{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:12:15Z","timestamp":1774879935787,"version":"3.50.1"},"reference-count":125,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T00:00:00Z","timestamp":1696809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation (NSF)","award":["2006674"],"award-info":[{"award-number":["2006674"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such as data pre-processing, model selection, and parameter optimization. While existing surveys have shed light on these techniques, they have mainly focused on specific application domains. A notable gap that exists in current studies is the lack of a comprehensive overview of machine learning architecture and its essential phases in the cybersecurity field. To address this gap, this survey provides a holistic review of current studies in machine learning, covering techniques applicable to any domain. Models are classified into four categories: supervised, semi-supervised, unsupervised, and reinforcement learning. Each of these categories and their models are described. In addition, the survey discusses the current progress related to data pre-processing and hyperparameter tuning techniques. Moreover, this survey identifies and reviews the research gaps and key challenges that the cybersecurity field faces. By analyzing these gaps, we propose some promising research directions for the future. Ultimately, this survey aims to serve as a valuable resource for researchers interested in learning about machine learning, providing them with insights to foster innovation and progress across diverse application domains.<\/jats:p>","DOI":"10.3390\/fi15100332","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T07:37:50Z","timestamp":1696837070000},"page":"332","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Machine Learning: Models, Challenges, and Research Directions"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7630-9034","authenticated-orcid":false,"given":"Tala","family":"Talaei Khoei","sequence":"first","affiliation":[{"name":"School of Computer Science and Electrical Engineering, University of North Dakota, Grand Forks, ND 58202, USA"}]},{"given":"Naima","family":"Kaabouch","sequence":"additional","affiliation":[{"name":"School of Computer Science and Electrical Engineering, University of North Dakota, Grand Forks, ND 58202, USA"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/s42979-021-00592-x","article-title":"Machine Learning: Algorithms, real-world applications and research directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1038\/s41467-019-14108-y","article-title":"The role of artificial intelligence in achieving the sustainable development goals","volume":"11","author":"Vinuesa","year":"2020","journal-title":"Nat. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.comcom.2020.02.069","article-title":"Applications of artificial intelligence and machine learning in smart cities","volume":"154","author":"Ullah","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"7136","DOI":"10.1002\/er.5331","article-title":"Deep learning methods and applications for electrical power systems: A comprehensive review","volume":"44","author":"Ozcanli","year":"2020","journal-title":"Int. J. Energy Res."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4633","DOI":"10.1109\/TPEL.2020.3024914","article-title":"An Overview of Artificial Intelligence Applications for Power Electronics","volume":"36","author":"Zhao","year":"2021","journal-title":"IEEE Trans. Power Electron."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"134911","DOI":"10.1109\/ACCESS.2020.3010702","article-title":"A Comprehensive Review of the Load Fore-casting Techniques Using Single and Hybrid Predictive Models","volume":"8","author":"Mamun","year":"2020","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Massaoudi, M., Darwish, A., Refaat, S.S., Abu-Rub, H., and Toliyat, H.A. (2020, January 13\u201314). UHF Partial Discharge Localization in Gas-Insulated Switch-gears: Gradient Boosting Based Approach. Proceedings of the 2020 IEEE Kansas Power and Energy Conference (KPEC), Manhattan, KS, USA.","DOI":"10.1109\/KPEC47870.2020.9167534"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ali, S.S., and Choi, B.J. (2020). State-of-the-Art Artificial Intelligence Techniques for Distributed Smart Grids: A Review. Electronics, 9.","DOI":"10.3390\/electronics9061030"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"103372","DOI":"10.1016\/j.engappai.2019.103372","article-title":"A review of machine learning for new generation smart dispatch in power systems","volume":"88","author":"Yin","year":"2020","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_10","unstructured":"Peng, S., Sun, S., and Yao, Y.-D. (2021). IEEE Transactions on Neural Networks and Learning Systems, IEEE."