2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) 2020
DOI: 10.1109/iccsea49143.2020.9132898
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security for IoT via Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…In agriculture, machine learning allows for more accurate disease diagnosis while conserving energy and avoiding false data. Farmers can upload field images captured by intelligent systems like satellites, unmanned aerial vehicles (UAVs), land-based rovers, smart phones, and tools such as the Climate Field View platform, which can identify potential farm issues and recommend a management plan [48][49][50][51][52].…”
Section: Recommendation System For Renting and Sharingmentioning
confidence: 99%
“…In agriculture, machine learning allows for more accurate disease diagnosis while conserving energy and avoiding false data. Farmers can upload field images captured by intelligent systems like satellites, unmanned aerial vehicles (UAVs), land-based rovers, smart phones, and tools such as the Climate Field View platform, which can identify potential farm issues and recommend a management plan [48][49][50][51][52].…”
Section: Recommendation System For Renting and Sharingmentioning
confidence: 99%
“…Machine learning is becoming more efficient and accurate because of deep learning algorithms. Using automated machine learning, one may reduce the need for ML expertise while also automating the ML workflow with greater precision [33,34].…”
Section: E Real Purpose Of Smartmentioning
confidence: 99%
“…Selvakanmani and Sumathi [20] have proposed the blockchain and smart contract-based framework for cloudedge computing in the healthcare system, thus providing data privacy, security, latency, cost-effective storage, and data availability. Computational and Mathematical Methods in Medicine After closer analysis of the related work and other models [4,[20][21][22][23], we have found that most of the security networks are centralized in nature which rely on thirdparty sources for security and data exchange. The healthcare system is spread across heterogeneous platforms and devices, which enforces the developer to think about a decentralized framework for easy data exchange with complete security and privacy.…”
Section: Related Workmentioning
confidence: 99%