{"id":"https://openalex.org/W4404032193","doi":"https://doi.org/10.1109/icccnt61001.2024.10724189","title":"Retracted: Enhancing Security and Privacy of Machine Learning Algorithms in Agricultural Automation","display_name":"Retracted: Enhancing Security and Privacy of Machine Learning Algorithms in Agricultural Automation","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404032193","doi":"https://doi.org/10.1109/icccnt61001.2024.10724189"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104053510","display_name":"Amit Kumar Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amit Kumar Singh","raw_affiliation_strings":["ARKA JAIN University,Department of Journalisim &#x0026; Mass Communication,Jamshedpur,Jharkhand,India"],"affiliations":[{"raw_affiliation_string":"ARKA JAIN University,Department of Journalisim &#x0026; Mass Communication,Jamshedpur,Jharkhand,India","institution_ids":["https://openalex.org/I106826634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092898558","display_name":"Vikas Kumar Kharbas","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125057","display_name":"Vivekananda Global University","ror":"https://ror.org/038mz4r36","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125057"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vikas Kumar Kharbas","raw_affiliation_strings":["Vivekananda Global University,Department of Computer Science &#x0026; Application,Jaipur,India"],"affiliations":[{"raw_affiliation_string":"Vivekananda Global University,Department of Computer Science &#x0026; Application,Jaipur,India","institution_ids":["https://openalex.org/I4210125057"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017808502","display_name":"Vinay Kumar S B","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S B Vinay Kumar","raw_affiliation_strings":["JAIN (Deemed to be University),School of Engineering and Technology,Department of Electronics and Communication Engineering,Bangalore,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"JAIN (Deemed to be University),School of Engineering and Technology,Department of Electronics and Communication Engineering,Bangalore,Karnataka,India","institution_ids":["https://openalex.org/I106826634"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5104053510"],"corresponding_institution_ids":["https://openalex.org/I106826634"],"apc_list":null,"apc_paid":null,"fwci":0.3661,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58603742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7200999855995178,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7200999855995178,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10616","display_name":"Smart Agriculture and AI","score":0.6912000179290771,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.602400004863739,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7301080226898193},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.6870669722557068},{"id":"https://openalex.org/keywords/agriculture","display_name":"Agriculture","score":0.503351628780365},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4429033398628235},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43620944023132324},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3988865613937378},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3221564292907715},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15573102235794067}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7301080226898193},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.6870669722557068},{"id":"https://openalex.org/C118518473","wikidata":"https://www.wikidata.org/wiki/Q11451","display_name":"Agriculture","level":2,"score":0.503351628780365},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4429033398628235},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43620944023132324},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3988865613937378},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3221564292907715},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15573102235794067},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Zero hunger","id":"https://metadata.un.org/sdg/2"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2950944546","https://openalex.org/W3110407708","https://openalex.org/W3120131065","https://openalex.org/W3198872584","https://openalex.org/W4205922727","https://openalex.org/W4281690062","https://openalex.org/W4353085440","https://openalex.org/W4383620576","https://openalex.org/W4386619339","https://openalex.org/W4387367680","https://openalex.org/W4388025367","https://openalex.org/W4388039407","https://openalex.org/W4388039408","https://openalex.org/W4388039486","https://openalex.org/W4388039501","https://openalex.org/W4388937538","https://openalex.org/W4388937887","https://openalex.org/W4389445919","https://openalex.org/W4390550922","https://openalex.org/W4390550940","https://openalex.org/W4390550943","https://openalex.org/W4390550961","https://openalex.org/W4390697493","https://openalex.org/W4394712291"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2355956201","https://openalex.org/W2053286651","https://openalex.org/W2181743346","https://openalex.org/W2187401768","https://openalex.org/W2181413294","https://openalex.org/W2327874825","https://openalex.org/W2386195957","https://openalex.org/W2519676117"],"abstract_inverted_index":{"This":[0,92],"paper":[1,93],"specializes":[2],"in":[3,12,21,35,134],"enhancing":[4],"the":[5,16,69,76,95,113,122,130],"safety":[6],"and":[7,42,58,85,88,98,102,124],"privacy":[8,43,99,125],"of":[9,18,52,71,78,107],"machine-mastering":[10],"algorithms":[11,26,133],"agricultural":[13,22,135],"automation.":[14],"With":[15],"emergence":[17],"digital":[19],"generation":[20],"production,":[23],"system":[24],"mastering":[25],"have":[27],"emerged":[28],"as":[29],"essential":[30],"to":[31,48,80,128],"offer":[32],"precision":[33],"control":[34,37],"farm":[36],"operations.":[38],"However,":[39],"their":[40,108],"security":[41,97,123],"may":[44],"be":[45],"compromised":[46],"due":[47],"assault":[49],"vectors":[50],"inclusive":[51],"opposed":[53],"inputs,":[54],"facts":[55,59],"leakage":[56],"assaults,":[57],"poisoning":[60],"attacks.":[61],"Several":[62],"ability":[63],"solutions":[64],"are":[65],"studied,":[66],"which":[67],"include":[68],"introduction":[70],"statistics":[72],"anonymization":[73],"strategies,":[74,84],"getting":[75],"right":[77],"entry":[79],"manage":[81],"mechanisms,":[82],"cryptographic":[83],"software":[86],"program":[87],"hardware":[89],"protection":[90],"tactics.":[91],"analyses":[94],"one-of-a-kind":[96],"enhancement":[100,126],"techniques":[101],"affords":[103],"a":[104,116],"comprehensive":[105],"discussion":[106],"effectiveness.":[109],"Sooner":[110],"or":[111],"later,":[112],"authors":[114],"advise":[115],"complete":[117],"solution":[118],"that":[119],"encompasses":[120],"all":[121],"approaches":[127],"shield":[129],"gadget":[131],"studying":[132],"automation":[136],"effectively.":[137]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-08T06:56:09.383167","created_date":"2025-10-10T00:00:00"}
