2020
DOI: 10.1007/978-3-030-38501-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Transfer Learning for Internet of Things Malware Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…The main objective of TL is to utilize the knowledge from the source, i.e., D S and T S , to improve the learning process of the target task, i.e., learn f T (.). Based on the availability of labeled data and the difference among D S , T S , D T , and T T , TL can be classified into inductive (D S = D T , T S = T T , labeled target data), transductive (D S = D T , T S = T T , labeled source data), and unsupervised TL (unlabeled target and source data) [6], [36], [37]. With the precious properties in inheriting knowledge from bigger source, TL has been widely applied in various sections especially in cybersecurity to detect cyberattack in IoT network [6], [23], [38].…”
Section: Transfer Learningmentioning
confidence: 99%
“…The main objective of TL is to utilize the knowledge from the source, i.e., D S and T S , to improve the learning process of the target task, i.e., learn f T (.). Based on the availability of labeled data and the difference among D S , T S , D T , and T T , TL can be classified into inductive (D S = D T , T S = T T , labeled target data), transductive (D S = D T , T S = T T , labeled source data), and unsupervised TL (unlabeled target and source data) [6], [36], [37]. With the precious properties in inheriting knowledge from bigger source, TL has been widely applied in various sections especially in cybersecurity to detect cyberattack in IoT network [6], [23], [38].…”
Section: Transfer Learningmentioning
confidence: 99%