Robotic Cloud Automation‐Enabled Attack Detection and Secure Robotic Command Verification Using LADA‐C‐RNN and S‐Fuzzy Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1002/ett.70115
The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud‐based robot control and data processing. Hence, this paper proposes a secure model called RCA‐assisted attack detection and robotic command verification using LADA‐C‐RNN and S‐Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA‐C‐RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1002/ett.70115
- https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70115
- OA Status
- bronze
- References
- 26
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409732873
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409732873Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1002/ett.70115Digital Object Identifier
- Title
-
Robotic Cloud Automation‐Enabled Attack Detection and Secure Robotic Command Verification Using LADA‐C‐RNN and S‐FuzzyWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-01Full publication date if available
- Authors
-
Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, Raj Kumar Gudivaka, Dinesh Kumar Reddy Basani, Sri Harsha Grandhi, Faheem KhanList of authors in order
- Landing page
-
https://doi.org/10.1002/ett.70115Publisher landing page
- PDF URL
-
https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70115Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70115Direct OA link when available
- Concepts
-
Cloud computing, Computer science, Automation, Fuzzy logic, Embedded system, Computer security, Artificial intelligence, Real-time computing, Operating system, Engineering, Mechanical engineeringTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
26Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409732873 |
|---|---|
| doi | https://doi.org/10.1002/ett.70115 |
| ids.doi | https://doi.org/10.1002/ett.70115 |
| ids.openalex | https://openalex.org/W4409732873 |
| fwci | 0.0 |
| type | article |
| title | Robotic Cloud Automation‐Enabled Attack Detection and Secure Robotic Command Verification Using LADA‐C‐RNN and S‐Fuzzy |
| biblio.issue | 4 |
| biblio.volume | 36 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T13382 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9994999766349792 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2207 |
| topics[0].subfield.display_name | Control and Systems Engineering |
| topics[0].display_name | Robotics and Automated Systems |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9930999875068665 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T10273 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9902999997138977 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | IoT and Edge/Fog Computing |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.645704984664917 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6155582666397095 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C115901376 |
| concepts[2].level | 2 |
| concepts[2].score | 0.581843376159668 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q184199 |
| concepts[2].display_name | Automation |
| concepts[3].id | https://openalex.org/C58166 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5007250308990479 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q224821 |
| concepts[3].display_name | Fuzzy logic |
| concepts[4].id | https://openalex.org/C149635348 |
| concepts[4].level | 1 |
| concepts[4].score | 0.43481796979904175 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[4].display_name | Embedded system |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.42274922132492065 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C154945302 |
| concepts[6].level | 1 |
| concepts[6].score | 0.39618223905563354 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[6].display_name | Artificial intelligence |
| concepts[7].id | https://openalex.org/C79403827 |
| concepts[7].level | 1 |
| concepts[7].score | 0.3212507963180542 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[7].display_name | Real-time computing |
| concepts[8].id | https://openalex.org/C111919701 |
| concepts[8].level | 1 |
| concepts[8].score | 0.26580119132995605 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[8].display_name | Operating system |
| concepts[9].id | https://openalex.org/C127413603 |
| concepts[9].level | 0 |
| concepts[9].score | 0.22276389598846436 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[9].display_name | Engineering |
| concepts[10].id | https://openalex.org/C78519656 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q101333 |
| concepts[10].display_name | Mechanical engineering |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.645704984664917 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6155582666397095 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/automation |
