2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) 2022
DOI: 10.1109/icaccs54159.2022.9785348
|View full text |Cite
|
Sign up to set email alerts
|

Secure Wireless Sensor Network Energy Optimization Model with Game Theory and Deep Learning Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…In general, the bar graph shows how often escape attacks work with different defense strategies and frameworks, which helps you figure out how well they protect against hostile threats. The table (4) gives an in-depth look at a number of different computer defense strategies and frameworks, focused on different evaluation factors such as F1 score, accuracy, precision, area under the curve (AUC), sensitivity, and specificity. By looking at these factors, you can see how well each defense plan works at stopping hostile machine learning (AML) attacks and keeping you safe from online dangers.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…In general, the bar graph shows how often escape attacks work with different defense strategies and frameworks, which helps you figure out how well they protect against hostile threats. The table (4) gives an in-depth look at a number of different computer defense strategies and frameworks, focused on different evaluation factors such as F1 score, accuracy, precision, area under the curve (AUC), sensitivity, and specificity. By looking at these factors, you can see how well each defense plan works at stopping hostile machine learning (AML) attacks and keeping you safe from online dangers.…”
Section: Resultsmentioning
confidence: 99%
“…The suggested method, which probably combines a number of different defense systems and strategic factors, comes out on top in every evaluation criterion. The table (4) shows that the suggested method does a better job of stopping AML attacks and online risks, with an F1 score of 95%, an accuracy score of 92%, a precision score of 88%, and an AUC score of 92%. It also gets a balance between sensitivity and precision, which shows that it can correctly identify both true positive and true negative cases.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations