Research Article

A Stacked Deep Learning Approach for IoT Cyberattack Detection

Figure 5

Convergence of the meta-algorithm during the training. Subfigure (a) shows the accuracy against the number of epochs, while subfigure (b) shows the loss against the number of epochs.
(a)
(b)