A review on federated learning and machine learning approaches: categorization, application areas, and blockchain technology
Federated learning (FL) is a scheme in which several consumers work collectively to unravel
machine learning (ML) problems, with a dominant collector synchronizing the procedure …
machine learning (ML) problems, with a dominant collector synchronizing the procedure …
Cyber-security and reinforcement learning—a brief survey
AMK Adawadkar, N Kulkarni - Engineering Applications of Artificial …, 2022 - Elsevier
This paper presents a comprehensive literature review on Reinforcement Learning (RL)
techniques used in Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) …
techniques used in Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) …
ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …
protected by integrity, confidentiality, and authentication services. The network is protected …
Assimilation of 3D printing, Artificial Intelligence (AI) and Internet of Things (IoT) for the construction of eco-friendly intelligent homes: An explorative review
The construction industry is witnessing a transformative shift towards sustainable and
intelligent housing solutions driven by advancements in 3D printing, Artificial Intelligence …
intelligent housing solutions driven by advancements in 3D printing, Artificial Intelligence …
Multi-objective SHADE with manta ray foraging optimizer for structural design problems
This paper presents a hybrid multi-objective success history-based parameter adaptive
differential evolution (SHADE) with manta ray foraging optimizer (MRFO) for structural …
differential evolution (SHADE) with manta ray foraging optimizer (MRFO) for structural …
An analysis of strategies for adopting blockchain technology in the after-sales service supply chain
In this paper, we explore strategies for implementing blockchain technology in a supply
chain where a manufacturer outsources base warranty (BW) repairs to a retailer and the …
chain where a manufacturer outsources base warranty (BW) repairs to a retailer and the …
Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …
classification is performed with several methods of machine learning consisting of K‐nearest …
A Novel Highway Routing Protocol in Vehicular Ad Hoc Networks Using VMaSC‐LTE and DBA‐MAC Protocols
The vehicular ad hoc networks (VANETs) are an example of mobile networks, which utilizes
dedicated short‐range communication (DSRC) to establish a wireless connection between …
dedicated short‐range communication (DSRC) to establish a wireless connection between …
[HTML][HTML] Adaptive single-layer aggregation framework for energy-efficient and privacy-preserving load forecasting in heterogeneous Federated smart grids
Federated Learning (FL) enhances predictive accuracy in load forecasting by integrating
data from distributed load networks while ensuring data privacy. However, the …
data from distributed load networks while ensuring data privacy. However, the …
Presentation of novel architecture for diagnosis and identifying breast cancer location based on ultrasound images using machine learning
Breast cancer is one of the main causes of death among women worldwide. Early detection
of this disease helps reduce the number of premature deaths. This research aims to design …
of this disease helps reduce the number of premature deaths. This research aims to design …