A review on federated learning and machine learning approaches: categorization, application areas, and blockchain technology

RO Ogundokun, S Misra, R Maskeliunas… - Information, 2022 - mdpi.com
Federated learning (FL) is a scheme in which several consumers work collectively to unravel
machine learning (ML) problems, with a dominant collector synchronizing the procedure …

Cyber-security and reinforcement learning—a brief survey

AMK Adawadkar, N Kulkarni - Engineering Applications of Artificial …, 2022 - Elsevier
This paper presents a comprehensive literature review on Reinforcement Learning (RL)
techniques used in Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) …

ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD

M Esmaeili, SH Goki, BHK Masjidi… - Wireless …, 2022 - Wiley Online Library
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …

Assimilation of 3D printing, Artificial Intelligence (AI) and Internet of Things (IoT) for the construction of eco-friendly intelligent homes: An explorative review

BS Alotaibi, AI Shema, AU Ibrahim, MA Abuhussain… - Heliyon, 2024 - cell.com
The construction industry is witnessing a transformative shift towards sustainable and
intelligent housing solutions driven by advancements in 3D printing, Artificial Intelligence …

Multi-objective SHADE with manta ray foraging optimizer for structural design problems

C Zhong, G Li, Z Meng, H Li, W He - Applied Soft Computing, 2023 - Elsevier
This paper presents a hybrid multi-objective success history-based parameter adaptive
differential evolution (SHADE) with manta ray foraging optimizer (MRFO) for structural …

An analysis of strategies for adopting blockchain technology in the after-sales service supply chain

A Ullah, M Ayat, Y He, B Lev - Computers & Industrial Engineering, 2023 - Elsevier
In this paper, we explore strategies for implementing blockchain technology in a supply
chain where a manufacturer outsources base warranty (BW) repairs to a retailer and the …

Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)

M Abdan, SAH Seno - Wireless Communications and Mobile …, 2022 - Wiley Online Library
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …

A Novel Highway Routing Protocol in Vehicular Ad Hoc Networks Using VMaSC‐LTE and DBA‐MAC Protocols

E Khezri, E Zeinali, H Sargolzaey - … communications and mobile …, 2022 - Wiley Online Library
The vehicular ad hoc networks (VANETs) are an example of mobile networks, which utilizes
dedicated short‐range communication (DSRC) to establish a wireless connection between …

[HTML][HTML] Adaptive single-layer aggregation framework for energy-efficient and privacy-preserving load forecasting in heterogeneous Federated smart grids

HU Manzoor, A Jafri, A Zoha - Internet of Things, 2024 - Elsevier
Federated Learning (FL) enhances predictive accuracy in load forecasting by integrating
data from distributed load networks while ensuring data privacy. However, the …

Presentation of novel architecture for diagnosis and identifying breast cancer location based on ultrasound images using machine learning

Y Pourasad, E Zarouri, M Salemizadeh Parizi… - Diagnostics, 2021 - mdpi.com
Breast cancer is one of the main causes of death among women worldwide. Early detection
of this disease helps reduce the number of premature deaths. This research aims to design …