{"id":"https://openalex.org/W3093781690","doi":"https://doi.org/10.1109/icccnt49239.2020.9225652","title":"How Can Machine Learning Impact on Wireless Network and IoT? \u2013 A Survey","display_name":"How Can Machine Learning Impact on Wireless Network and IoT? \u2013 A Survey","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093781690","doi":"https://doi.org/10.1109/icccnt49239.2020.9225652","mag":"3093781690"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225652","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027996576","display_name":"Swarnalina Laha","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Swarnalina Laha","raw_affiliation_strings":["Techno International New Town, INDIA"],"affiliations":[{"raw_affiliation_string":"Techno International New Town, INDIA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045745407","display_name":"Nilanjan Roy Chowdhury","orcid":"https://orcid.org/0000-0001-6907-7952"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nilanjan Chowdhury","raw_affiliation_strings":["Techno International New Town, INDIA"],"affiliations":[{"raw_affiliation_string":"Techno International New Town, INDIA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025251681","display_name":"Raja Karmakar","orcid":"https://orcid.org/0000-0003-1916-7743"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raja Karmakar","raw_affiliation_strings":["Techno International New Town, INDIA"],"affiliations":[{"raw_affiliation_string":"Techno International New Town, INDIA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027996576"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.2948,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82369476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081458806991577},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6235566139221191},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5821484327316284},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5400770902633667},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.46547314524650574},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.46122223138809204},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4567294418811798},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.4413148760795593},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.440400630235672},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.4276404082775116},{"id":"https://openalex.org/keywords/machine-to-machine","display_name":"Machine to machine","score":0.42117631435394287},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4166267514228821},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37219005823135376},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3668382465839386},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2952870726585388},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1604650616645813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081458806991577},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6235566139221191},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5821484327316284},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5400770902633667},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.46547314524650574},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.46122223138809204},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4567294418811798},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.4413148760795593},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.440400630235672},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.4276404082775116},{"id":"https://openalex.org/C76763059","wikidata":"https://www.wikidata.org/wiki/Q251072","display_name":"Machine to machine","level":3,"score":0.42117631435394287},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4166267514228821},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37219005823135376},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3668382465839386},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2952870726585388},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1604650616645813}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225652","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1792364413","https://openalex.org/W2061469216","https://openalex.org/W2139421948","https://openalex.org/W2165213794","https://openalex.org/W2341653212","https://openalex.org/W2517975492","https://openalex.org/W2561704874","https://openalex.org/W2592124219","https://openalex.org/W2597934954","https://openalex.org/W2608418534","https://openalex.org/W2617931713","https://openalex.org/W2623902153","https://openalex.org/W2743623239","https://openalex.org/W2754804809","https://openalex.org/W2759910885","https://openalex.org/W2762644836","https://openalex.org/W2763068163","https://openalex.org/W2786070938","https://openalex.org/W2791279818","https://openalex.org/W2792005857","https://openalex.org/W2797742547","https://openalex.org/W2806500311","https://openalex.org/W2807380454","https://openalex.org/W2809684781","https://openalex.org/W2890445686","https://openalex.org/W2892077825","https://openalex.org/W2915969651","https://openalex.org/W2944459545","https://openalex.org/W2971480956","https://openalex.org/W3099185017","https://openalex.org/W3104092367","https://openalex.org/W3105750153","https://openalex.org/W6734096758"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W4306904969","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W3203657119","https://openalex.org/W3212933010"],"abstract_inverted_index":{"Machines":[0],"can":[1,83],"be":[2],"trained":[3],"by":[4,7],"human":[5,23],"beings":[6],"feeding":[8],"them":[9],"massive":[10],"amount":[11,55],"of":[12,27,43,56,99,136,170,200,206],"data,":[13],"like":[14,104,184],"examples":[15],"and":[16,35,68,150,177,203],"instructions.":[17],"They":[18],"have":[19,143,219],"to":[20,62],"learn":[21],"without":[22],"interventions.":[24],"The":[25],"Internet":[26],"Things":[28],"(IoT)":[29],"is":[30,36],"still":[31],"in":[32,37,50,78,146,216],"its":[33],"outset":[34],"the":[38,63,79,97,137,168,172,217],"developing":[39],"front.":[40],"IoT":[41,127,148,196],"consisting":[42],"devices/machines":[44],"with":[45],"diverse":[46],"sensors":[47],"associated":[48],"together":[49],"wireless":[51,189],"networks,":[52,191],"needs":[53],"great":[54],"security":[57],"for":[58,125,181,195],"avoiding":[59],"unauthorized":[60],"access":[61],"network":[64,157],"as":[65,153],"it":[66,85],"collects":[67],"transmit":[69],"data":[70],"packets.":[71],"With":[72],"industrial":[73],"fields":[74],"showing":[75],"much":[76],"interest":[77],"forefront,":[80],"intrusion":[81],"threats":[82],"make":[84],"vulnerable.":[86],"In":[87],"this":[88],"paper,":[89],"we":[90],"are":[91,123],"addressing":[92],"several":[93],"positive":[94],"measures":[95],"regarding":[96],"use":[98],"machine":[100,140,176],"learning":[101,106,109,113,116,141,179],"(ML)":[102],"modalities":[103],"supervised":[105,112],"(SL),":[107],"unsupervised":[108],"(UL),":[110],"semi-":[111],"(SSL),":[114],"reinforcement":[115],"(RL),":[117],"support":[118],"vector":[119],"machines":[120],"(SVM)":[121],"which":[122,210],"used":[124],"training":[126],"devices.":[128],"This":[129],"paper":[130],"also":[131,166,220],"addresses":[132],"a":[133,204],"brief":[134],"survey":[135],"scenarios":[138],"where":[139],"algorithms":[142],"been":[144,221],"applied":[145],"various":[147,182],"devices":[149],"networks":[151],"such":[152],"signal":[154],"authentication,":[155],"security,":[156,185],"flow,":[158],"information":[159],"retrieval,":[160],"traffic":[161],"management,":[162],"spectrum":[163],"sensing.":[164],"It":[165],"indicates":[167],"necessity":[169],"surveying":[171],"scattered":[173],"works":[174],"on":[175],"deep":[178],"applications":[180],"aspects":[183],"congestion":[186],"control":[187],"over":[188],"computer":[190],"embedded":[192],"sensor":[193],"systems":[194],"applications.":[197],"Several":[198],"limitations":[199],"existing":[201],"researches":[202],"number":[205],"open":[207],"research":[208],"issues":[209],"fellow":[211],"researchers":[212],"may":[213],"find":[214],"useful":[215],"future":[218],"discussed.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
