Research Article

Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System

Figure 3

Performance estimation of the proposed model based on (a) training set size and (b) No. of participants.
(a)
(b)