| keywords[2].score | 0.581843376159668 |
| keywords[2].display_name | Automation |
| keywords[3].id | https://openalex.org/keywords/fuzzy-logic |
| keywords[3].score | 0.5007250308990479 |
| keywords[3].display_name | Fuzzy logic |
| keywords[4].id | https://openalex.org/keywords/embedded-system |
| keywords[4].score | 0.43481796979904175 |
| keywords[4].display_name | Embedded system |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.42274922132492065 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[6].score | 0.39618223905563354 |
| keywords[6].display_name | Artificial intelligence |
| keywords[7].id | https://openalex.org/keywords/real-time-computing |
| keywords[7].score | 0.3212507963180542 |
| keywords[7].display_name | Real-time computing |
| keywords[8].id | https://openalex.org/keywords/operating-system |
| keywords[8].score | 0.26580119132995605 |
| keywords[8].display_name | Operating system |
| keywords[9].id | https://openalex.org/keywords/engineering |
| keywords[9].score | 0.22276389598846436 |
| keywords[9].display_name | Engineering |
| language | en |
| locations[0].id | doi:10.1002/ett.70115 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306425600 |
| locations[0].source.issn | 2161-3915, 2161-5748 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2161-3915 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Transactions on Emerging Telecommunications Technologies |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70115 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Transactions on Emerging Telecommunications Technologies |
| locations[0].landing_page_url | https://doi.org/10.1002/ett.70115 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5096363538 |
| authorships[0].author.orcid | https://orcid.org/0009-0006-9123-7872 |
| authorships[0].author.display_name | Basava Ramanjaneyulu Gudivaka |
| authorships[0].affiliations[0].raw_affiliation_string | Raas Infotek Newark Delaware USA |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Basava Ramanjaneyulu Gudivaka |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Raas Infotek Newark Delaware USA |
| authorships[1].author.id | https://openalex.org/A5096197668 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Rajya Lakshmi Gudivaka |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210090636 |
| authorships[1].affiliations[0].raw_affiliation_string | Wipro Hyderabad India |
| authorships[1].institutions[0].id | https://openalex.org/I4210090636 |
| authorships[1].institutions[0].ror | https://ror.org/001ccf545 |
| authorships[1].institutions[0].type | company |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210090636 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Wipro (India) |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Rajya Lakshmi Gudivaka |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Wipro Hyderabad India |
| authorships[2].author.id | https://openalex.org/A5096043087 |
| authorships[2].author.orcid | https://orcid.org/0009-0002-9399-1976 |
| authorships[2].author.display_name | Raj Kumar Gudivaka |
| authorships[2].affiliations[0].raw_affiliation_string | Infosys Charlotte USA |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Raj Kumar Gudivaka |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Infosys Charlotte USA |
| authorships[3].author.id | https://openalex.org/A5106971114 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Dinesh Kumar Reddy Basani |
| authorships[3].affiliations[0].raw_affiliation_string | CGI Vancouver British Columbia Canada |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Dinesh Kumar Reddy Basani |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | CGI Vancouver British Columbia Canada |
| authorships[4].author.id | https://openalex.org/A5105102088 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Sri Harsha Grandhi |
| authorships[4].countries | US |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I1343180700 |
| authorships[4].affiliations[0].raw_affiliation_string | Intel Folsom California USA |
| authorships[4].institutions[0].id | https://openalex.org/I1343180700 |
| authorships[4].institutions[0].ror | https://ror.org/01ek73717 |
| authorships[4].institutions[0].type | company |
| authorships[4].institutions[0].lineage | https://openalex.org/I1343180700 |
| authorships[4].institutions[0].country_code | US |
| authorships[4].institutions[0].display_name | Intel (United States) |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Sri Harsha Grandhi |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Intel Folsom California USA |
| authorships[5].author.id | https://openalex.org/A5071662846 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-6220-0225 |
| authorships[5].author.display_name | Faheem Khan |
