Research Article

Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Figure 5

Accuracy rate comparison of SS-ELM, ELM, SVM, and CVM-ELM.