“…The main objective of TL is to utilize the knowledge from the source, i.e., D S and T S , to improve the learning process of the target task, i.e., learn f T (.). Based on the availability of labeled data and the difference among D S , T S , D T , and T T , TL can be classified into inductive (D S = D T , T S = T T , labeled target data), transductive (D S = D T , T S = T T , labeled source data), and unsupervised TL (unlabeled target and source data) [6], [36], [37]. With the precious properties in inheriting knowledge from bigger source, TL has been widely applied in various sections especially in cybersecurity to detect cyberattack in IoT network [6], [23], [38].…”