| authorships[5].countries | KR |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I12832649 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Computer Engineering Gachon University Seongnam‐si South Korea |
| authorships[5].institutions[0].id | https://openalex.org/I12832649 |
| authorships[5].institutions[0].ror | https://ror.org/03ryywt80 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I12832649 |
| authorships[5].institutions[0].country_code | KR |
| authorships[5].institutions[0].display_name | Gachon University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Faheem Khan |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Computer Engineering Gachon University Seongnam‐si South Korea |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70115 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Robotic Cloud Automation‐Enabled Attack Detection and Secure Robotic Command Verification Using LADA‐C‐RNN and S‐Fuzzy |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T13382 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9994999766349792 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2207 |
| primary_topic.subfield.display_name | Control and Systems Engineering |
| primary_topic.display_name | Robotics and Automated Systems |
| related_works | https://openalex.org/W4244478748, https://openalex.org/W3150465815, https://openalex.org/W4223488648, https://openalex.org/W2134969820, https://openalex.org/W2251605416, https://openalex.org/W1997222214, https://openalex.org/W2560439919, https://openalex.org/W4389340727, https://openalex.org/W2802581102, https://openalex.org/W4205786897 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1002/ett.70115 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306425600 |
| best_oa_location.source.issn | 2161-3915, 2161-5748 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2161-3915 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Transactions on Emerging Telecommunications Technologies |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70115 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Transactions on Emerging Telecommunications Technologies |
| best_oa_location.landing_page_url | https://doi.org/10.1002/ett.70115 |
| primary_location.id | doi:10.1002/ett.70115 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306425600 |
| primary_location.source.issn | 2161-3915, 2161-5748 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2161-3915 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Transactions on Emerging Telecommunications Technologies |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70115 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Transactions on Emerging Telecommunications Technologies |
| primary_location.landing_page_url | https://doi.org/10.1002/ett.70115 |
| publication_date | 2025-04-01 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3216333715, https://openalex.org/W3041102382, https://openalex.org/W4378471216, https://openalex.org/W4401911562, https://openalex.org/W4287889564, https://openalex.org/W3012102748, https://openalex.org/W4387377875, https://openalex.org/W6782477500, https://openalex.org/W4402205672, https://openalex.org/W4386219844, https://openalex.org/W3141626472, https://openalex.org/W3191622740, https://openalex.org/W4226407511, https://openalex.org/W3082185101, https://openalex.org/W3118910619, https://openalex.org/W4288053756, https://openalex.org/W4362009315, https://openalex.org/W4283365061, https://openalex.org/W4381510088, https://openalex.org/W2941828467, https://openalex.org/W4362639200, https://openalex.org/W3086141643, https://openalex.org/W4281386844, https://openalex.org/W3080205891, https://openalex.org/W3148084594, https://openalex.org/W3035508024 |
| referenced_works_count | 26 |
| abstract_inverted_index.a | 36, 70 |
| abstract_inverted_index.ID | 94 |
| abstract_inverted_index.In | 125 |
| abstract_inverted_index.by | 145 |
| abstract_inverted_index.in | 19, 32, 97 |
| abstract_inverted_index.is | 44, 88, 105, 118, 132, 142, 173 |
| abstract_inverted_index.of | 3, 16, 51 |
| abstract_inverted_index.on | 56 |
| abstract_inverted_index.to | 12, 107, 120, 162, 185 |
| abstract_inverted_index.The | 1, 85 |
| abstract_inverted_index.and | 6, 24, 38, 63, 77, 83, 95, 135 |
| abstract_inverted_index.are | 26, 152, 160, 183 |
| abstract_inverted_index.fed | 174 |
| abstract_inverted_index.for | 46 |
| abstract_inverted_index.had | 200 |
| abstract_inverted_index.has | 10 |
| abstract_inverted_index.led | 11 |
| abstract_inverted_index.the | 13, 52, 92, 98, 103, 109, 114, 121, 126, 130, 138, 149, 157, 163, 170, 176, 180, 186, 193, 197 |
| abstract_inverted_index.use | 15 |
| abstract_inverted_index.via | 154 |
| abstract_inverted_index.(AI) | 9 |
| abstract_inverted_index.None | 50 |
| abstract_inverted_index.data | 64, 172, 189 |
| abstract_inverted_index.into | 175 |
| abstract_inverted_index.rise | 2 |
