{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:51:36Z","timestamp":1768341096213,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T00:00:00Z","timestamp":1679011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,17]]},"DOI":"10.1145\/3590003.3590060","type":"proceedings-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T18:22:56Z","timestamp":1685384576000},"page":"316-322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Federated Learning-Based Intrusion Detection Method for Smart Grid"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7195-7802","authenticated-orcid":false,"given":"Dongmei","family":"Bin","sequence":"first","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4139-3589","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1517-4139","authenticated-orcid":false,"given":"Chunyan","family":"Yang","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0030-0148","authenticated-orcid":false,"given":"Songming","family":"Han","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8788-5084","authenticated-orcid":false,"given":"Ying","family":"Ling","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106798"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2017.08.016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3078381"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074664"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868993"},{"key":"e_1_3_2_1_6_1","volume-title":"Jiawen Kang & Dusit Niyato","author":"Kumar Neeraj","year":"2020","unstructured":"Liu, Yi, Neeraj Kumar , Zehui Xiong , Wei Yang Bryan Lim , Jiawen Kang & Dusit Niyato , 2020 . Communication-Efficient Federated Learning for Anomaly Detection in Industrial Internet of Things . Liu, Yi, Neeraj Kumar, Zehui Xiong, Wei Yang Bryan Lim, Jiawen Kang & Dusit Niyato, 2020. Communication-Efficient Federated Learning for Anomaly Detection in Industrial Internet of Things."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3119968"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.03.029"},{"key":"e_1_3_2_1_9_1","volume-title":"Karen and Andrew Zisserman","author":"Simonyan","year":"2014","unstructured":"Simonyan , Karen and Andrew Zisserman , 2014 . Very Deep Convolutional Networks for Large-Scale Image Recognition . arXiv e-prints:arXiv:1409.1556. Simonyan, Karen and Andrew Zisserman, 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv e-prints:arXiv:1409.1556."},{"key":"e_1_3_2_1_10_1","volume-title":"Seth Hampson and Blaise Ag\u00fcera y Arcas","author":"McMahan Brendan","year":"2016","unstructured":"Brendan McMahan , H., Eider Moore , Daniel Ramage , Seth Hampson and Blaise Ag\u00fcera y Arcas , 2016 . Communication-Efficient Learning of Deep Networks from Decentralized Data . arXiv e-prints:arXiv:1602.05629. Brendan McMahan, H., Eider Moore, Daniel Ramage, Seth Hampson and Blaise Ag\u00fcera y Arcas, 2016. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv e-prints:arXiv:1602.05629."},{"key":"e_1_3_2_1_11_1","volume-title":"Wei Lu and Ali A. Ghorbani","author":"Bagheri Ebrahim","year":"2009","unstructured":"Tavallaee, Mahbod, Ebrahim Bagheri , Wei Lu and Ali A. Ghorbani , 2009 . A detailed analysis of the KDD CUP 99 data set. Tavallaee, Mahbod, Ebrahim Bagheri, Wei Lu and Ali A. Ghorbani, 2009. A detailed analysis of the KDD CUP 99 data set."},{"key":"e_1_3_2_1_12_1","first-page":"878","volume-title":"Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning. In: Huang, D.-S., X.-P. Zhang & G.-B. Huang (eds) Advances in Intelligent Computing","year":"2005","unstructured":"Han, Hui , Wen-Yuan Wang and Bing-Huan Mao , Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning. In: Huang, D.-S., X.-P. Zhang & G.-B. Huang (eds) Advances in Intelligent Computing , Berlin, Heidelberg , 2005 \/\/ 2005. Springer Berlin Heidelberg , p 878 - 887 . Han, Hui, Wen-Yuan Wang and Bing-Huan Mao, Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning. In: Huang, D.-S., X.-P. Zhang & G.-B. Huang (eds) Advances in Intelligent Computing, Berlin, Heidelberg, 2005\/\/ 2005. Springer Berlin Heidelberg, p 878-887."},{"key":"e_1_3_2_1_13_1","volume-title":"Akhil Pankaj and Reshmi Mitra","author":"Jishnu Jaykumar","year":"2021","unstructured":"Singh, Praneet, Jishnu Jaykumar P , Akhil Pankaj and Reshmi Mitra , 2021 . Edge-Detect: Edge- Centric Network Intrusion Detection using Deep Neural Network . Singh, Praneet, Jishnu Jaykumar P, Akhil Pankaj and Reshmi Mitra, 2021. Edge-Detect: Edge-Centric Network Intrusion Detection using Deep Neural Network."}],"event":{"name":"CACML 2023: 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","location":"Shanghai China","acronym":"CACML 2023"},"container-title":["Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590003.3590060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590003.3590060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:16Z","timestamp":1750183756000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590003.3590060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,17]]},"references-count":13,"alternative-id":["10.1145\/3590003.3590060","10.1145\/3590003"],"URL":"https:\/\/doi.org\/10.1145\/3590003.3590060","relation":{},"subject":[],"published":{"date-parts":[[2023,3,17]]},"assertion":[{"value":"2023-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}