4.7 Review

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system

Prabhat Kumar et al.

Summary: This article presents a method for secure data transmission in IoT-enabled healthcare system using blockchain and deep learning. It ensures data integrity and secure transmission through a novel scalable blockchain architecture with Zero Knowledge Proof mechanism, and addresses storage cost and security issues by integrating off-chain storage and smart contracts. Experimental results demonstrate that the proposed method outperforms existing techniques in both non-blockchain and blockchain settings, achieving accuracy close to 99%.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2023)

Article Computer Science, Artificial Intelligence

A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning

Muna Al-Hawawreh et al.

Summary: Internet of Medical Things (IoMT) devices and systems are often designed without adequate security, leaving them highly susceptible to cyber threats. This study proposes a privacy-aware framework that securely stores and fuses data from heterogeneous IoMT devices using differential privacy and deep learning, and efficiently detects cyber-attacks using quantum deep learning. Experimental results show that the proposed framework is highly effective in detecting cyber-attacks.

INFORMATION FUSION (2023)

Article Engineering, Chemical

Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network

Kedalu Poornachary Vijayakumar et al.

Processes (2023)

Article Computer Science, Interdisciplinary Applications

Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm

Mohamed Abd Elaziz et al.

Summary: This paper proposes an efficient intrusion detection system for IoT-cloud based environments, using swarm intelligence algorithms and deep neural networks. Deep neural networks are used to obtain optimal features from IoT IDS data, and a feature selection technique based on the Capuchin Search Algorithm (CapSA) is proposed. The developed model, CNN-CapSA, is tested with four IoT-Cloud datasets and compared with other optimization algorithms, showing competitive performance.

ADVANCES IN ENGINEERING SOFTWARE (2023)

Review Computer Science, Information Systems

Internet of Things (IoT) security dataset evolution: Challenges and future directions

Barjinder Kaur et al.

Summary: The evolution of mobile technologies has introduced smarter and more connected objects into our day-to-day lives, known as the Internet of Things (IoT). However, the IoT also brings cybersecurity threats due to different communication standards, weak security defaults, and the difficulty of updating. To address these threats, developing a robust intrusion detection framework specifically for IoT is a promising approach.

INTERNET OF THINGS (2023)

Article Computer Science, Information Systems

Research article Energy consumption of on-device machine learning models for IoT intrusion detection

Nazli Tekin et al.

Summary: Smart Home Systems (SHSs) have become popular with the development of Internet of Things (IoT) technologies. However, SHSs are vulnerable to attacks, leading to security and privacy concerns. Machine learning (ML)-based Intrusion Detection Systems (IDS) are proposed to address these concerns. Training ML models on-device can ensure data security and privacy, but it requires high energy consumption.

INTERNET OF THINGS (2023)

Article Computer Science, Artificial Intelligence

A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithm

Robson V. Mendonca et al.

Summary: With the substantial industrial growth, the emergence of IIoT and various IoT fields have brought new challenges in terms of security issues, which require improved solutions for intelligent decision-making actions. A prediction model based on sparse evolutionary training (SET) is proposed in this paper to analyze and detect cybersecurity attacks in IIoT, achieving high accuracy and improving attack detection in Industry 4.0.

EXPERT SYSTEMS (2022)

Article Chemistry, Analytical

Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System

Muhammad Husnain et al.

Summary: In this paper, a MQTT parsing engine is designed and developed to serve as an initial layer in network-based IDS for extensive checking of IoT protocol vulnerabilities and improper usage. By rigorously validating packet fields, the proposed solution effectively detects and prevents the exploitation of vulnerabilities on IoT protocols.

SENSORS (2022)

Review Computer Science, Information Systems

A Review of IoT-Enabled Mobile Healthcare: Technologies, Challenges, and Future Trends

Yilin Yang et al.

Summary: The growth of the Internet of Things (IoT) has greatly contributed to the modernization of healthcare systems, allowing for various applications such as fitness tracking and sleep monitoring. This article surveys studies on smart health monitoring systems and the types of sensors used in the IoT. It analyzes these works based on their device-based and device-free techniques, as well as the signal processing and classification techniques used. The article discusses the creative application of these techniques to support professional and commercial health-monitoring IoT networks and identifies limitations and potential future research directions.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Deep Q-Learning-Based Neural Network with Privacy Preservation Method for Secure Data Transmission in Internet of Things (IoT) Healthcare Application

Nirmala Devi Kathamuthu et al.

