“…To overcome the changing attack characteristics of LFA, numerous artificial intelligence (AI) methodologies [ 11 , 12 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 ] are introduced to defend against LFA through end-to-end functionality (Input: network status; Output: defending action) without any manual intervention [ 26 , 27 , 28 , 29 , 30 ]. The AI-based methodologies, therefore, reduce the inefficient labor cost, subjective judgment, and self-learning regarding the changing attack characteristics of LFA in a timely manner.…”