A review of supervised machine learning algorithms

A Singh, N Thakur, A Sharma - 2016 3rd international …, 2016 - ieeexplore.ieee.org
Supervised machine learning is the construction of algorithms that are able to produce
general patterns and hypotheses by using externally supplied instances to predict the fate of …

A review on conventional machine learning vs deep learning

NK Chauhan, K Singh - 2018 International conference on …, 2018 - ieeexplore.ieee.org
In now days, deep learning has become a prominent and emerging research area in
computer vision applications. Deep learning permits the multiple layers models for …

Credit card fraud detection using machine learning techniques: A comparative analysis

JO Awoyemi, AO Adetunmbi… - … and informatics (ICCNI), 2017 - ieeexplore.ieee.org
Financial fraud is an ever growing menace with far consequences in the financial industry.
Data mining had played an imperative role in the detection of credit card fraud in online …

A new ensemble-based intrusion detection system for internet of things

A Abbas, MA Khan, S Latif, M Ajaz, AA Shah… - Arabian Journal for …, 2022 - Springer
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few
years by drastically transforming human lives to automate their ordinary daily tasks. This is …

A Bolasso based consistent feature selection enabled random forest classification algorithm: An application to credit risk assessment

N Arora, PD Kaur - Applied Soft Computing, 2020 - Elsevier
Credit risk assessment has been a crucial issue as it forecasts whether an individual will
default on loan or not. Classifying an applicant as good or bad debtor helps lender to make …

Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks

SA Khanday, H Fatima, N Rakesh - Expert Systems with Applications, 2023 - Elsevier
Protecting IoT networks and infrastructure is one of the top priorities in today's computing
industry because of the unnerving and exponential development in cyberattacks and …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network

S Samarakoon, Y Siriwardhana, P Porambage… - arxiv preprint arxiv …, 2022 - arxiv.org
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …

Hotspot diagnosis for solar photovoltaic modules using a Naive Bayes classifier

KAK Niazi, W Akhtar, HA Khan, Y Yang, S Athar - Solar Energy, 2019 - Elsevier
Monitoring and maintenance of photovoltaic (PV) modules are critical for a reliable and
efficient operation. Hotspots in PV modules due to various defects and operational …

Simultaneous multithreading: Maximizing on-chip parallelism

DM Tullsen, SJ Eggers, HM Levy - Proceedings of the 22nd annual …, 1995 - dl.acm.org
This paper examines simultaneous multithreading, a technique permitting several
independent threads to issue instructions to a superscalar's multiple functional units in a …