Learning Invariant Representation for Malicious Network Traffic Detection
暂无分享,去创建一个
[1] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[2] Patrick Pérez,et al. View-Independent Action Recognition from Temporal Self-Similarities , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Koby Crammer,et al. Analysis of Representations for Domain Adaptation , 2006, NIPS.
[4] H. Shimodaira,et al. Improving predictive inference under covariate shift by weighting the log-likelihood function , 2000 .
[5] Jaime S. Cardoso,et al. Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2015, Porto, Portugal, September 7-11, 2015, Proceedings, Part III , 2015 .
[6] Qiang Yang,et al. Boosting for transfer learning , 2007, ICML '07.
[7] Justin Tung Ma,et al. Learning to detect malicious URLs , 2011, TIST.
[8] João Gama,et al. Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2015, Porto, Portugal, September 7-11, 2015, Proceedings, Part II , 2015, ECML/PKDD.
[9] John Blitzer,et al. Domain Adaptation with Structural Correspondence Learning , 2006, EMNLP.
[10] Sunita Sarawagi,et al. Maximum Mean Discrepancy for Class Ratio Estimation: Convergence Bounds and Kernel Selection , 2014, ICML.
[11] Hongjun Lu,et al. Cut-and-Pick Transactions for Proxy Log Mining , 2002, EDBT.
[12] Bernhard Schölkopf,et al. Domain Adaptation under Target and Conditional Shift , 2013, ICML.
[13] Ivor W. Tsang,et al. Domain Transfer Multiple Kernel Learning , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Christopher Krügel,et al. Nazca: Detecting Malware Distribution in Large-Scale Networks , 2014, NDSS.
[15] Meinard Müller,et al. Transposition-Invariant Self-Similarity Matrices , 2007, ISMIR.