{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T20:17:08Z","timestamp":1770668228050,"version":"3.49.0"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772345"],"award-info":[{"award-number":["61772345"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s13042-018-0834-5","type":"journal-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T03:25:42Z","timestamp":1528687542000},"page":"1399-1417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":253,"title":["A survey on application of machine learning for Internet of Things"],"prefix":"10.1007","volume":"9","author":[{"given":"Laizhong","family":"Cui","sequence":"first","affiliation":[]},{"given":"Shu","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8132-539X","authenticated-orcid":false,"given":"Fei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"key":"834_CR1","unstructured":"IoT Analytics. Why the internet of things is called internet of things: Definition, history, disambiguation. \n                    https:\/\/iot-analytics.com\/internet-of-things-definition\/"},{"key":"834_CR2","unstructured":"Gartner Research. Gartner says 6.4 billion connected things will be in use in 2016, up 30 percent from 2015. \n                    http:\/\/www.gartner.com\/newsroom\/id\/3165317"},{"key":"834_CR3","unstructured":"Juniper Research. Internet of things connected devices to almost triple to over 38 billion units by 2020. \n                    http:\/\/www.juniperresearch.com\/press\/press-releases\/iot-connected-devices-to-triple-to-38-bn-by-2020"},{"key":"834_CR4","unstructured":"The Statistics Portal. Internet of things (iot): number of connected devices worldwide from 2012 to 2020 (in billions). \n                    http:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/"},{"key":"834_CR5","doi-asserted-by":"publisher","first-page":"4621","DOI":"10.1109\/ACCESS.2017.2682640","volume":"5","author":"SK Sharma","year":"2017","unstructured":"Sharma SK, Wang X (2017) Live data analytics with collaborative edge and cloud processing in wireless iot networks. IEEE Access 5:4621\u20134635","journal-title":"IEEE Access"},{"key":"834_CR6","doi-asserted-by":"crossref","unstructured":"Chau DH, Kittur A, Hong JI, Faloutsos C (2011) Apolo: Making sense of large network data by combining rich user interaction and machine learning. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI '11, Vancouver, BC, pp 167\u2013176","DOI":"10.1145\/1978942.1978967"},{"key":"834_CR7","doi-asserted-by":"crossref","unstructured":"Klaine PV, Imran MA, Onireti O, Souza RD (2017) A survey of machine learning techniques applied to self-organizing cellular networks. IEEE Commun Surv Tutor 19(4):2392\u20132431 (Fourthquarter)","DOI":"10.1109\/COMST.2017.2727878"},{"issue":"4","key":"834_CR8","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/2627534.2627557","volume":"41","author":"S Suthaharan","year":"2014","unstructured":"Suthaharan S (2014) Big data classification: problems and challenges in network intrusion prediction with machine learning. SIGMETRICS Perform Eval Rev 41(4):70\u201373","journal-title":"SIGMETRICS Perform Eval Rev"},{"key":"834_CR9","unstructured":"Usama M, Qadir J, Raza A, Arif H, Yau KA, Elkhatib Y, Hussain A, Al-Fuqaha AI (2017) Unsupervised machine learning for networking: techniques, applications and research challenges. CoRR. \n                    arXiv:1709.06599\n                    \n                   (Online)"},{"issue":"1","key":"834_CR10","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/MCOM.2018.1700560","volume":"56","author":"S Ayoubi","year":"2018","unstructured":"Ayoubi S, Limam N, Salahuddin MA, Shahriar N, Boutaba R, Estrada-Solano F, Caicedo OM (2018) Machine learning for cognitive network management. IEEE Commun Mag 56(1):158\u2013165","journal-title":"IEEE Commun Mag"},{"key":"834_CR11","doi-asserted-by":"crossref","unstructured":"Fadlullah ZM, Tang