2022
DOI: 10.7717/peerj-cs.983
|View full text |Cite
|
Sign up to set email alerts
|

Quantum readout and gradient deep learning model for secure and sustainable data access in IWSN

Abstract: The industrial wireless sensor network (IWSN) is a surface-type of wireless sensor network (WSN) that suffers from high levels of security breaches and energy consumption. In modern complex industrial plants, it is essential to maintain the security, energy efficiency, and green sustainability of the network. In an IWSN, sensors are connected to the Internet in a non-monitored environment. Hence, non-authorized sensors can retrieve information from the IWSN. Therefore, to ensure that data access between sensor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Since Accuracy cannot reflect the effect of malicious code detection in malicious code detection, this paper uses Recall , FPR and Precision to supplement. Recall represents the proportion of the malicious samples in the predicted results in the real malicious samples, FPR represents the ratio of the number of false positive examples to the number of all actual negative examples and Precision represents the proportion of the correctly predicted malicious samples in the predicted results [ 36 ]. Its representation is as follows: Where, TP represents the number of samples that detect malicious code as malicious code, FN represents the number of samples that detect malicious code as benign code, and FP represents the number of samples that detect benign code as malicious code.…”
Section: Methodsmentioning
confidence: 99%
“…Since Accuracy cannot reflect the effect of malicious code detection in malicious code detection, this paper uses Recall , FPR and Precision to supplement. Recall represents the proportion of the malicious samples in the predicted results in the real malicious samples, FPR represents the ratio of the number of false positive examples to the number of all actual negative examples and Precision represents the proportion of the correctly predicted malicious samples in the predicted results [ 36 ]. Its representation is as follows: Where, TP represents the number of samples that detect malicious code as malicious code, FN represents the number of samples that detect malicious code as benign code, and FP represents the number of samples that detect benign code as malicious code.…”
Section: Methodsmentioning
confidence: 99%
“…Machine Learning has been successfully applied to a large number of fields and functions, such as document classification, computer vision, natural language processing, protein structure prediction, fraud and malware detection [ 8 ], medical diagnosis and data privacy [ 9 ], network and data transmission security [ 10 ], intrusion detection [ 11 ], generative molecular design [ 12 ], and recommendation systems, among others [ 13 ]. Also, it offers a vast set of techniques, providing several opportunities to approach various problems.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, signature-based detection compares incoming traffic to pre-established rules to determine whether to allow or reject it. In the past few years, there have been a variety of study articles developed in the area of intrusion detection systems for fog and edge computing environments [13,14]. Early research concentrated on supervised machine learning and unsupervised machine learning.…”
Section: Introductionmentioning
confidence: 99%