{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:06:16Z","timestamp":1758845176097,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icccnt49239.2020.9225659","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T20:00:38Z","timestamp":1602792038000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A Comprehensive Study on Machine Learning Algorithms for Wireless Sensor Network Security"],"prefix":"10.1109","author":[{"given":"Fozilatoon","family":"Humaira","sequence":"first","affiliation":[]},{"given":"Md Sanju","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Fernaz Narin","family":"Nur","sequence":"additional","affiliation":[]},{"given":"Kazi Anowar","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Continuous control with deep reinforcement learning","year":"2015","author":"lillicrap","key":"ref39"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v30i1.10295","article-title":"Deep reinforcement learning with double q-learning","author":"van hasselt","year":"2016","journal-title":"THIRTIETH AAAI Conference on Artificial Intelligence"},{"key":"ref33","article-title":"Attribute-based clustering for information dissemination in wireless sensor networks","author":"ke","year":"2005","journal-title":"Proceeding of 2nd annual IEEE communications society conference on sensor and ad hoc communications and networks (SECON&#x2018; 05)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2009.5403841"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890052"},{"key":"ref30","article-title":"An E cient k-Means Clustering Algorithm: Analysis and Implementation","volume":"24","author":"tapas","year":"2000","journal-title":"IEEE Trans Pattern Anal Mach Intell Citeseer"},{"journal-title":"Mastering chess and shogi by self-play with a general reinforcement learning algorithm","year":"2017","author":"david","key":"ref37"},{"journal-title":"Types of Machine Learning Algorithms You Should Know","year":"2017","author":"fumo","key":"ref36"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1016\/j.peva.2007.06.014","article-title":"Offline\/realtime traffic classification using semi-supervised learning","volume":"64","author":"jeffrey","year":"2007","journal-title":"Performance Evaluation"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/507338.507355"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"3-es","DOI":"10.1145\/1210669.1210672","article-title":"The Clustered AGgregation (CAG) technique leveraging spatial and temporal correlations in wireless sensor networks","volume":"3","author":"sunhee","year":"2007","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCDM.2009.4938823"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2009.2015088"},{"journal-title":"What is WIRELESS SENSOR NETWORK? What does WIRELESS SENSOR NETWORK mean?","year":"2017","key":"ref2"},{"journal-title":"A survey on Machine Learning-based Performance Improvement of Wireless Networks PHY MAC and network layer","year":"2020","author":"merima","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NEWCAS.2012.6328975"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.110112.00192"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70800"},{"key":"ref24","first-page":"664","article-title":"Load identification in neural networks for a non-intrusive monitoring of industrial electrical loads","author":"chang","year":"2007","journal-title":"International conference on computer supported cooperative work in Design"},{"key":"ref23","first-page":"3702","article-title":"A survey on intrusive load monitoring for appliance recognition","author":"antonio","year":"2014","journal-title":"2014 22nd International Conference on Pattern Recognition"},{"key":"ref26","first-page":"335","article-title":"Detecting selective forwarding attacks in wireless sensor networks using support vector machines","author":"sophia","year":"2007","journal-title":"2007 3rd International Conference on Intelligent Sensors Sensor Networks and Information"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0474-5"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1166\/sl.2015.3599","article-title":"EA-LSDGS: Energy-aware location based secure data gathering scheme for wireless sensor networks","volume":"13","author":"roseline","year":"2015","journal-title":"Sensor Letters"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"7560","DOI":"10.1016\/j.eswa.2015.05.057","article-title":"Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information","volume":"42","author":"panagiotis","year":"2015","journal-title":"Expert Systems with Applications Elsevier"},{"key":"ref56","first-page":"150","article-title":"A review of machine learning solutions to denial-of-services attacks in wireless sensor networks","author":"sedef","year":"2015","journal-title":"2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA)"},{"key":"ref55","article-title":"A Secure Framework for IoT Smart Home by Resolving Session Hijacking","volume":"20","author":"fozilatoon","year":"2020","journal-title":"Global Journal of Computer Science and Technology"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/sec.338"},{"key":"ref53","first-page":"745","article-title":"An area-based approach for node replica detection in wireless