F, Mao B, Kato N, Akashi O, Inoue T, Mizutani K (2017) State-of-the-art deep learning: evolving machine intelligence toward tomorrow\u2019s intelligent network traffic control systems. IEEE Commun Surv Tutor 19(4):2432\u20132455 (Fourthquarter)","DOI":"10.1109\/COMST.2017.2707140"},{"issue":"2","key":"834_CR12","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MNET.2017.1700200","volume":"32","author":"M Wang","year":"2017","unstructured":"Wang M, Cui Y, Wang X, Xiao S, Jiang J (2017) Machine learning for networking: Workflow, advances and opportunities. IEEE Netw 32(2):92\u201399","journal-title":"IEEE Netw"},{"key":"834_CR13","doi-asserted-by":"crossref","unstructured":"Hammerschmidt CA, Garcia S, Verwer S, State R (2017) Reliable machine learning for networking: key issues and approaches. In: 2017 IEEE 42nd conference on local computer networks (LCN), Singapore, pp 167\u2013170","DOI":"10.1109\/LCN.2017.74"},{"key":"834_CR14","doi-asserted-by":"crossref","unstructured":"Casas P, Vanerio J, Fukuda K (2017) Gml learning, a generic machine learning model for network measurements analysis. In: 2017 13th international conference on network and service management (CNSM), Tokyo, pp 1\u20139","DOI":"10.23919\/CNSM.2017.8255998"},{"issue":"8","key":"834_CR15","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1109\/49.464717","volume":"13","author":"KC Claffy","year":"1995","unstructured":"Claffy KC, Braun H-W, Polyzos GC (1995) A parameterizable methodology for internet traffic flow profiling. IEEE J Sel Areas Commun 13(8):1481\u20131494","journal-title":"IEEE J Sel Areas Commun"},{"key":"834_CR16","doi-asserted-by":"crossref","unstructured":"Krishnamurthy B, Sen S, Zhang Y, Chen Y (2003) Sketch-based change detection: methods, evaluation, and applications. In: Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement. ACM, New York, pp 234\u2013247","DOI":"10.1145\/948205.948236"},{"key":"834_CR17","doi-asserted-by":"crossref","unstructured":"1. Lakhina A, Crovella M, Diot C (2004) Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM Computer Communication Review, vol\u00a034, no\u00a04. ACM, New York, pp 219\u2013230","DOI":"10.1145\/1030194.1015492"},{"key":"834_CR18","doi-asserted-by":"crossref","unstructured":"Lakhina A, Crovella M, Diot C (2004) Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM, New York, pp 201\u2013206","DOI":"10.1145\/1028788.1028813"},{"issue":"6","key":"834_CR19","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TNET.2007.911438","volume":"16","author":"K Xu","year":"2008","unstructured":"Xu K, Zhang Z-L, Bhattacharyya S (2008) Internet traffic behavior profiling for network security monitoring. IEEE ACM Trans Netw 16(6):1241\u20131252","journal-title":"IEEE ACM Trans Netw"},{"issue":"6","key":"834_CR20","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.comnet.2008.11.005","volume":"53","author":"Y Hu","year":"2009","unstructured":"Hu Y, Chiu D-M, Lui JC (2009) Profiling and identification of p2p traffic. Comput Netw 53(6):849\u2013863","journal-title":"Comput Netw"},{"key":"834_CR21","doi-asserted-by":"crossref","unstructured":"Iliofotou M, Gallagher B, Eliassi-Rad T, Xie G, Faloutsos M (2010) Profiling-by-association: a resilient traffic profiling solution for the internet backbone. In: Proceedings of the 6th International Conference. ACM, New York, p 2","DOI":"10.1145\/1921168.1921171"},{"issue":"8","key":"834_CR22","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1016\/j.comnet.2011.01.020","volume":"55","author":"M Iliofotou","year":"2011","unstructured":"Iliofotou M, Kim H-C, Faloutsos M, Mitzenmacher M, Pappu P, Varghese G (2011) Graption: A graph-based p2p traffic classification framework for the internet backbone. Comput Netw 55(8):1909\u20131920","journal-title":"Comput Netw"},{"issue":"6","key":"834_CR23","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.1109\/TNET.2012.2187306","volume":"20","author":"D