Summary: The healthcare industry is being transformed by the Internet of Things (IoT), which enables connectivity among various stakeholders for real-time monitoring. In this study, a deep Q-learning-based neural network with privacy preservation method (DQ-NNPP) was developed to protect patient data transmission from external threats. Compared to other approaches, the proposed method achieved high accuracy and reduced communication overhead.

ELECTRONICS (2022)

Article Computer Science, Hardware & Architecture

Deep Learning-based Continuous Authentication for an IoT-enabled healthcare service

Amiya Kumar Sahu et al.

Summary: The security of IoT continues to be a significant concern, with current research focusing on external attacks. However, internal devices or users within the network may pose a greater threat, highlighting the need for a security system that can continuously authenticate legitimate users.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Automation & Control Systems

Modeling, Detecting, and Mitigating Threats Against Industrial Healthcare Systems: A Combined Software Defined Networking and Reinforcement Learning Approach

Panagiotis Radoglou-Grammatikis et al.

Summary: The rise of the Internet of Medical Things brings both benefits and concerns to the healthcare ecosystem. This article focuses on the IEC 60 870-5-104 protocol and investigates its cyberattacks. It proposes an intrusion detection and prevention system (IDPS) that can automatically detect and mitigate these attacks. The IDPS utilizes machine learning and software defined networking technologies, achieving high accuracy and performance.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Nanoscience & Nanotechnology

Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System

K. Thilagam et al.

Summary: This study proposes an IoT-based deep learning privacy preservation and data analytics system to address security issues in healthcare systems. By collecting data from wearable devices and analyzing health-related information in the cloud, user privacy can be protected. The introduction of a secure access control module enables access control based on user attributes.

JOURNAL OF NANOMATERIALS (2022)

Article Chemistry, Analytical

Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT

Muhammad Aslam et al.

Summary: The development of smart network infrastructure for IoT faces the threat of DDoS attacks. The existing network security solutions are costly and unscalable for IoT. This paper proposes an Adaptive Machine Learning based SDN-enabled framework for detecting and mitigating DDoS attacks, which achieves higher accuracy and lower false alarm rate compared to existing solutions.

SENSORS (2022)

Article Computer Science, Information Systems

An Intrusion Detection Mechanism for Secured IoMT Framework Based on Swarm-Neural Network

Sudarshan Nandy et al.

Summary: The paper proposes an Empirical Intelligent Agent method based on Swarm-Neural network to identify attackers in the edge-centric Internet of Medical Things framework. Test results on the ToN-IoT dataset demonstrate that the proposed method achieves 99.5% accuracy in identifying attacks during data transmission.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2022)

Article Automation & Control Systems

ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC

Mohit Kumar et al.

Summary: This article investigates how to enhance the security of the Internet of Medical Things using elliptic curve cryptography and Vigenere cipher, improving data security and privacy through algorithms for privacy preservation, neural networks, optimization methods, and blockchain technology.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Chemistry, Analytical

Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System

Mohammed Zubair et al.

Summary: The article introduces the use of artificial intelligence and deep learning to combat network attacks in smart health applications, and proposes an intrusion detection model and dataset based on deep learning. The research results show that the proposed intrusion detection model performs well in terms of F1 score and can effectively protect against attacks in smart health systems.

SENSORS (2022)

Review Environmental Sciences

A Survey of GNSS Spoofing and Anti-Spoofing Technology

Lianxiao Meng et al.

Summary: This article focuses on the issue of spoofing in satellite navigation by analyzing the common interference types and classifying the spoofing modes based on signal generation, implementation stage, and deployment strategy. The research progress of GNSS anti-spoofing technology over the last decade is summarized, along with an analysis and comparison of current spoofing detection technologies. Considerations, prospective challenges, and development trends of GNSS spoofing and anti-spoofing technology are also discussed.

REMOTE SENSING (2022)

Article Green & Sustainable Science & Technology

HealthGuard: An Intelligent Healthcare System Security Framework Based on Machine Learning

Amit Sundas et al.

Summary: Utilizing the Internet of Things and ubiquitous computing has made the healthcare system smarter. The Smart Healthcare System (SHS) monitors patients in real-time to prevent fatal illnesses, but it also faces security threats. This study introduces HealthGuard, a security architecture that uses machine learning to identify harmful actions taken by users, and shows promising results.