| abstract_inverted_index.task | 117 |
| abstract_inverted_index.this | 67 |
| abstract_inverted_index.thus | 191 |
| abstract_inverted_index.used | 106 |
| abstract_inverted_index.user | 93 |
| abstract_inverted_index.with | 203 |
| abstract_inverted_index.Next, | 169 |
| abstract_inverted_index.SCTDA | 104 |
| abstract_inverted_index.Then, | 113, 156, 179 |
| abstract_inverted_index.about | 29 |
| abstract_inverted_index.cloud | 99 |
| abstract_inverted_index.done, | 143 |
| abstract_inverted_index.model | 72 |
| abstract_inverted_index.paper | 68 |
| abstract_inverted_index.robot | 48, 61, 86, 110, 115, 187 |
| abstract_inverted_index.smart | 17 |
| abstract_inverted_index.tasks | 182 |
| abstract_inverted_index.trust | 25 |
| abstract_inverted_index.using | 81, 91 |
| abstract_inverted_index.which | 165 |
| abstract_inverted_index.98.42% | 204 |
| abstract_inverted_index.During | 101 |
| abstract_inverted_index.Hence, | 66 |
| abstract_inverted_index.attack | 57, 75, 122, 127, 167 |
| abstract_inverted_index.called | 73 |
| abstract_inverted_index.during | 59 |
| abstract_inverted_index.level. | 195 |
| abstract_inverted_index.login, | 102 |
| abstract_inverted_index.normal | 171 |
| abstract_inverted_index.phase, | 129 |
| abstract_inverted_index.phase. | 124 |
| abstract_inverted_index.robots | 18, 31 |
| abstract_inverted_index.secure | 37, 71 |
| abstract_inverted_index.system | 43 |
| abstract_inverted_index.verify | 108 |
| abstract_inverted_index.GMJFOA. | 155 |
| abstract_inverted_index.command | 41, 79, 188 |
| abstract_inverted_index.control | 42, 62 |
| abstract_inverted_index.dataset | 131 |
| abstract_inverted_index.digital | 4 |
| abstract_inverted_index.feature | 146 |
| abstract_inverted_index.focused | 55 |
| abstract_inverted_index.latency | 202 |
| abstract_inverted_index.minimum | 201 |
| abstract_inverted_index.optimal | 150 |
| abstract_inverted_index.pattern | 140 |
| abstract_inverted_index.robotic | 40, 78 |
| abstract_inverted_index.systems | 54 |
| abstract_inverted_index.traffic | 177 |
| abstract_inverted_index.various | 20 |
| abstract_inverted_index.ABSTRACT | 0 |
| abstract_inverted_index.Finally, | 196 |
| abstract_inverted_index.However, | 22 |
| abstract_inverted_index.analysis | 141 |
| abstract_inverted_index.approach | 199 |
| abstract_inverted_index.concerns | 28 |
| abstract_inverted_index.critical | 33 |
| abstract_inverted_index.features | 151, 159 |
| abstract_inverted_index.followed | 144 |
| abstract_inverted_index.gathered | 134 |
| abstract_inverted_index.inputted | 161, 184 |
| abstract_inverted_index.password | 96 |
| abstract_inverted_index.performs | 166 |
| abstract_inverted_index.proposed | 198 |
| abstract_inverted_index.proposes | 69 |
| abstract_inverted_index.reliable | 39 |
| abstract_inverted_index.sectors. | 21 |
| abstract_inverted_index.security | 23, 194 |
| abstract_inverted_index.selected | 153, 158 |
| abstract_inverted_index.temporal | 139 |
| abstract_inverted_index.accuracy. | 205 |
| abstract_inverted_index.deploying | 30 |
| abstract_inverted_index.detection | 76, 123, 128 |
| abstract_inverted_index.essential | 45 |
| abstract_inverted_index.increased | 14 |
| abstract_inverted_index.initially | 89, 133 |
| abstract_inverted_index.subjected | 119 |
| abstract_inverted_index.Artificial | 7 |
| abstract_inverted_index.S‐Fuzzy. | 84 |
| abstract_inverted_index.Therefore, | 35 |
| abstract_inverted_index.authority. | 112 |
| abstract_inverted_index.controller | 87 |
| abstract_inverted_index.detection. | 168 |
| abstract_inverted_index.increasing | 192 |
| abstract_inverted_index.prediction | 58 |
| abstract_inverted_index.prevailing | 53 |
| abstract_inverted_index.registered | 90 |
| abstract_inverted_index.successful | 47 |
| abstract_inverted_index.technology | 5 |
| abstract_inverted_index.Thereafter, | 137 |
| abstract_inverted_index.extraction. | 147 |
| abstract_inverted_index.prioritized | 181 |
| abstract_inverted_index.processing. | 65 |
| abstract_inverted_index.significant | 27 |
| abstract_inverted_index.Intelligence | 8 |
| abstract_inverted_index.application. | 100 |
| abstract_inverted_index.controller's | 111, 116 |
| abstract_inverted_index.integration. | 49 |
| abstract_inverted_index.verification | 80 |
| abstract_inverted_index.Subsequently, | 148 |
| abstract_inverted_index.cloud‐based | 60 |
| abstract_inverted_index.preprocessed. | 136 |
| abstract_inverted_index.verification, | 190 |
| abstract_inverted_index.LADA‐C‐RNN | 82 |
| abstract_inverted_index.RCA‐assisted | 74 |
| abstract_inverted_index.LADA‐C‐RNN, | 164 |
| abstract_inverted_index.prioritization. | 178 |
| abstract_inverted_index.infrastructures. | 34 |
| cited_by_percentile_year | |
| countries_distinct_count | 3 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.16011305 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |