Privacy-preserving multisource transfer learning in intrusion detection system
- 1 May 2021
- journal article
- research article
- Published by Wiley in Transactions on Emerging Telecommunications Technologies
- Vol. 32 (5)
- https://doi.org/10.1002/ett.3957
Abstract
No abstract availableFunding Information
- National Natural Science Foundation of China (61772173, U1708262, U1736203)
This publication has 27 references indexed in Scilit:
- CCA-secure ABE with outsourced decryption for fog computingFuture Generation Computer Systems, 2018
- XGBoostPublished by Association for Computing Machinery (ACM) ,2016
- Efficient and Privacy-Preserving Outsourced Calculation of Rational NumbersIEEE Transactions on Dependable and Secure Computing, 2016
- EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted DataIEEE Internet of Things Journal, 2015
- Resolving privacy-preserving relationships over outsourced encrypted data storagesInternational Journal of Information Security, 2015
- An empirical comparison of botnet detection methodsComputers & Security, 2014
- Knowledge transfer via multiple model local structure mappingPublished by Association for Computing Machinery (ACM) ,2008
- A general framework for estimating similarity of datasets and decision trees: exploring semantic similarity of decision treesPublished by Society for Industrial & Applied Mathematics (SIAM) ,2008
- Greedy function approximation: A gradient boosting machine.The Annals of Statistics, 2001
- Public-Key Cryptosystems Based on Composite Degree Residuosity ClassesPublished by Springer Science and Business Media LLC ,1999