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Arjoune, Y., and Kaabouch, N. (2019). A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions. Sensors, 19.","DOI":"10.3390\/s19010126"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.inffus.2019.12.001","article-title":"A survey on machine learning for data fusion","volume":"57","author":"Meng","year":"2020","journal-title":"Inf. Fusion"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Carvalho, D.V., Pereira, E.M., and Cardoso, J.S. (2019). Machine Learning Interpretability: A Survey on Methods and Metrics. Electronics, 8.","DOI":"10.3390\/electronics8080832"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., Ismail, S., and Kaabouch, N. (2021, January 1\u20134). Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid. Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON53757.2021.9666607"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s13218-015-0381-0","article-title":"Beyond manual tuning of hyperparameters","volume":"29","author":"Hutter","year":"2015","journal-title":"KI-K\u00fcnstliche Intell."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., Aissou, G., Hu, W.C., and Kaabouch, N. (2021, January 14\u201315). Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid. Proceedings of the IEEE International Conference on Electro Information Technology (EIT), Mt. Pleasant, MI, USA.","DOI":"10.1109\/EIT51626.2021.9491891"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1007\/s10845-022-01915-2","article-title":"On reliability of reinforcement learning based production scheduling systems: A comparative survey","volume":"33","author":"Meyes","year":"2022","journal-title":"J. Intell. Manuf."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"276","DOI":"10.3390\/make4010013","article-title":"Robust Reinforcement Learning: A Review of Foundations and Recent Advances","volume":"4","author":"Moos","year":"2022","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.1007\/s10462-022-10224-2","article-title":"A survey on deep reinforcement learning for audio-based applications","volume":"56","author":"Latif","year":"2022","journal-title":"Artif. Intell. Rev."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"102228","DOI":"10.1016\/j.ecoinf.2023.102228","article-title":"A lightweight deep learning model for classification of synthetic aperture radar images","volume":"77","author":"Passah","year":"2023","journal-title":"Ecol. Inform."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3377454","article-title":"A survey on distributed machine learning","volume":"53","author":"Verbraeken","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1007\/s11831-019-09344-w","article-title":"A survey of deep learning and its applications: A new paradigm to machine learning","volume":"27","author":"Dargan","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"100199","DOI":"10.1016\/j.cosrev.2019.100199","article-title":"A taxonomy and survey of attacks against machine learning","volume":"34","author":"Pitropakis","year":"2019","journal-title":"Comput. Sci. Rev."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.future.2022.05.014","article-title":"A survey of human-in-the-loop for machine learning","volume":"135","author":"Wu","year":"2022","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s40745-020-00253-5","article-title":"A comprehensive survey of loss functions in machine learning","volume":"9","author":"Wang","year":"2022","journal-title":"Ann. Data Sci."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Choi, H., and Park, S. (2021). A Survey of Machine Learning-Based System Performance Optimization Techniques. Appl. Sci., 11.","DOI":"10.3390\/app11073235"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1080\/01441647.2022.2036864","article-title":"A survey of the opportunities and challenges of supervised machine learning in maritime risk analysis","volume":"43","author":"Rawson","year":"2022","journal-title":"Transp. Rev."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ahmad, R., Wazirali, R., and Abu-Ain, T. (2022). Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors, 22.","DOI":"10.3390\/s22134730"},{"key":"ref_29","unstructured":"Singh, A., Thakur, N., and Sharma, A. (2016, January 16\u201318). A review of supervised machine learning algorithms. Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.procs.2022.03.029","article-title":"Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey","volume":"201","author":"Abdallah","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Dike, H.U., Zhou, Y., Deveerasetty, K.K., and Wu, Q. (2018, January 25\u201327). Unsupervised Learning Based On Artificial Neural Network: A Review. Proceedings of the 2018 IEEE International Conference on Cyborg and Bionic Systems (CBS).","DOI":"10.1109\/CBS.2018.8612259"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10994-019-05855-6","article-title":"A survey on semi-supervised learning","volume":"109","author":"Hoos","year":"2020","journal-title":"Mach. Learn."