Related references
Note: Only part of the references are listed.Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System
Arun Kumar Sangaiah et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics
Arun Kumar Sangaiah et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks
Shamsul Huda et al.
APPLIED SOFT COMPUTING (2018)
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
Sayantani Basu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Optimization Methods for Large-Scale Machine Learning
Leon Bottou et al.
SIAM REVIEW (2018)
Mastering the game of Go with deep neural networks and tree search
David Silver et al.
NATURE (2016)
Human-level control through deep reinforcement learning
Volodymyr Mnih et al.
NATURE (2015)
A tutorial on the cross-entropy method
PT De Boer et al.
ANNALS OF OPERATIONS RESEARCH (2005)
Are loss functions all the same?
L Rosasco et al.
NEURAL COMPUTATION (2004)