Research Article

Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Figure 8

ROC of SVM, SS-ELM, ELM, and CVM-ELM.