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"13753","DOI":"10.1109\/ACCESS.2022.3146518","article-title":"A Survey of Domain-Specific Architectures for Reinforcement Learning","volume":"10","author":"Rothmann","year":"2022","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"100379","DOI":"10.1016\/j.cosrev.2021.100379","article-title":"A survey on deep learning and its applications","volume":"40","author":"Dong","year":"2020","journal-title":"Comput. Sci. Rev."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ray, S. (2019, January 14\u201316). A Quick Review of Machine Learning Algorithms. Proceedings of the 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), Faridabad, India.","DOI":"10.1109\/COMITCon.2019.8862451"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","article-title":"Deep Learning-Based Intrusion Detection Systems: A Systematic Review","volume":"9","author":"Lansky","year":"2021","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"54558","DOI":"10.1109\/ACCESS.2021.3071269","article-title":"Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects","volume":"9","author":"Massaoudi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Liu, H., and Lang, B. (2019). Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Appl. Sci., 9.","DOI":"10.3390\/app9204396"},{"key":"ref_39","first-page":"1","article-title":"A survey of machine learning for computer architecture and systems","volume":"55","author":"Wu","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"82146","DOI":"10.1109\/ACCESS.2021.3084358","article-title":"A Survey on Semi-, Self- and Unsupervised Learning for Image Classification","volume":"9","author":"Schmarje","year":"2021","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","article-title":"A Survey of Machine Learning Techniques Applied to Software Defined Networking (SDN): Research Issues and Challenges","volume":"Volume 21","author":"Xie","year":"2019","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1038\/s41578-022-00490-5","article-title":"Machine learning for a sustainable energy future","volume":"8","author":"Yao","year":"2023","journal-title":"Nat. Rev. Mater."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","article-title":"A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security","volume":"Volume 22","author":"Mohamed","year":"2020","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"100314","DOI":"10.1016\/j.iot.2020.100314","article-title":"A survey on machine learning in internet of things: Algorithms, strategies, and applications","volume":"12","author":"Messaoud","year":"2020","journal-title":"Internet Things"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"100516","DOI":"10.1016\/j.ijcip.2022.100516","article-title":"Machine learning for intrusion detection in industrial control systems: Ap-plications, challenges, and recommendations","volume":"38","author":"Umer","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_46","first-page":"19","article-title":"Informed machine learning\u2013towards a taxonomy of explicit integration of knowledge into machine learning","volume":"18","author":"Mayer","year":"2019","journal-title":"Learning"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"101822","DOI":"10.1016\/j.artmed.2020.101822","article-title":"Automated machine learning: Review of the state-of-the-art and opportunities for healthcare","volume":"104","author":"Waring","year":"2020","journal-title":"Artif. Intell. Med."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jmsy.2022.11.013","article-title":"A safety management approach for Industry 5.0\u2032 s human-centered manufacturing based on digital twin","volume":"66","author":"Wang","year":"2023","journal-title":"J. Manuf. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Reuther, A., Michaleas, P., Jones, M., Gadepally, V., Samsi, S., and Kepner, J. (2019, January 24\u201326). Survey and Benchmarking of Machine Learning Accelerators. Proceedings of the 2019 IEEE High Performance Extreme Computing Conference (HPEC), Waltham, MA USA.","DOI":"10.1109\/HPEC.2019.8916327"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"100780","DOI":"10.1016\/j.iot.2023.100780","article-title":"Internet of Things (IoT) security dataset evolution: Challenges and future directions","volume":"22","author":"Kaur","year":"2023","journal-title":"Internet Things"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"100336","DOI":"10.1016\/j.patter.2021.100336","article-title":"Data and its (dis)contents: A survey of dataset development and use in machine learning research","volume":"2","author":"Paullada","year":"2021","journal-title":"Patterns"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Slimane, H.O., Benouadah, S., Khoei, T.T., and Kaabouch, N. (2022, January 26\u201329). A Light Boosting-based ML Model for Detecting Deceptive Jamming Attacks on UAVs. Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC54503.2022.9720830"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Manesh, M.R., Kenney, J., Hu, W.C., Devabhaktuni, V.K., and Kaabouch, N. (2019, January 11\u201314). Detection of GPS spoofing attacks on unmanned aerial systems. Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2019.8651804"},{"key":"ref_54","first-page":"3897","article-title":"Machine Learning and Deep Learning: A Review of Methods and Applications","volume":"10","author":"Sharifani","year":"2023","journal-title":"World Inf. Technol. Eng. J."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Obaid, H.S., Dheyab, S.A., and Sabry, S.S. (2019, January 13\u201315). The Impact of Data Pre-Processing Techniques and Dimensionality Reduction on the Ac-curacy of Machine Learning. Proceedings of the 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), Jaipur, India.","DOI":"10.1109\/IEMECONX.2019.8877011"},{"key":"ref_56","first-page":"1","article-title":"When machine learning meets privacy: A survey and outlook","volume":"54","author":"Liu","year":"2021","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_57","first-page":"97","article-title":"Comparative study ID3, cart and C4. 5 decision tree algorithm: A survey","volume":"27","author":"Singh","year":"2014","journal-title":"Int. J. Adv. Inf. Sci. Technol. (IJAIST)"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"2038","DOI":"10.1016\/j.patcog.2006.12.019","article-title":"ML-KNN: A lazy learning approach to multi-label learning","volume":"40","author":"Zhang","year":"2007","journal-title":"Pattern Recognit."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S0893-6080(05)80038-3","article-title":"On the training of radial basis function classifiers","volume":"5","author":"Musavi","year":"1992","journal-title":"Neural Netw."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Zhou, J., Gandomi, A.H., Chen, F., and Holzinger, A. (2021). Evaluating the Quality of Machine Learning Explanations: A Survey on Methods and Metrics. Electronics, 10.","DOI":"10.3390\/electronics10050593"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"4640","DOI":"10.1109\/JIOT.2018.2874398","article-title":"Blockchain-Based Internet of Vehicles: Distributed Network Architecture and Performance Analy-sis","volume":"6","author":"Jiang","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_62","unstructured":"Jia, W., Dai, D., Xiao, X., and Wu, H. (August, January 28). ARNOR: Attention regularization based noise reduction for distant supervision relation classifi-cation. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Florence, Italy."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"e00938","DOI":"10.1016\/j.heliyon.2018.e00938","article-title":"State-of-the-art in artificial neural network applications: A survey","volume":"4","author":"Abiodun","year":"2018","journal-title":"Heliyon"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s10462-012-9321-7","article-title":"A new classification approach for neural networks hardware: From standards chips to embedded systems on chip","volume":"41","author":"Izeboudjen","year":"2014","journal-title":"Artif. Intell. Rev."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"2932","DOI":"10.1109\/TII.2017.2771256","article-title":"Intelligent Optimal Control With Critic Learning for a Nonlinear Overhead Crane System","volume":"14","author":"Wang","year":"2018","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Wang, S.-C. (2003). Interdisciplinary Computing in Java Programming, Springer.","DOI":"10.1007\/978-1-4615-0377-4"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Albawi, S., Mohammed, T.A., and Al-Zawi, S. (2017, January 21\u201323). Understanding of a convolutional neural network. Proceedings of the International Conference on Engineering and Technology (ICET), Antalya, Turkey.","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"119","DOI":"10.4236\/cn.2022.144009","article-title":"Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions","volume":"14","author":"Khoei","year":"2022","journal-title":"Commun. Netw."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"106904","DOI":"10.1016\/j.epsr.2020.106904","article-title":"Ensemble machine learning models for the detection of energy theft","volume":"192","author":"Gunturi","year":"2021","journal-title":"Electr. Power Syst. Res."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Chafii, M., Bader, F., and Palicot, J. (2018, January 15\u201318). Enhancing coverage in narrow band-IoT using machine learning. