Open Access
Issue |
E3S Web Conf.
Volume 491, 2024
International Conference on Environmental Development Using Computer Science (ICECS’24)
|
|
---|---|---|
Article Number | 02033 | |
Number of page(s) | 15 | |
Section | Smart Systems for Environmental Development | |
DOI | https://doi.org/10.1051/e3sconf/202449102033 | |
Published online | 21 February 2024 |
- V. Laguduva, S. A. Islam, S. Aakur, S. Katkoori and R. Karam, “Machine Learning Based IoT Edge Node Security Attack and Countermeasures,” 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Miami, FL, USA, 2019, pp. 670-675, doi: 10.1109/ISVLSI.2019.00124. [Google Scholar]
- H. Zhang, Z. Liu, H. Huang and L. Wang, “FTSGD: An Adaptive Stochastic Gradient Descent Algorithm for Spark MLlib,” 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Athens, Greece, 2018, pp. 828-835, doi: 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00-22. [Google Scholar]
- J. Rezgui and E. Soldevila, “Novel IoT Development Kit for Personalized Smart Ecosystems: Aliot,” 2022 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), Alamein New City, Egypt, 2022, pp. 54-59, doi: 10.1109/GCAIoT57150.2022.10019206. [Google Scholar]
- V. R. Kebande, S. Alawadi, F. M. Awaysheh and J. A. Persson, “Active Machine Learning Adversarial Attack Detection in the User Feedback Process,” in IEEE Access, vol. 9, pp. 36908-36923, 2021, doi: 10.1109/ACCESS.2021.3063002. [CrossRef] [Google Scholar]
- H. Abdulla, H. Al-Raweshidy and W. Awad, “The Era of Internet of Things: Towards better security using machine learning,” 2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD), Manama, Bahrain, 2023, pp. 1-5, doi: 10.1109/ITIKD56332.2023.10099608. [Google Scholar]
- S. Ajani and M. Wanjari, “An Efficient Approach for Clustering Uncertain Data Mining Based on Hash Indexing and Voronoi Clustering,” 2013 5th International Conference and Computational Intelligence and Communication Networks, 2013, pp. 486-490, doi: 10.1109/CICN.2013.106. [Google Scholar]
- Khetani, V.. , Gandhi, Y.. , Bhattacharya, S.. , Ajani, S. N. ., &Limkar, S.. (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262. [Google Scholar]
- S. Sarowa, Y. Sapru, V. Kumar, B. Bhanot and M. Kumar, “Vulnerability Assessment in Growing Education Ecosystem,” 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 2023, pp. 362-366, doi: 10.1109/ICSCCC58608.2023.10176735. [Google Scholar]
- B. P.K, K. M and S. M. V, “Attack and Anomaly Prediction in IoT Networks using Machine Learning Approaches,” 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), Erode, India, 2021, pp. 1-6, doi: 10.1109/ICECCT52121.2021.9616794. [Google Scholar]
- G. Kornaros, “Hardware-Assisted Machine Learning in Resource-Constrained IoT Environments for Security: Review and Future Prospective,” in IEEE Access, vol. 10, pp. 58603-58622, 2022, doi: 10.1109/ACCESS.2022.3179047. [CrossRef] [Google Scholar]
- J. Aira, T. Olivares, F. M. Delicado and D. Vezzani, “MosquIoT: A System Based on IoT and Machine Learning for the Monitoring of Aedesaegypti (Diptera: Culicidae),” in IEEE Transactions on Instrumentation and Measurement, vol. 72, pp. 1-13, 2023, Art no. 2509613, doi: 10.1109/TIM.2023.3265119. [CrossRef] [PubMed] [Google Scholar]
- R. Patil Rashmi, Y. Gandhi, V. Sarmalkar, P. Pund and V. Khetani, “RDPC: Secure Cloud Storage with Deduplication Technique,” 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2020, pp. 1280-1283, doi: 10.1109/I-SMAC49090.2020.9243442. [Google Scholar]
- M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali and M. Guizani, “A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security,” in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646-1685, thirdquarter 2020, doi: 10.1109/COMST.2020.2988293. [CrossRef] [Google Scholar]
