Artificial Intelligence, Cybersecurity, Vulnerability, Attacks, Machine Learning Share and Cite: Tsahat, C. and , N. (2026) ...
Abstract: In recent years, deep learning has been widely used for human activity recognition (HAR) based on wearable sensor data due to its excellent performance. However, deep learning approaches ...