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.","DOI":"10.1109\/WCNC.2018.8377263"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Bithas, P.S., Michailidis, E.T., Nomikos, N., Vouyioukas, D., and Kanatas, A.G. (2019). A Survey on Machine-Learning Techniques for UAV-Based Communications. Sensors, 19.","DOI":"10.3390\/s19235170"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Benos, L., Tagarakis, A.C., Dolias, G., Berruto, R., Kateris, D., and Bochtis, D. (2021). Machine Learning in Agriculture: A Comprehensive Updated Review. Sensors, 21.","DOI":"10.3390\/s21113758"},{"key":"ref_73","unstructured":"Wagle, P.P., Rani, S., Kowligi, S.B., Suman, B.H., Pramodh, B., Kumar, P., Raghavan, S., Shastry, K.A., Sanjay, H.A., and Kumar, M. (2022). Recent Advances in Artificial Intelligence and Data Engineering, Springer."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/S0169-7161(04)24011-1","article-title":"Classification and regression trees, bagging, and boosting","volume":"24","author":"Sutton","year":"2005","journal-title":"Handb. Stat."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1038\/s42256-022-00488-2","article-title":"Lessons from infant learning for unsupervised machine learning","volume":"4","author":"Zaadnoordijk","year":"2022","journal-title":"Nat. Mach. Intell."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., and Kaabouch, N. (2023). A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems. Information, 14.","DOI":"10.3390\/info14020103"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.comcom.2020.12.003","article-title":"An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks","volume":"166","author":"Kumar","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_78","unstructured":"Hady, M., Abdel, A.M.F., and Schwenker, F. (2013). Handbook on Neural Information Processing, Springer."},{"key":"ref_79","first-page":"1","article-title":"Neural architecture search: A survey","volume":"20","author":"Elsken","year":"2019","journal-title":"J. Mach. Learn. Res."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhu, J., Li, M., Ren, Y., and Zhang, B. (2018, January 18\u201322). Smooth neighbors on teacher graphs for semi-supervised learning. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00927"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Park, S., Park, J., Shin, S., and Moon, I. (2018, January 2\u20137). Adversarial dropout for supervised and semi-supervised learning. Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, New Orleans, LA, USA.","DOI":"10.1609\/aaai.v32i1.11634"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., and Kaabouch, N. (2023, January 18\u201320). ACapsule Q-learning based reinforcement model for intrusion detection system on smart grid. Proceedings of the IEEE International Conference on Electro Information Technology (eIT), Romeoville, IL, USA.","DOI":"10.1109\/eIT57321.2023.10187374"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s10846-017-0468-y","article-title":"Survey of model-based reinforcement learning: Applications on robotics","volume":"86","author":"Polydoros","year":"2017","journal-title":"J. Intell. Robot. Syst."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Degris, T., Pilarski, P.M., and Sutton, R.S. (2012, January 27\u201329). Model-Free reinforcement learning with continuous action in practice. Proceedings of the 2012 American Control Conference (ACC), Montreal, QC, Canada.","DOI":"10.1109\/ACC.2012.6315022"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.35833\/MPCE.2020.000552","article-title":"Reinforcement learning and its applications in modern power and energy systems: A review","volume":"8","author":"Cao","year":"2020","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSE.2019.2962027","article-title":"Machine Learning Testing: Survey, Landscapes and Horizons","volume":"Volume 48","author":"Zhang","year":"2022","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"101001","DOI":"10.1016\/j.phycom.2020.101001","article-title":"Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey","volume":"39","author":"Salahdine","year":"2020","journal-title":"Phys. Commun."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"3213","DOI":"10.1007\/s10462-021-10085-1","article-title":"Model-free reinforcement learning from expert demonstrations: A survey","volume":"55","author":"Yu","year":"2022","journal-title":"Artif. Intell. Rev."