SUSTAINABILITY (2022)

Article

Fusion-based anomaly detection system using modified isolation forest for internet of things

Orieb AbuAlghanam et al.

Journal of Ambient Intelligence and Humanized Computing (2022)

Article Computer Science, Information Systems

Permissioned Blockchain and Deep Reinforcement Learning Enabled Security and Energy Efficient Healthcare Internet of Things

Long Liu et al.

Summary: This research proposes a permissioned blockchain and deep reinforcement learning (DRL)-empowered Healthcare Internet of Things (H-IoT) system to address the security and limited energy capacity issues in the large-scale application of H-IoT. The proposed system can provide real-time security and energy-efficient healthcare services to control the propagation of the COVID-19 pandemic.

IEEE ACCESS (2022)

Review Computer Science, Information Systems

Review of security challenges in healthcare internet of things

R. Somasundaram et al.

Summary: The integration of computer science and electronics has led to the notable technology of the Internet of Things (IoT), with widespread applications in various fields including healthcare. However, the increasing security issues in IoT systems pose threats to patient health and safety. Addressing device-level security is crucial, while communication-level security requires more attention. An analysis of security issues in IoMTs helps to identify different risk factors for security attacks.

WIRELESS NETWORKS (2021)

Article Computer Science, Hardware & Architecture

IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art

A. S. Albahri et al.

Summary: Many studies have focused on smart telemedicine through IoT technology, exploring applications in network communications, artificial intelligence, IoT sensors, etc. This study filters and classifies 2121 papers, presenting a classification of IoT-based telemedicine architecture and revealing new research opportunities and challenges.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Information Systems

ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things

Mohiuddin Ahmed et al.

Summary: This paper presents the development of a new dataset, ECU-IoHT, to assist the healthcare security community in analyzing attack behavior and developing robust countermeasures. The study found that nearest neighbor-based algorithms outperformed clustering, statistical, and kernel-based anomaly detection algorithms in identifying cyberattacks.

AD HOC NETWORKS (2021)

Article Computer Science, Hardware & Architecture

A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System

Wei Li et al.

Summary: The outbreak of chronic diseases like COVID-19 has highlighted the importance of urgent healthcare facilities worldwide, with smart wearables playing a vital role in modern healthcare solutions through IoT data collection. The application of big data analytics and machine learning techniques in IoT healthcare is growing, but there is a need for more research focusing on ML-based techniques in this sector.

MOBILE NETWORKS & APPLICATIONS (2021)

Article Chemistry, Analytical

An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications

Ankita Anand et al.

Summary: The role of 5G-IoT is essential in smart applications, especially in e-health. The proposed CNN-DMA deep learning model accurately detects malware attacks.

SENSORS (2021)

Article Computer Science, Artificial Intelligence

Extended Isolation Forest

Sahand Hariri et al.

Summary: The Extended Isolation Forest (EIF) proposes improvements to the Isolation Forest algorithm, addressing issues with assigning anomaly scores to data points. The paper explains the artifacts in anomaly score heat maps and suggests two different approaches for enhancement, with using hyperplanes with random slopes being the preferred method. The study shows that the algorithm's robustness is significantly improved using this method, without notable differences in convergence rate or computation time compared to the standard Isolation Forest.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Chemistry, Analytical

Smart Assistive Architecture for the Integration of IoT Devices, Robotic Systems, and Multimodal Interfaces in Healthcare Environments

Alberto Brunete et al.

Summary: This paper introduces a new architecture for a smart assistive environment that integrates IoT devices, service robots, and users, with a focus on supporting people with disabilities and bedbound patients. The interaction system allows users to control service robots and devices in five different ways: touch, eye, gesture, voice, and augmented reality control. The study presents user preferences for eye-based control and the use of mobile phones over augmented reality glasses in the context of the developed technology.

SENSORS (2021)

Article Chemistry, Analytical

A Framework for Malicious Traffic Detection in IoT Healthcare Environment

Faisal Hussain et al.

Summary: The rapid growth of IoT technology has revolutionized human life but also raised security concerns, especially in areas such as healthcare. Researchers need IoT-specific tools, methods, and datasets to address the security issues posed by IoT devices.

SENSORS (2021)

Review Chemistry, Analytical

Impact of COVID-19 on IoT Adoption in Healthcare, Smart Homes, Smart Buildings, Smart Cities, Transportation and Industrial IoT

Muhammad Umair et al.

