The Identification of Secular Variation in IoT Based on Transfer Learning
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Caidan Zhao | Zhibiao Cai | Mingxian Shi | Minmin Huang | M. Guizani | Xiaojiang Du | Minmin Huang | Caidan Zhao | Zhibiao Cai | Mingxian Shi
[1] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[2] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.
[3] Qiang Ji,et al. Constrained Deep Transfer Feature Learning and Its Applications , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] John Langford,et al. Cost-sensitive learning by cost-proportionate example weighting , 2003, Third IEEE International Conference on Data Mining.
[5] Massimiliano Pontil,et al. An Algorithm for Transfer Learning in a Heterogeneous Environment , 2008, ECML/PKDD.
[6] Yoram Singer,et al. Learning to Order Things , 1997, NIPS.
[7] Nando de Freitas,et al. An Introduction to Sequential Monte Carlo Methods , 2001, Sequential Monte Carlo Methods in Practice.
[8] Mohsen Guizani,et al. Stream-based cipher feedback mode in wireless error channel , 2009, IEEE Transactions on Wireless Communications.
[9] Qiang Yang,et al. Heterogeneous Transfer Learning for Image Classification , 2011, AAAI.
[10] 重田 泰. Fraud detection system at game parlor , 2016 .
[11] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[12] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[13] Jialin Pan,et al. Feature-based transfer learning with real-world applications , 2010 .
[14] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[15] Lior Wolf,et al. A theoretical framework for deep transfer learning , 2016 .
[16] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[17] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[18] Michael A. Temple,et al. A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control , 2015, SEC.
[19] Caidan Zhao,et al. Compressed Sensing Based Fingerprint Identification for Wireless Transmitters , 2014, TheScientificWorldJournal.
[20] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.