Research Article

Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Table 1

Comparison of algorithms in testing accuracy and training time.

AlgorithmAccuracy (%)Training time (s)

SS-ELM
ELM
BP
SVM
CVM-ELM