{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:02:31Z","timestamp":1743019351828,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030409067"},{"type":"electronic","value":"9783030409074"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-40907-4_24","type":"book-chapter","created":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T20:02:54Z","timestamp":1581537774000},"page":"221-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Domain Adaptation Technique for Deep Learning in Cybersecurity"],"prefix":"10.1007","author":[{"given":"Aryya","family":"Gangopadhyay","sequence":"first","affiliation":[]},{"given":"Iyanuoluwa","family":"Odebode","sequence":"additional","affiliation":[]},{"given":"Yelena","family":"Yesha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,12]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Laskhari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018","DOI":"10.5220\/0006639801080116"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandrac, P., Al-Nemrat, A.A., Venkataraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525\u201341550 (2019)","journal-title":"IEEE Access"},{"issue":"10","key":"24_CR3","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"24_CR4","unstructured":"Raab, C., Schleif, F.-M.: Domain adaptation via low-rank basis approximation. ArXiv, volume=abs\/1907.01343 (2019)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Wu, P., Dietterich, T.G.: Improving SVM accuracy by training on auxiliary data sources. In: Proceedings of the 21st International Conference on Machine Learning. ACM, Banff, July 2004","DOI":"10.1145\/1015330.1015436"},{"key":"24_CR6","unstructured":"Yin, J., Yang, Q., Ni, L.M.: Adaptive temporal radio maps for indoor location estimation. In: Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications, Kauai Island, Hawaii, USA, March 2005"},{"key":"24_CR7","unstructured":"Pan, S.J., Kwok, J.T., Yang, Q., Pan, J.J.: Adaptive localization in a dynamic WiFi environment through multi-view learning. In: Proceedings of the 22nd AAAI Conference on Artificial Intelligence, Vancouver, British Columbia, Canada, pp. 1108\u20131113, July 2007"},{"key":"24_CR8","unstructured":"Zheng, V.W., Yang, Q., Xiang, W., Shen, D.: Transferring localization models over time. In: Proceedings of the 23rd AAAI Conference on Artificial Intelligence, Chicago, Illinois, USA, pp. 1421\u20131426, July 2008"},{"key":"24_CR9","unstructured":"Romero L\u00f3pez, A.: Skin lesion detection from dermoscopic images using convolutional neural networks (2017)"},{"key":"24_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3158369","volume":"52","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Li, W., Ogunbona, P., Xu, D.: Recent advances in transfer learning for cross-dataset visual recognition: a problem-oriented perspective. ACM Comput. Surv. 52, 1\u201338 (2019)","journal-title":"ACM Comput. Surv."},{"key":"24_CR11","unstructured":"Hao, P.: Cross-domain recommender system through tag-based models (2018)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Raab, C., Schleif, F.-M.: Transfer learning for the probabilistic classification vector machine. In: COPA (2018)","DOI":"10.1016\/j.neucom.2019.09.104"},{"issue":"28","key":"24_CR13","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.neucom.2019.02.056","volume":"347","author":"S Mahdavifar","year":"2019","unstructured":"Mahdavifar, S., Ghorbani, A.A.: Application of deep learning to cybersecurity: a survey. Neurocomputing 347(28), 149\u2013176 (2019)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2019 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-40907-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T11:06:18Z","timestamp":1665831978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-40907-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030409067","9783030409074"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-40907-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"OTM Confederated International Conferences \"On the Move to Meaningful Internet Systems\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"otm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.otmconferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}