Brauckhoff","year":"2012","unstructured":"Brauckhoff D, Dimitropoulos X, Wagner A, Salamatian K (2012) Anomaly extraction in backbone networks using association rules. IEEE ACM Trans Netw (TON) 20(6):1788\u20131799","journal-title":"IEEE ACM Trans Netw (TON)"},{"key":"834_CR24","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ins.2012.12.039","volume":"232","author":"N-F Huang","year":"2013","unstructured":"Huang N-F, Jai G-Y, Chao H-C, Tzang Y-J, Chang H-Y (2013) Application traffic classification at the early stage by characterizing application rounds. Inf Sci 232:130\u2013142","journal-title":"Inf Sci"},{"issue":"1","key":"834_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s00607-013-0282-8","volume":"96","author":"E Glatz","year":"2014","unstructured":"Glatz E, Mavromatidis S, Ager B, Dimitropoulos X (2014) Visualizing big network traffic data using frequent pattern mining and hypergraphs. Computing 96(1):27\u201338","journal-title":"Computing"},{"key":"834_CR26","doi-asserted-by":"publisher","unstructured":"Bakhshi T, Ghita B (2015) User traffic profiling in a software defined networking context. In: International conference on internet technologies and applications, Wrexham, UK, September 8\u201311, pp 91\u201397. \n                    https:\/\/doi.org\/10.1109\/ITechA.2015.7317376","DOI":"10.1109\/ITechA.2015.7317376"},{"key":"834_CR27","doi-asserted-by":"crossref","unstructured":"Kirchler M, Herrmann D, Lindemann J, Kloft M (2016) Tracked without a trace: linking sessions of users by unsupervised learning of patterns in their dns traffic. In: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security. ACM, New York, pp 23\u201334","DOI":"10.1145\/2996758.2996770"},{"key":"834_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.comnet.2017.02.011","volume":"118","author":"AK Das","year":"2017","unstructured":"Das AK, Pathak PH, Chuah C-N, Mohapatra P (2017) Privacy-aware contextual localization using network traffic analysis. Comput Netw 118:24\u201336","journal-title":"Comput Netw"},{"key":"834_CR29","series-title":"Lecture notes in computer science","first-page":"960","volume-title":"Intelligence and security informatics, ISI 2003","author":"SJ Stolfo","year":"2003","unstructured":"Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW (2003) Behavior profiling of email. In: Chen H, Miranda R, Zeng DD, Demchak C, Schroeder J, Madhusudan T (eds) Intelligence and security informatics, ISI 2003, Lecture notes in computer science, vol 2665. Springer, Berlin, Heidelberg, pp 960\u2013960"},{"key":"834_CR30","doi-asserted-by":"crossref","unstructured":"St\u00f6ber T, Frank M, Schmitt J, Martinovic I (2013) Who do you sync you are?: smartphone fingerprinting via application behaviour. In: Proceedings of the sixth ACM conference on security and privacy in wireless and mobile networks. ACM, Budapest, Hungary, pp 7\u201312","DOI":"10.1145\/2462096.2462099"},{"key":"834_CR31","doi-asserted-by":"crossref","unstructured":"Das A, Borisov N, Caesar M (2014) Do you hear what i hear?: fingerprinting smart devices through embedded acoustic components. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, Scottsdale, Arizona, pp 441\u2013452","DOI":"10.1145\/2660267.2660325"},{"key":"834_CR32","unstructured":"Bojinov H, Michalevsky Y, Nakibly G, Boneh D (2014) Mobile device identification via sensor fingerprinting. \n                    arXiv:1408.1416"},{"issue":"1","key":"834_CR33","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TR.2014.2372432","volume":"64","author":"HJ Patel","year":"2015","unstructured":"Patel HJ, Temple MA, Baldwin RO (2015) Improving zigbee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting. IEEE Trans Reliab 64(1):221\u2013233","journal-title":"IEEE Trans Reliab"},{"key":"834_CR34","doi-asserted-by":"crossref","unstructured":"Huynh M, Nguyen P, Gruteser M, Vu T (2015) Poster: Mobile device identification by leveraging built-in capacitive signature. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, Denver, Colorado, pp 1635\u20131637","DOI":"10.1145\/2810103.2810118"},{"key":"834_CR35","doi-asserted-by":"crossref","unstructured":"Tuama A, Comby F, Chaumont M (2016) Camera model identification based machine learning approach with high order statistics features. In: 2016 24th European signal processing conference (EUSIPCO). IEEE, Budapest, pp 1183\u20131187","DOI":"10.1109\/EUSIPCO.2016.7760435"},{"issue":"1","key":"834_CR36","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1515\/popets-2015-0027","volume":"2016","author":"A Kurtz","year":"2016","unstructured":"Kurtz A, Gascon H, Becker T, Rieck K, Freiling F (2016) Fingerprinting mobile devices using personalized configurations. Proc Priv Enhanc Technol 2016(1):4\u201319","journal-title":"Proc Priv Enhanc Technol"},{"issue":"4","key":"834_CR37","doi-asserted-by":"publisher","first-page":"783","DOI":"10.3390\/s17040783","volume":"17","author":"G Baldini","year":"2017","unstructured":"Baldini G, Dimc F, Kamnik R, Steri G, Giuliani R, Gentile C (2017) Identification of mobile phones using the built-in magnetometers stimulated by motion patterns. Sensors 17(4):783","journal-title":"Sensors"},{"key":"834_CR38","doi-asserted-by":"crossref","unstructured":"Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi A-R, Tarkoma S (2017) Iot sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, Atlanta, GA, pp 2177\u20132184","DOI":"10.1109\/ICDCS.2017.283"},{"key":"834_CR39","doi-asserted-by":"crossref","unstructured":"Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) Profiliot: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing. ACM, Marrakech, Morocco, pp 506\u2013509","DOI":"10.1145\/3019612.3019878"},{"key":"834_CR40","doi-asserted-by":"crossref","unstructured":"Kotenko I, Saenko I, Skorik F, Bushuev S (2015) Neural network approach to forecast the state of the internet of things elements. In: 2015 XVIII international conference on soft computing and measurements (SCM), May 2015, St. Petersburg, pp 133\u2013135","DOI":"10.1109\/SCM.2015.7190434"},{"key":"834_CR41","doi-asserted-by":"crossref","unstructured":"Baldini G, Giuliani R, Steri G, Neisse R (2017) Physical layer authentication of internet of things wireless devices through permutation and dispersion entropy. In: 2017 global internet of things summit (GIoTS), Geneva, pp 1\u20136","DOI":"10.1109\/GIOTS.2017.8016272"},{"key":"834_CR42","doi-asserted-by":"crossref","unstructured":"Sharaf-Dabbagh Y, Saad W (2017) Demo abstract: cyber-physical fingerprinting for internet of things authentication. In: 2017 IEEE\/ACM second international conference on internet-of-things design and implementation (IoTDI), Pittsburgh, PA, pp 301\u2013302","DOI":"10.1145\/3054977.3057323"},{"key":"834_CR43","doi-asserted-by":"crossref","unstructured":"Jeong HJ, Lee HJ, Moon SM (2017) Work-in-progress: cloud-based machine learning for iot devices with better privacy. In: 2017 international conference on embedded software (EMSOFT), Seoul, pp 1\u20132","DOI":"10.1145\/3125503.3125626"},{"key":"834_CR44","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-319-11227-5_23","volume-title":"Intelligent distributed computing","author":"VJ Jincy","year":"2015","unstructured":"Jincy VJ, Sundararajan S (2015) Classification mechanism for iot devices towards creating a security framework. In: Buyya R, Thampi SM (eds) Intelligent distributed computing. Springer International Publishing, Cham, pp 265\u2013277"},{"key":"834_CR45","doi-asserted-by":"crossref","unstructured":"Nobakht M, Sivaraman V, Boreli R (2016) A host-based intrusion detection and mitigation framework for smart home iot using OpenFlow. In: 2016 11th international conference on availability, reliability and security (ARES), Salzburg, pp 