Research Article

A Stacked Deep Learning Approach for IoT Cyberattack Detection

Table 4

The accuracy of our method compared with the tested methods on the power system datasets.

ModelPower system
123456789101112131415

Ours97.797.997.296.097.196.898.397.296.798.097.998.098.598.496.9
[16]93.489.389.888.832.590.275.274.989.188.589.889.692.790.188.5
[21]90.088.586.884.988.685.688.589.287.288.886.786.388.988.187.4
RF93.893.194.593.394.093.494.394.093.294.094.393.996.094.892.9
LR87.771.072.767.975.071.377.574.369.973.176.369.478.575.068.7
DT92.590.089.589.492.391.389.292.390.187.991.289.792.790.688.5
LDA77.673.272.169.076.272.378.774.070.573.277.669.679.174.970.0
QDA50.251.448.850.744.947.549.347.852.850.643.254.349.746.457.3
KNN89.487.486.785.189.285.888.089.286.688.486.086.088.988.187.5
NB25.234.133.539.231.532.129.260.835.633.475.839.027.628.938.7
XGB88.384.288.481.781.782.684.786.584.486.484.580.986.383.683.4
MLP79.169.471.162.171.532.073.928.065.771.676.565.276.228.462.7
RSS93.892.193.892.894.293.192.893.992.092.792.092.495.594.392.0
GB90.085.787.582.583.583.985.687.385.587.786.084.687.185.785.3