Summary: The COVID-19 pandemic has had a positive impact on the adoption of IoT in various industries, promoting the development of technology and innovation. Through research and expert interviews, the paper explores the influence of the pandemic on sectors such as healthcare, smart homes, and smart cities, and summarizes research directions and challenges that will accelerate IoT adoption.

SENSORS (2021)

Article Computer Science, Information Systems

Adversarial Examples-Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices

Md Abdur Rahman et al.

Summary: Medical IoT devices are being integrated into pandemic management systems like COVID-19, with researchers using deep learning algorithms to identify COVID-19 phenomena. However, these DL algorithms have security vulnerabilities to adversarial perturbations, making DL models vulnerable to attacks without defensive mechanisms.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Computer Science, Information Systems

Internet of Things (IoT): A Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities

Mohammad Nuruzzaman Bhuiyan et al.

Summary: The Internet of Things (IoT) is a system that allows real-world things to interact and communicate with each other through networking technologies. This article reviews the advancements in IoT-based healthcare methods and technologies, discussing security, privacy, market opportunities, and more. It identifies research gaps and potential areas for sustainable development in IoT healthcare.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Computer Science, Information Systems

Application Domains, Evaluation Data Sets, and Research Challenges of IoT: A Systematic Review

Ritika Lohiya et al.

Summary: IoT is evolving towards the Internet of Everything, encompassing wireless networks, sensors, cloud servers, smart devices, and advanced technologies. Its applications span various sectors such as transportation, healthcare, and agriculture. Challenges in IoT research and commercial solutions developed in IoT application domains are highlighted in this article.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms

Yakub Kayode Saheed et al.

Summary: Advancements in ICT have changed the computing paradigm, with IoT providing new communication channels in the medical field but also posing security challenges.

IEEE ACCESS (2021)

Review Computer Science, Information Systems

Machine learning approaches to IoT security: A systematic literature review

Rasheed Ahmad et al.

Summary: As IoT applications continue to expand, attacks on them are growing rapidly, with recent research trends emphasizing the development of models that integrate big data and machine learning technologies for better security.

INTERNET OF THINGS (2021)

Review Multidisciplinary Sciences

Trends in Using IoT with Machine Learning in Health Prediction System

Amani Aldahiri et al.

Summary: Machine learning in combination with IoT is crucial in healthcare for intelligent decision-making, real-time patient monitoring, and disease prediction. Different ML algorithms may have varying impacts on prediction results, especially in clinical decision-making processes. Optimizing the choice of ML algorithms based on IoT datasets is essential for predicting critical healthcare data accurately.

FORECASTING (2021)

Review Computer Science, Information Systems

IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare-A Review

Taher M. Ghazal et al.

Summary: Smart city is a concept that aims to make cities more efficient, technologically advanced, greener and socially inclusive. The focus is on using digital technologies to address challenges faced by urban society, with particular potential in the healthcare sector.

FUTURE INTERNET (2021)

Article Computer Science, Information Systems

A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare

Fatima Alshehri et al.

Summary: Smart health care, a key aspect of connected living, is expected to generate billions of dollars in revenue. This field encompasses IoT, AI, and other cutting-edge technologies. Addressing research challenges and proposing future research directions are crucial for advancing smart health care.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Secure Healthcare Data Aggregation and Transmission in IoT-A Survey

Ata Ullah et al.

Summary: The Internet of medical things (IoMT) has attracted researchers' attention due to its wide applicability in healthcare. Smart healthcare sensors and IoT enabled medical devices securely exchange sensitive healthcare data towards server nodes without human interaction, but face challenges in data communications, security, and privacy. This paper surveys different data collection and secure transmission schemes based on fog computing architectures, categorizes these schemes, and discusses open research challenges in the field.

IEEE ACCESS (2021)

Article Management

Smart logistics based on the internet of things technology: an overview

Ding Yangke et al.

Summary: The paper reviews recent research and applications of smart logistics based on IoT, highlighting main technologies, impacts, challenges, and research needs in the field.

INTERNATIONAL JOURNAL OF LOGISTICS-RESEARCH AND APPLICATIONS (2021)

Article Chemistry, Analytical

An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications

Ankita Anand et al.

Summary: 5G-IoT plays an indispensable role in smart applications and is crucial in e-health applications. Intelligent schemes and architectures are required to overcome security threats against sensitive patient data in e-health applications. Deep learning techniques can detect security attacks, but this requires hybrid models for support.

