2022
DOI: 10.21203/rs.3.rs-1759040/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Diligence Eagle Optimization Protocol for Secure Routing (DEOPSR) in Cloud-Based Wireless Sensor Network

Abstract: Wireless sensor networks (WSN) are essential for various applications that collect and analyze data from the physical environment. Cloud computing particularly provides a benchmarks method for distributed resource sharing. The concept of “Sensor Clouds” has emerged due to extending the paradigm of cloud computing to include sharing the sensed data through WSN. Data collected by these many sensor-based applications is enormous. Routing is significant in cloud-based WSN (CWSN). Poor routing protocol affects the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…5 Early data poisoning research used manual methods to create fake users, who typically perform suboptimally in attacks even when they have access to input data as well as are aware of the recommendation system. 6 For instance, a random attack selects filler items at random for every fake user as well as rates filler items according to the normal distribution of all rating information. The average attack chooses filler items identically to the random attack.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…5 Early data poisoning research used manual methods to create fake users, who typically perform suboptimally in attacks even when they have access to input data as well as are aware of the recommendation system. 6 For instance, a random attack selects filler items at random for every fake user as well as rates filler items according to the normal distribution of all rating information. The average attack chooses filler items identically to the random attack.…”
Section: Introductionmentioning
confidence: 99%
“…There have not been many studies on manipulating ML methods of energy consumption data, despite adversarial ML, and attacks on ML methods, being a developing research field 5 . Early data poisoning research used manual methods to create fake users, who typically perform suboptimally in attacks even when they have access to input data as well as are aware of the recommendation system 6 . For instance, a random attack selects filler items at random for every fake user as well as rates filler items according to the normal distribution of all rating information.…”
Section: Introductionmentioning
confidence: 99%