4323847179","https://openalex.org/W4327503254","https://openalex.org/W4365504981","https://openalex.org/W4385980132","https://openalex.org/W4388818404","https://openalex.org/W4390581470","https://openalex.org/W4390603639","https://openalex.org/W4392309162","https://openalex.org/W4393089627","https://openalex.org/W4398215514","https://openalex.org/W4400529443","https://openalex.org/W4402666098","https://openalex.org/W4403567800","https://openalex.org/W4409250950"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"growth":[2],"of":[3,5,11,33,43,86,209],"Internet":[4],"things":[6],"devices":[7],"and":[8,41,65,115,157,164,173,194,211],"the":[9,31,39,75,83,87,123,131,137,144,182],"emergence":[10],"rapidly":[12],"evolving":[13],"network":[14,63,125],"threats":[15],"have":[16],"made":[17],"traditional":[18,145],"security":[19,34],"assessment":[20,35],"methods":[21,93,161],"inadequate.":[22],"Federated":[23],"learning":[24,45,77,133,147,160],"offers":[25],"a":[26,51,60,66,96,103],"promising":[27],"solution":[28],"to":[29,74,121,190,216],"expedite":[30],"training":[32,78],"models.":[36],"However,":[37],"ensuring":[38],"trustworthiness":[40],"robustness":[42,169],"federated":[44,76,132],"under":[46,192],"multi-party":[47],"collaboration":[48],"scenarios":[49],"remains":[50],"challenge.":[52],"To":[53],"address":[54],"these":[55],"issues,":[56],"this":[57],"study":[58],"proposes":[59],"shard":[61],"aggregation":[62,134],"structure":[64],"malicious":[67,138,203],"node":[68,139],"detection":[69,140],"mechanism,":[70,141],"along":[71],"with":[72,95,136,202],"improvements":[73],"process.":[79,148],"First,":[80],"we":[81,101,142],"extract":[82],"data":[84,109,171,197,207],"features":[85],"participants":[88],"by":[89,129,188],"using":[90],"spectral":[91],"clustering":[92],"combined":[94],"Gaussian":[97],"kernel":[98],"function.":[99],"Then,":[100],"introduce":[102],"multi-objective":[104],"decision-making":[105],"approach":[106,184],"that":[107,181],"combines":[108],"distribution":[110],"consistency,":[111],"consensus":[112,116],"communication":[113],"overhead,":[114],"result":[117],"reliability":[118],"in":[119,166],"order":[120],"determine":[122],"final":[124],"sharing":[126],"scheme.":[127],"Finally,":[128],"integrating":[130],"process":[135],"improve":[143],"decentralized":[146],"Our":[149],"proposed":[150,183],"ShardFed":[151],"algorithm":[152],"outperforms":[153],"conventional":[154],"classification":[155],"algorithms":[156],"state-of-the-art":[158],"machine":[159],"like":[162],"FedProx":[163],"FedCurv":[165],"convergence":[167],"speed,":[168],"against":[170],"interference,":[172],"adaptability":[174],"across":[175],"multiple":[176],"scenarios.":[177],"Experimental":[178],"results":[179],"demonstrate":[180],"improves":[185],"model":[186,214],"accuracy":[187],"up":[189],"2.33%":[191],"non-independent":[193],"identically":[195],"distributed":[196],"conditions,":[198],"maintains":[199],"higher":[200],"performance":[201],"nodes":[204],"containing":[205],"poisoned":[206],"ratios":[208],"20%\u201350%,":[210],"significantly":[212],"enhances":[213],"resistance":[215],"low-quality":[217],"data.":[218]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