- J. Moreno, E. B. Fernandez, M. A. Serrano and E. Fernández-Medina, “Secure Development of Big Data Ecosystems,” in IEEE Access, vol. 7, pp. 96604-96619, 2019, doi: 10.1109/ACCESS.2019.2929330. [CrossRef] [Google Scholar]
- Bhattacharya, S. ., & Pandey, M. . (2023). An Integrated Decision-Support System for Increasing Crop Yield Based on Progressive Machine Learning and Sensor Data. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 272–284. [Google Scholar]
- Dhabliya, M. D. . (2021). Cloud Computing Security Optimization via Algorithm Implementation. International Journal of New Practices in Management and Engineering, 10(01), 22–24. [CrossRef] [Google Scholar]
- Dhabliya, D. (2021). An Integrated Optimization Model for Plant Diseases Prediction with Machine Learning Model . Machine Learning Applications in Engineering Education and Management, 1(2), 21–26. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/15 [Google Scholar]
- Sairise, Raju M., Limkar, Suresh, Deokate, Sarika T., Shirkande, Shrinivas T., Mahajan, RupaliAtul& Kumar, Anil (2023) Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1569–1583, DOI: 10.47974/JDMSC-1825 [CrossRef] [Google Scholar]
- Rahul Sharma. (2018). Monitoring of Drainage System in Urban Using Device Free Localization Neural Networks and Cloud computing. International Journal of New Practices in Management and Engineering, 7(04), 08 –14. https://doi.org/10.17762/ijnpme.v7i04.69 [Google Scholar]
- Dhabliya, D. (2021). Feature Selection Intrusion Detection System for The Attack Classification with Data Summarization. Machine Learning Applications in Engineering Education and Management, 1(1), 20–25. [Google Scholar]
- Dhabliya, P. D. . (2020). Multispectral Image Analysis Using Feature Extraction with Classification for Agricultural Crop Cultivation Based On 4G Wireless IOT Networks. Research Journal of Computer Systems and Engineering, 1(1), 01–05. [Google Scholar]
- Kumar, A., & Sharma, S. K. (2022). Information cryptography using cellular automata and digital image processing. Journal of Discrete Mathematical Sciences and Cryptography, 25(4), 1105-1111. [CrossRef] [Google Scholar]
- Sable, N. P., Shende, P., Wankhede, V. A., Wagh, K. S., Ramesh, J. V. N., & Chaudhary, S. (2023). DQSCTC: design of an efficient deep dyna-Q network for spinal cord tumour classification to identify cervical diseases. Soft Computing, 1-26. [Google Scholar]
- Thota, D. S. ., Sangeetha, D. M., &Raj, R.. (2022). Breast Cancer Detection by Feature Extraction and Classification Using Deep Learning Architectures. Research Journal of Computer Systems and Engineering, 3(1), 90–94. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/48 [Google Scholar]
- RitikaDhabliya. (2020). Obstacle Detection and Text Recognition for Visually Impaired Person Based on Raspberry Pi. International Journal of New Practices in Management and Engineering, 9(02), 01 –07. https://doi.org/10.17762/ijnpme.v9i02.83 [CrossRef] [Google Scholar]
- Ahammad, D. S. K. H. (2022). Microarray Cancer Classification with Stacked Classifier in Machine Learning Integrated Grid L1-Regulated Feature Selection. Machine Learning Applications in Engineering Education and Management, 2(1), 01–10. [Google Scholar]
- Lachouri, A., &Ardjouni, A. (2022). Aeroelastic Stability of Combined Plunge-Pitch Mode Shapes in a Linear Compressor Cascade. Advances in the Theory of Nonlinear Analysis and Its Applications, 6(1), 101–117. [Google Scholar]
- Panwar, A., Morwal, R., & Kumar, S. (2022). Fixed points of ρ-nonexpansive mappings using MP iterative process. Advances in the Theory of Nonlinear Analysis and Its Applications, 6(2), 229–245. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.