Research Article
UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities
Table 4
Comparison of the performance of different algorithms.
| ā | Accuracy | Recall | Precision | F1-score | Time (s) |
| FNN | Train | 0.9751 | 0.9518 | 0.9546 | 0.9532 | 228 | Test | 0.9736 | 0.9050 | 0.9142 | 0.9096 |
| CNN | Train | 0.7428 | 0.8370 | 0.6486 | 0.7306 | 337 | Test | 0.7422 | 0.8366 | 0.6481 | 0.7305 |
| RNN | Train | 0.8804 | 0.8455 | 0.8447 | 0.8452 | 410 | Test | 0.8780 | 0.8454 | 0.8447 | 0.8449 |
|
|