2018
DOI: 10.1109/access.2018.2830661
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
178
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 506 publications
(210 citation statements)
references
References 125 publications
0
178
0
1
Order By: Relevance
“…For that reason, "properly controlling or regularizing the training is key to outof-sample generalization" (Zhang et al 2018). • Deep learning As Hatcher and Yu point out, DL applies "multi-neuron, multi-layer neural networks to perform learning tasks, including regression, classification, clustering, auto-encoding, and others" (Hatcher and Yu 2018). As a specific form of representation learning, which in turn is a specific form of ML, DL is based on artificial neural networks (ANNs) such as convolutional neural networks (CNNs) ).…”
Section: Figmentioning
confidence: 99%
“…For that reason, "properly controlling or regularizing the training is key to outof-sample generalization" (Zhang et al 2018). • Deep learning As Hatcher and Yu point out, DL applies "multi-neuron, multi-layer neural networks to perform learning tasks, including regression, classification, clustering, auto-encoding, and others" (Hatcher and Yu 2018). As a specific form of representation learning, which in turn is a specific form of ML, DL is based on artificial neural networks (ANNs) such as convolutional neural networks (CNNs) ).…”
Section: Figmentioning
confidence: 99%
“…For each state experienced by the agent, it has to remember it and perform an experience replay. The memory contains tuples of state, next state, action, reward and a Boolean value for indicating the termination of the agent [3]. This keeps on going and the agent memorizes the information until the termination happens as in Fig.2.…”
Section: Deep Q Learningmentioning
confidence: 99%
“…There have been accounted for certain situations when the IoT gadgets were not possibly solid to shield their code and information from outside access which in the long run makes the assailant to clone whole gadget or control the product or information. Maybe a couple of the models are the physical security assault when several brilliant traffic light gadgets were harmed by hoodlums who took the SIM cards of gadgets [17,18]. Those SIM cards were later used to make cell phone brings in South Africa alongside a few vehicle crashes at the area and an extra cost to fix the whole framework.…”
Section: Other Threats and Issuesmentioning
confidence: 99%