Research Article

Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain

Figure 3

(a) Comparison of accuracy. (b) Comparison of precision.
(a)
(b)