SENSORS (2021)

Review Computer Science, Information Systems

A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications

Hemantha Krishna Bharadwaj et al.

Summary: The Internet of Things is driving rapid automation in the healthcare sector, with a focus on data gathering, processing, and accurate predictions using machine learning algorithms. This paper serves as a compilation and review of state of the art applications of ML algorithms in Healthcare Internet of Things.

IEEE ACCESS (2021)

Article Computer Science, Software Engineering

Machine learning algorithms to detect DDoS attacks in SDN

Reneilson Santos et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Hardware & Architecture

Distributed denial of service attacks and its defenses in IoT: a survey

Mikail Mohammed Salim et al.

JOURNAL OF SUPERCOMPUTING (2020)

Review Computer Science, Information Systems

An exhaustive survey on security and privacy issues in Healthcare 4.0

Jigna J. Hathaliya et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Cross-site scripting (XSS) attacks and mitigation: A survey

German E. Rodriguez et al.

COMPUTER NETWORKS (2020)

Article Telecommunications

Node to Node Performance Evaluation through RYU SDN Controller

Md. Tariqul Islam et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Chemistry, Analytical

SlowITe, a Novel Denial of Service Attack Affecting MQTT

Ivan Vaccari et al.

SENSORS (2020)

Review Telecommunications

Internet of Things (IoT), Applications and Challenges: A Comprehensive Review

Abhishek Khanna et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Artificial Intelligence

MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context

Anass Sebbar et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Review Computer Science, Information Systems

The k-means Algorithm: A Comprehensive Survey and Performance Evaluation

Mohiuddin Ahmed et al.

ELECTRONICS (2020)

Article Computer Science, Hardware & Architecture

Machine learning based solutions for security of Internet of Things (IoT): A survey

Syeda Manjia Tahsien et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Near real-time security system applied to SDN environments in IoT networks using convolutional neural network

Marcos V. O. de Assis et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Computer Science, Information Systems

Machine Learning in IoT Security: Current Solutions and Future Challenges

Fatima Hussain et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Mohammed Ali Al-Garadi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Sniffing Detection Based on Network Traffic Probing and Machine Learning

Marcin Gregorczyk et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology

Bhabendu Kumar Mohanta et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study

Anar A. Hady et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies

Nerijus Paulauskas et al.

ELECTRONICS (2019)

Article Computer Science, Information Systems

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija et al.

IEEE ACCESS (2019)

Proceedings Paper Automation & Control Systems

A Kernel Connectivity-based Outlier Factor Algorithm for Rare Data Detection in a Baking Process

Yanxia Wang et al.

IFAC PAPERSONLINE (2018)

Article Computer Science, Interdisciplinary Applications

Ontology Middleware for Integration of IoT Healthcare Information Systems in EHR Systems

Abdullah Alamri

COMPUTERS (2018)

Article Computer Science, Information Systems

Emergency situation monitoring service using context motion tracking of chronic disease patients

Sung-Ho Kim et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2015)

Article Computer Science, Artificial Intelligence

Outlier detection using neighborhood rank difference

Gautam Bhattacharya et al.

PATTERN RECOGNITION LETTERS (2015)

Article Telecommunications

An Overview of Internet of Vehicles

Yang Fangchun et al.

CHINA COMMUNICATIONS (2014)

Article Computer Science, Artificial Intelligence

Decision trees: a recent overview

S. B. Kotsiantis

ARTIFICIAL INTELLIGENCE REVIEW (2013)

Article Mathematical & Computational Biology

Multi-class AdaBoost

Trevor Hastie et al.

Statistics and Its Interface (2013)

Review Statistics & Probability

Support vector machines

Alessia Mammone et al.

WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS (2009)

Article Cardiac & Cardiovascular Systems

Logistic regression

Michael P. LaValley

CIRCULATION (2008)

Article Biotechnology & Applied Microbiology

What are decision trees?

Carl Kingsford et al.

NATURE BIOTECHNOLOGY (2008)

Article Computer Science, Interdisciplinary Applications

One-class support vector machines - an application in machine fault detection and classification

HJ Shin et al.

COMPUTERS & INDUSTRIAL ENGINEERING (2005)

Article Operations Research & Management Science

A tutorial on v-support vector machines

PH Chen et al.

APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY (2005)

Article Computer Science, Artificial Intelligence

Discovering cluster-based local outliers

ZY He et al.

PATTERN RECOGNITION LETTERS (2003)