147\u2013156","DOI":"10.1109\/ARES.2016.64"},{"key":"834_CR46","unstructured":"Caedo J, Skjellum A (2016) Using machine learning to secure IoT systems. In: 2016 14th annual conference on privacy, security and trust (PST), Auckland, pp 219\u2013222"},{"key":"834_CR47","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-44215-0_14","volume-title":"Mobile web and intelligent information systems","author":"VT Do","year":"2016","unstructured":"Do VT, Engelstad P, Feng B, van Do T (2016) Strengthening mobile network security using machine learning. In: Younas M, Awan I, Kryvinska N, Strauss C, Thanh DV (eds) Mobile web and intelligent information systems. Springer International Publishing, Cham, pp 173\u2013183"},{"key":"834_CR48","doi-asserted-by":"crossref","unstructured":"Stroeh K, Mauro\u00a0Madeira ER, Goldenstein SK (2013) An approach to the correlation of security events based on machine learning techniques. J Internet Serv Appl 4(1):7","DOI":"10.1186\/1869-0238-4-7"},{"key":"834_CR49","doi-asserted-by":"crossref","unstructured":"Rathore H, Jha S (2013) Bio-inspired machine learning based wireless sensor network security. In: 2013 world congress on nature and biologically inspired computing. IEEE, Fargo, ND, pp 140\u2013146","DOI":"10.1109\/NaBIC.2013.6617852"},{"key":"834_CR50","unstructured":"Davis A, Parikh J, Weihl WE (2004) Edge computing: extending enterprise applications to the edge of the internet. In: International conference on World Wide Web\u2014Alternate track papers & posters, WWW 2004. ACM, New York, NY, pp 180\u2013187"},{"key":"834_CR51","doi-asserted-by":"crossref","unstructured":"Grewe D, Wagner M, Arumaithurai M, Psaras I, Kutscher D (2017) Information-centric mobile edge computing for connected vehicle environments: challenges and research directions. In: The workshop on mobile edge communications. ACM, Los Angeles, CA, pp 7\u201312","DOI":"10.1145\/3098208.3098210"},{"key":"834_CR52","doi-asserted-by":"crossref","unstructured":"Borthakur D, Dubey H, Constant N, Mahler L, Mankodiya K (2017) Smart fog: fog computing framework for unsupervised clustering analytics in wearable internet of things. In: 2017 IEEE global conference on signal and information processing (GlobalSIP). IEEE, Montreal, QC, pp 472\u2013476","DOI":"10.1109\/GlobalSIP.2017.8308687"},{"key":"834_CR53","unstructured":"Drolia U, Guo K, Narasimhan P (2017) Precog: prefetching for image recognition applications at the edge. In: ACM\/IEEE symposium on edge computing. ACM, San Jose, California, pp 1\u201313"},{"key":"834_CR54","unstructured":"Azimi I, Anzanpour A, Rahmani AM, Pahikkala T, Levorato M, Liljeberg P, Dutt N (2107) HiCH: Hierarchical fog-assisted computing architecture for healthcare IoT. ACM Trans Embed Comput Syst 16(5s):174"},{"key":"834_CR55","doi-asserted-by":"publisher","unstructured":"Grassi G, Sammarco M, Bahl P, Jamieson K, Pau G (2015) Poster: Parkmaster: Leveraging edge computing in visual analytics. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, ser. MobiCom \u201915. ACM, New York, pp 257\u2013259. \n                    https:\/\/doi.org\/10.1145\/2789168.2795174\n                    \n                   (Online)","DOI":"10.1145\/2789168.2795174"},{"key":"834_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.09.014","author":"S Wang","year":"2017","unstructured":"Wang S, Zhao Y, Huang L, Xu J, Hsu CH (2017) Qos prediction for service recommendations in mobile edge computing. J Parallel Distrib Comput. \n                    https:\/\/doi.org\/10.1016\/j.jpdc.2017.09.014","journal-title":"J Parallel Distrib Comput"},{"key":"834_CR57","doi-asserted-by":"crossref","unstructured":"Zissis D (2017) Intelligent security on the edge of the cloud. In: International conference on engineering, technology and innovation. IEEE, Funchal, pp 1066\u20131070","DOI":"10.1109\/ICE.2017.8279999"},{"key":"834_CR58","doi-asserted-by":"crossref","unstructured":"Schneible J, Lu A (2017) Anomaly detection on the edge. In: MILCOM 2017\u20142017 IEEE Military Communications Conference (MILCOM), pp 678\u2013682","DOI":"10.1109\/MILCOM.2017.8170817"},{"issue":"2","key":"834_CR59","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","volume":"56","author":"A Abeshu","year":"2018","unstructured":"Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56(2):169\u2013175","journal-title":"IEEE Commun Mag"},{"key":"834_CR60","doi-asserted-by":"publisher","first-page":"17119","DOI":"10.1109\/ACCESS.2018.2817523","volume":"6","author":"M Yang","year":"2018","unstructured":"Yang M, Zhu T, Liu B, Xiang Y, Zhou W (2018) Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access 6:17119\u201317129. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2018.2817523","journal-title":"IEEE Access"},{"key":"834_CR61","doi-asserted-by":"crossref","unstructured":"Hogan M, Esposito F (2017) Stochastic delay forecasts for edge traffic engineering via bayesian networks. In: IEEE international symposium on network computing and applications. IEEE, Cambridge, MA, pp 1\u20134","DOI":"10.1109\/NCA.2017.8171341"},{"issue":"2","key":"834_CR62","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2013.6461195","volume":"51","author":"H Kim","year":"2013","unstructured":"Kim H, Feamster N (2013) Improving network management with software defined networking. Commun Mag IEEE 51(2):114\u2013119","journal-title":"Commun Mag IEEE"},{"key":"834_CR63","doi-asserted-by":"crossref","unstructured":"Kim HJ, Jung MY, Chin WS, Jang JW (2017) Identifying service contexts for qos support in iot service oriented software defined networks. In: Bouzefrane S, Banerjee S, Sailhan F, Boumerdassi S, Renault E (eds) Mobile, secure, and programmable networking. MSPN 2017, Lecture notes in computer science, vol 10566. Springer, Cham, pp 99\u2013108","DOI":"10.1007\/978-3-319-67807-8_8"},{"key":"834_CR64","doi-asserted-by":"publisher","first-page":"3360","DOI":"10.1109\/ACCESS.2016.2585468","volume":"4","author":"D Vukobratovic","year":"2016","unstructured":"Vukobratovic D, Jakovetic D, Skachek V, Bajovic D, Sejdinovic D, Kurt GK, Hollanti C, Fischer I (2016) Condense: a reconfigurable knowledge acquisition architecture for future 5g iot. IEEE Access 4:3360\u20133378","journal-title":"IEEE Access"},{"key":"834_CR65","unstructured":"Jagadeesan LJ, Mendiratta V (2016) Programming the network: application software faults in software-defined networks. In: 2016 IEEE international symposium on software reliability engineering workshops (ISSREW). IEEE, Ottawa, ON, pp 125\u2013131"},{"key":"834_CR66","doi-asserted-by":"crossref","unstructured":"Taneja M (2016) A framework for traffic management in iot networks. In: 2016 2nd international conference on contemporary computing and informatics (IC3I). IEEE, Noida, pp 316\u2013323","DOI":"10.1109\/IC3I.2016.7917982"},{"key":"834_CR67","doi-asserted-by":"crossref","unstructured":"Uwagbole SO, Buchanan WJ, Fan L (2017) An applied pattern-driven corpus to predictive analytics in mitigating sql injection attack. In: 2017 seventh international conference on emerging security technologies (EST). IEEE, Canterbury, pp 12\u201317","DOI":"10.1109\/EST.2017.8090392"},{"key":"834_CR68","doi-asserted-by":"crossref","unstructured":"Ahmed ME, Kim H, Park M (2017) Mitigating dns query-based ddos attacks with machine learning on software-defined networking. In: MILCOM 2017\u20142017 IEEE military communications conference (MILCOM). IEEE, Baltimore, MD, pp 11\u201316","DOI":"10.1109\/MILCOM.2017.8170802"},{"key":"834_CR69","unstructured":"Bhunia SS, Gurusamy M (2017) Dynamic attack detection and mitigation in iot using sdn. In: 2017 27th international telecommunication networks and applications conference (ITNAC). IEEE, Melbourne, VIC, pp 1\u20136"},{"key":"834_CR70","doi-asserted-by":"crossref","unstructured":"Asthana S, Megahed A, Strong R (2017) A