Privacy‐preserving multisource transfer learning in intrusion detection system
暂无分享,去创建一个
Bin Luo | Jingjing Guo | Xinghua Li | Mengfan Xu | Yunwei Wang | Xinghua Li | Mengfan Xu | Bin Luo | Jingjing Guo | Yunwei Wang
[1] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.
[2] Jing Li,et al. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption , 2017, Soft Computing.
[3] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[4] Jiawei Han,et al. Knowledge transfer via multiple model local structure mapping , 2008, KDD.
[5] Saeid Nahavandi,et al. Seeded transfer learning for regression problems with deep learning , 2019, Expert Syst. Appl..
[6] Tamir Tassa,et al. Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs , 2019, Artif. Intell..
[7] David Sánchez,et al. Secure and privacy-preserving orchestration and delivery of fog-enabled IoT services , 2019, Ad Hoc Networks.
[8] Ezzeddine Zagrouba,et al. Deep feature learning for soft tissue sarcoma classification in MR images via transfer learning , 2019, Expert Syst. Appl..
[9] Yannis Theodoridis,et al. A general framework for estimating similarity of datasets and decision trees: exploring semantic similarity of decision trees , 2008, SDM.
[10] Ha Young Kim,et al. Improving financial trading decisions using deep Q-learning: Predicting the number of shares, action strategies, and transfer learning , 2019, Expert Syst. Appl..
[11] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[12] Alberto Huertas Celdrán,et al. Resolving privacy-preserving relationships over outsourced encrypted data storages , 2016 .
[13] Hiroyuki Sato,et al. Scalable and secure access control policy update for outsourced big data , 2018, Future Gener. Comput. Syst..
[14] José María de Fuentes,et al. Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things , 2018, Future Gener. Comput. Syst..
[15] Min Ji,et al. CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..
[16] Svetha Venkatesh,et al. A flexible transfer learning framework for Bayesian optimization with convergence guarantee , 2019, Expert Syst. Appl..
[17] Rui Zhang,et al. Verifiable outsourced computation over encrypted data , 2019, Inf. Sci..
[18] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[19] Joseph K. Liu,et al. Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat , 2018, Future Gener. Comput. Syst..
[20] Meike W. Vernooij,et al. Transfer Learning for Image Segmentation by Combining Image Weighting and Kernel Learning , 2019, IEEE Transactions on Medical Imaging.
[21] Zongda Wu,et al. Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud , 2018, Inf. Sci..
[22] Zhangjie Fu,et al. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.
[23] Lichun Li,et al. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data , 2016, IEEE Internet of Things Journal.
[24] Derya Birant,et al. DTreeSim: A new approach to compute decision tree similarity using re-mining , 2017, Turkish J. Electr. Eng. Comput. Sci..
[25] Félix Gómez Mármol,et al. Resolving privacy-preserving relationships over outsourced encrypted data storages , 2015, International Journal of Information Security.
[26] Xiaoying Gan,et al. An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.
[27] Walid Barhoumi,et al. An image-based segmentation recommender using crowdsourcing and transfer learning for skin lesion extraction , 2019, Expert Syst. Appl..