Research Article
A Stacked Deep Learning Approach for IoT Cyberattack Detection
Figure 5
Convergence of the meta-algorithm during the training. Subfigure (a) shows the accuracy against the number of epochs, while subfigure (b) shows the loss against the number of epochs.
(a) |
(b) |