recommendation system for proactive health monitoring using IoT and wearable technologies. In: 2017 IEEE international conference on AI mobile services (AIMS). IEEE, Honolulu, HI, pp 14\u201321","DOI":"10.1109\/AIMS.2017.11"},{"key":"834_CR71","doi-asserted-by":"crossref","unstructured":"Walinjkar A, Woods J (2017) ECG classification and prognostic approach towards personalized healthcare. In: 2017 international conference on social media, wearable and web analytics (Social Media). IEEE, London, pp 1\u20138","DOI":"10.1109\/SOCIALMEDIA.2017.8057360"},{"key":"834_CR72","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Mirza F, Naeem MA, Nguyen M (2017) A review on iot healthcare monitoring applications and a vision for transforming sensor data into real-time clinical feedback. In: 2017 IEEE 21st international conference on computer supported cooperative work in design (CSCWD). IEEE, Wellington, pp 257\u2013262","DOI":"10.1109\/CSCWD.2017.8066704"},{"key":"834_CR73","doi-asserted-by":"crossref","unstructured":"Madeira R, Nunes L (2016) A machine learning approach for indirect human presence detection using IoT devices. In: 2016 eleventh international conference on digital information management (ICDIM). IEEE, Porto, pp 145\u2013150","DOI":"10.1109\/ICDIM.2016.7829781"},{"key":"834_CR74","doi-asserted-by":"crossref","unstructured":"Pandey PS (2017) Machine learning and iot for prediction and detection of stress. In: 2017 17th international conference on computational science and its applications (ICCSA). IEEE, Trieste, pp 1\u20135","DOI":"10.1109\/ICCSA.2017.8000018"},{"issue":"2","key":"834_CR75","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1964897.1964918","volume":"12","author":"JR Kwapisz","year":"2011","unstructured":"Kwapisz JR, Weiss GM, Moore SA (2011) Activity recognition using cell phone accelerometers. SIGKDD Explor Newsl 12(2):74\u201382","journal-title":"SIGKDD Explor Newsl"},{"key":"834_CR76","unstructured":"Patil SS, Thorat SA (2016) Early detection of grapes diseases using machine learning and IoT. In: 2016 second international conference on cognitive computing and information processing (CCIP). IEEE, Mysore, pp 1\u20135"},{"issue":"4","key":"834_CR77","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/JIOT.2017.2722358","volume":"4","author":"J Siryani","year":"2017","unstructured":"Siryani J, Tanju B, Eveleigh TJ (2017) A machine learning decision support system improves the internet of things smart meter operations. IEEE Internet Things J 4(4):1056\u20131066","journal-title":"IEEE Internet Things J"},{"key":"834_CR78","doi-asserted-by":"crossref","unstructured":"Ling X, Sheng J, Baiocchi O, Liu X, Tolentino ME (2017) Identifying parking spaces detecting occupancy using vision-based IoT devices. In: 2017 global internet of things summit (GIoTS). IEEE, Geneva, pp 1\u20136","DOI":"10.1109\/GIOTS.2017.8016227"},{"issue":"1","key":"834_CR79","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s13007-015-0047-9","volume":"11","author":"W Guo","year":"2015","unstructured":"Guo W, Fukatsu T, Ninomiya S (2015) Automated characterization of flowering dynamics in rice using field-acquired time-series rgb images. Plant Methods 11(1):7","journal-title":"Plant Methods"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13042-018-0834-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-018-0834-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-018-0834-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T19:03:12Z","timestamp":1560193392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13042-018-0834-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":79,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["834"],"URL":"https:\/\/doi.org\/10.1007\/s13042-018-0834-5","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,11]]},"assertion":[{"value":"17 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}