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.neucom.2020.07.061","article-title":"On hyperparameter optimization of machine learning algorithms: Theory and practice","volume":"415","author":"Yang","year":"2020","journal-title":"Neurocomputing"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TGCN.2022.3143991","article-title":"Energy Optimization for Green Communication in IoT Using Harris Hawks Optimization","volume":"Volume 6","author":"Dev","year":"2022","journal-title":"IEEE Transactions on Green Communications and Networking"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"16188","DOI":"10.1109\/ACCESS.2022.3146374","article-title":"Dynamic Arithmetic Optimization Algorithm for Truss Optimization Under Natural Fre-quency Constraints","volume":"10","author":"Khodadadi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Cummins, C., Wasti, B., Guo, J., Cui, B., Ansel, J., Gomez, S., Jain, S., Liu, J., Teytaud, O., and Steinerm, B. (2022, January 2\u20136). CompilerGym: Robust, Performant Compiler Optimization Environments for AI Research. Proceedings of the 2022 IEEE\/ACM In-ternational Symposium on Code Generation and Optimization (CGO), Seoul, Republic of Korea.","DOI":"10.1109\/CGO53902.2022.9741258"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.gr.2022.03.015","article-title":"Application of machine learning, deep learning and optimization algo-rithms in geoengineering and geoscience: Comprehensive review and future challenge","volume":"109","author":"Zhang","year":"2022","journal-title":"Gondwana Res."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"101635","DOI":"10.1016\/j.sysarc.2019.101635","article-title":"A survey of techniques for optimizing deep learning on GPUs","volume":"99","author":"Mittal","year":"2019","journal-title":"J. Syst. Arch."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.inffus.2017.10.006","article-title":"A survey on deep learning for big data","volume":"42","author":"Zhang","year":"2018","journal-title":"Inf. Fusion"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"16150","DOI":"10.1109\/ACCESS.2022.3147821","article-title":"Ebola Optimization Search Algorithm: A New Nature-Inspired Metaheuristic Optimization Algorithm","volume":"10","author":"Oyelade","year":"2022","journal-title":"IEEE Access"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"89497","DOI":"10.1109\/ACCESS.2020.2990567","article-title":"Pymoo: Multi-Objective Optimization in Python","volume":"8","author":"Blank","year":"2020","journal-title":"IEEE Access"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/TEVC.2022.3145582","article-title":"An Evolutionary Multitasking Optimization Framework for Constrained Multi-objective Optimization Problems","volume":"26","author":"Qiao","year":"2022","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Riaz, M., Ahmad, S., Hussain, I., Naeem, M., and Mihet-Popa, L. (2022). Probabilistic Optimization Techniques in Smart Power System. Energies, 15.","DOI":"10.3390\/en15030825"},{"key":"ref_100","unstructured":"Yu, T., and Zhu, H. (2020). Hyper-parameter optimization: A review of algorithms and applications. arXiv."},{"key":"ref_101","unstructured":"Yang, X., Song, Z., King, I., and Xu, Z. (2021). A Survey on deep semi-supervised learning. arXiv."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1111\/tops.12010","article-title":"Human semi-supervised learning","volume":"5","author":"Gibson","year":"2013","journal-title":"Top. Cogn. Sci."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"3826","DOI":"10.1109\/TCYB.2020.2977374","article-title":"Deep Reinforcement Learning for Multiagent Systems: A Review of Challenges, Solutions, and Applications","volume":"50","author":"Nguyen","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Canese, L., Cardarilli, G.C., Di Nunzio, L., Fazzolari, R., Giardino, D., Re, M., and Span\u00f2, S. (2021). Multi-Agent Reinforcement Learning: A Review of Challenges and Applications. Appl. Sci., 11.","DOI":"10.1038\/s41598-021-94691-7"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"3215","DOI":"10.1007\/s10462-020-09938-y","article-title":"A survey on multi-agent deep reinforcement learning: From the perspective of challenges and applications","volume":"54","author":"Du","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1016\/j.matpr.2020.11.039","article-title":"Challenges with reinforcement learning in prosthesis","volume":"49","author":"Salwan","year":"2022","journal-title":"Mater. Today Proc."},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Narkhede, M.S., Chatterji, S., and Ghosh, S. (2012, January 28\u201329). Trends and challenges in optimization techniques for operation and control of Mi-crogrid\u2014A review. Proceedings of the 2012 1st International Conference on Power and Energy in NERIST (ICPEN), Nirjuli, India.","DOI":"10.1109\/ICPEN.2012.6492337"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., Ismail, S., and Kaabouch, N. (2022). Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs. Sensors, 22.","DOI":"10.3390\/s22020662"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., Ismail, S., Al Shamaileh, K., Devabhaktuni, V.K., and Kaabouch, N. (2022). Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles. Appl. Sci., 13.","DOI":"10.3390\/app13010383"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., and Kaabouch, N. (2022, January 26\u201329). Densely Connected Neural Networks for Detecting Denial of Service Attacks on Smart Grid Network. Proceedings of the IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON54665.2022.9965631"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Khan, A., Khan, S.H., Saif, M., Batool, A., Sohail, A., and Khan, M.W. (2023). A Survey of Deep Learning Techniques for the Analysis of COVID-19 and their usability for Detecting Omicron. J. Exp. Theor. Artif. Intell., 1\u201343.","DOI":"10.1080\/0952813X.2023.2165724"},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"100529","DOI":"10.1016\/j.cosrev.2022.100529","article-title":"A comprehensive survey on deep learning based malware detection techniques","volume":"47","author":"Gopinath","year":"2023","journal-title":"Comput. Sci. Rev."},{"key":"ref_113","unstructured":"Gheisari, M., Ebrahimzadeh, F., Rahimi, M., Moazzamigodarzi, M., Liu, Y., Pramanik, P.K.D., Heravi, M.A., Mehbodniya, A., Ghaderzadeh, M., and Feylizadeh, M.R. (2023). CAAI Transactions on Intelligence Technology, IET."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1146\/annurev-matsci-070218-010015","article-title":"Opportunities and challenges for machine learning in materials science","volume":"50","author":"Morgan","year":"2020","journal-title":"Annu. Rev. Mater. Res."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/17499518.2022.2087884","article-title":"Future of machine learning in geotechnics","volume":"17","author":"Phoon","year":"2023","journal-title":"Georisk Assess. Manag. Risk Eng. Syst. Geohazards"},{"key":"ref_116","first-page":"54","article-title":"Analysis of Current Trends, Advances and Challenges of Machine Learning (Ml) and Knowledge Extraction: From Ml to Explainable AI","volume":"58","author":"Krishnam","year":"2022","journal-title":"Ind. Qualif.-Stitute Adm. Manag. UK"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1038\/s41524-022-00810-x","article-title":"Machine learning in concrete science: Applications, challenges, and best practices","volume":"8","author":"Li","year":"2022","journal-title":"NPJ Comput. Mater."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"116512","DOI":"10.1016\/j.eswa.2022.116512","article-title":"Machine learning in the quantum realm: The state-of-the-art, challenges, and future vision","volume":"194","author":"Houssein","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"103405","DOI":"10.1016\/j.jnca.2022.103405","article-title":"Machine learning (ML)-centric resource management in cloud computing: A review and future directions","volume":"204","author":"Khan","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1038\/s41929-022-00744-z","article-title":"Interpretable machine learning for knowledge generation in heterogeneous catalysis","volume":"5","author":"Esterhuizen","year":"2022","journal-title":"Nat. Catal."},{"key":"ref_121","first-page":"1","article-title":"Leveraging Machine Learning for Enhanced Business Intelligence","volume":"7","author":"Bharadiya","year":"2023","journal-title":"Int. J. Comput. Sci. Technol."},{"key":"ref_122","unstructured":"Talaei Khoei, T., Ould Slimane, H., and Kaabouch, N. (2023). Neural Computing and Applications, Springer."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1007\/s10479-022-04986-9","article-title":"Multi-criteria classification, sorting, and clustering: A bibliometric review and research agenda","volume":"325","author":"Belaid","year":"2023","journal-title":"Ann. Oper. Res."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"13217","DOI":"10.1007\/s00500-022-07037-4","article-title":"A review on quantum computing and deep learning algorithms and their applications","volume":"27","author":"Valdez","year":"2023","journal-title":"Soft Comput."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Fihri, W.F., Arjoune, Y., Hassan El Ghazi, H., Kaabouch, N., and Abou El Majd, A.B. (2018, January 8\u201310). A particle swarm optimization based algorithm for primary user emulation attack detection. Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2018.8301616"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/10\/332\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:03:26Z","timestamp":1760130206000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/10\/332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,9]]},"references-count":125,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["fi15100332"],"URL":"https:\/\/doi.org\/10.3390\/fi15100332","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,9]]}}}