Privacy‐preserving multisource transfer learning in intrusion detection system

[1]  Robert H. Deng,et al.  Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.

[2]  Jing Li,et al.  Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption , 2017, Soft Computing.

[3]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[4]  Jiawei Han,et al.  Knowledge transfer via multiple model local structure mapping , 2008, KDD.

[5]  Saeid Nahavandi,et al.  Seeded transfer learning for regression problems with deep learning , 2019, Expert Syst. Appl..

[6]  Tamir Tassa,et al.  Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs , 2019, Artif. Intell..

[7]  David Sánchez,et al.  Secure and privacy-preserving orchestration and delivery of fog-enabled IoT services , 2019, Ad Hoc Networks.

[8]  Ezzeddine Zagrouba,et al.  Deep feature learning for soft tissue sarcoma classification in MR images via transfer learning , 2019, Expert Syst. Appl..

[9]  Yannis Theodoridis,et al.  A general framework for estimating similarity of datasets and decision trees: exploring semantic similarity of decision trees , 2008, SDM.

[10]  Ha Young Kim,et al.  Improving financial trading decisions using deep Q-learning: Predicting the number of shares, action strategies, and transfer learning , 2019, Expert Syst. Appl..

[11]  J. Friedman Greedy function approximation: A gradient boosting machine. , 2001 .

[12]  Alberto Huertas Celdrán,et al.  Resolving privacy-preserving relationships over outsourced encrypted data storages , 2016 .

[13]  Hiroyuki Sato,et al.  Scalable and secure access control policy update for outsourced big data , 2018, Future Gener. Comput. Syst..

[14]  José María de Fuentes,et al.  Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things , 2018, Future Gener. Comput. Syst..

[15]  Min Ji,et al.  CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..

[16]  Svetha Venkatesh,et al.  A flexible transfer learning framework for Bayesian optimization with convergence guarantee , 2019, Expert Syst. Appl..

[17]  Rui Zhang,et al.  Verifiable outsourced computation over encrypted data , 2019, Inf. Sci..

[18]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..

[19]  Joseph K. Liu,et al.  Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat , 2018, Future Gener. Comput. Syst..

[20]  Meike W. Vernooij,et al.  Transfer Learning for Image Segmentation by Combining Image Weighting and Kernel Learning , 2019, IEEE Transactions on Medical Imaging.

[21]  Zongda Wu,et al.  Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud , 2018, Inf. Sci..

[22]  Zhangjie Fu,et al.  Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[23]  Lichun Li,et al.  EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data , 2016, IEEE Internet of Things Journal.

[24]  Derya Birant,et al.  DTreeSim: A new approach to compute decision tree similarity using re-mining , 2017, Turkish J. Electr. Eng. Comput. Sci..

[25]  Félix Gómez Mármol,et al.  Resolving privacy-preserving relationships over outsourced encrypted data storages , 2015, International Journal of Information Security.

[26]  Xiaoying Gan,et al.  An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.

[27]  Walid Barhoumi,et al.  An image-based segmentation recommender using crowdsourcing and transfer learning for skin lesion extraction , 2019, Expert Syst. Appl..