Journals
Publish with us
Publishing partnerships
About us
Blog
Wireless Communications and Mobile Computing
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Wireless Communications and Mobile Computing
/
2018
/
Article
/
Tab 1
/
Research Article
Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Table 1
Comparison of algorithms in testing accuracy and training time.
Algorithm
Accuracy (%)
Training time (s)
SS-ELM
ELM
BP
SVM
CVM-ELM