sensor networks","author":"wibhada","year":"2012","journal-title":"2012 IEEE 11th International Conference on Trust Security and Privacy in Computing and Communications"},{"key":"ref52","first-page":"21","article-title":"Detection of wormhole attacks in wireless sensor networks using range-free localization","author":"mariano","year":"2012","journal-title":"2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2595","DOI":"10.1109\/COMST.2018.2846401","article-title":"Deep learning for intelligent wireless networks: A comprehensive survey","volume":"20","author":"qian","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref40","first-page":"65","author":"nouha","year":"2013","journal-title":"Radio Link Quality Estimation in Low-Power Wireless Networks"},{"key":"ref12","first-page":"16","article-title":"Intelligent wireless communications enabled by cognitive radio and machine learning","volume":"15","author":"xiangwei","year":"2018","journal-title":"China Communications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2727878"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"7063","DOI":"10.1109\/ACCESS.2016.2615643","article-title":"Learning how to communicate in the Internet of Things: Finite resources and heterogeneity","volume":"4","author":"taehyeun","year":"2016","journal-title":"IEEE Access"},{"journal-title":"Machine Learning Algorithms - Top 5 Machine Learning Algorithms - Edureka","year":"2020","key":"ref15"},{"key":"ref16","first-page":"594","article-title":"Giving neurons to sensors. QoS management in wireless sensors networks","author":"julio","year":"2006","journal-title":"2006 IEEE Conference on Emerging Technologies and Factory Automation"},{"key":"ref17","first-page":"1","article-title":"Data-driven link quality prediction using link features","volume":"10","author":"tao","year":"2014","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1317425.1317434"},{"key":"ref19","first-page":"1","article-title":"Localization using neural networks in wireless sensor networks","author":"ali","year":"2008","journal-title":"MOBIL-WARE&#x2019;08 Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE Operating Systems and Applications Institute for Computer Sciences Social-Informatics and &#x2026;"},{"key":"ref4","article-title":"Survey of security technologies on wireless sensor networks","volume":"2015","author":"qiuwei","year":"2015","journal-title":"Journal of Sensors"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1186\/s13638-018-1337-5","article-title":"Security to wireless sensor networks against malicious attacks using Hamming residue method","volume":"2019","author":"majid","year":"2019","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref5","article-title":"Computer and information security handbook","author":"vacca","year":"2012","journal-title":"Newnes"},{"key":"ref8","article-title":"A survey on deep learning techniques in wireless signal recognition","volume":"2019","author":"xiaofan","year":"2019","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.017"},{"key":"ref49","first-page":"938","article-title":"Lightweight location verification algorithms for wireless sensor networks","volume":"24","author":"yawen","year":"2012","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1109\/COMST.2019.2926625","article-title":"Artificial neural networks-based machine learning for wireless networks: A tutorial","volume":"21","author":"mingzhe","year":"2019","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref46","first-page":"397","article-title":"Security issues in wireless sensor network-a review","author":"jitender","year":"2016","journal-title":"2016 5th International Conference on Reliability Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1561\/2200000037","article-title":"Theory of disagreement-based active learning","volume":"7","author":"steve","year":"2014","journal-title":"Foundations and Trends\ufffd in Machine Learning"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.373-375.1931"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0412-4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.200"},{"key":"ref41","first-page":"77","article-title":"Classification algorithms in human activity recognition using smartphones","volume":"6","author":"abdullah","year":"2012","journal-title":"International Journal of Computer and Information Engineering"},{"key":"ref44","first-page":"199","article-title":"Agnostic active learning without constraints","author":"beygelzimer","year":"2010","journal-title":"Advances in neural information processing systems"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.adhoc.2015.07.013","article-title":"Ensembles of incremental learners to detect anomalies in ad hoc sensor networks","author":"bosman","year":"2015","journal-title":"Ad Hoc Networks"}],"event":{"name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2020,7,1]]},"location":"Kharagpur, India","end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211590\/9225262\/09225659.pdf?arnumber=9225659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T13:44:09Z","timestamp":1669211049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/icccnt49239.2020.9225659","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}