{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:55:22Z","timestamp":1742954122907,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319234601"},{"type":"electronic","value":"9783319234618"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23461-8_8","type":"book-chapter","created":{"date-parts":[[2015,8,28]],"date-time":"2015-08-28T08:20:16Z","timestamp":1440750016000},"page":"116-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Robust Representation for Domain Adaptation in Network Security"],"prefix":"10.1007","author":[{"given":"Karel","family":"Bartos","sequence":"first","affiliation":[]},{"given":"Michal","family":"Sofka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,29]]},"reference":[{"key":"8_CR1","first-page":"137","volume":"19","author":"S Ben-David","year":"2007","unstructured":"Ben-David, S., Blitzer, J., Crammer, K., Pereira, F., et al.: Analysis of representations for domain adaptation. Advances in neural information processing systems 19, 137 (2007)","journal-title":"Advances in neural information processing systems"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Blitzer, J., McDonald, R., Pereira, F.: Domain adaptation with structural correspondence learning. In: Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, pp. 120\u2013128. Association for Computational Linguistics (2006)","DOI":"10.3115\/1610075.1610094"},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TKDE.2007.190689","volume":"20","author":"U Brandes","year":"2008","unstructured":"Brandes, U., Delling, D., Gaertler, M., Gorke, R., Hoefer, M., Nikoloski, Z., Wagner, D.: On modularity clustering. IEEE Transactions on Knowledge and Data Engineering 20(2), 172\u2013188 (2008)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"8_CR4","first-page":"1109","volume":"11","author":"G Chechik","year":"2010","unstructured":"Chechik, G., Sharma, V., Shalit, U., Bengio, S.: Large scale online learning of image similarity through ranking. The Journal of Machine Learning Research 11, 1109\u20131135 (2010)","journal-title":"The Journal of Machine Learning Research"},{"key":"8_CR5","first-page":"747","volume":"10","author":"Y Chen","year":"2009","unstructured":"Chen, Y., Garcia, E.K., Gupta, M.R., Rahimi, A., Cazzanti, L.: Similarity-based classification: Concepts and algorithms. The Journal of Machine Learning Research 10, 747\u2013776 (2009)","journal-title":"The Journal of Machine Learning Research"},{"key":"8_CR6","first-page":"551","volume":"7","author":"K Crammer","year":"2006","unstructured":"Crammer, K., Dekel, O., Keshet, J., Shalev-Shwartz, S., Singer, Y.: Online passive-aggressive algorithms. The Journal of Machine Learning Research 7, 551\u2013585 (2006)","journal-title":"The Journal of Machine Learning Research"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Dai, W., Yang, Q., Xue, G.-R., Yu, Y.: Boosting for transfer learning. In: Proceedings of the 24th International Conference on Machine learning, pp. 193\u2013200. ACM (2007)","DOI":"10.1145\/1273496.1273521"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Duan, L., Tsang, I.W., Xu, D.: Domain transfer multiple kernel learning. IEEE Transactions on Pattern Analysis and Machine Intelligence 34(3) (2012)","DOI":"10.1109\/TPAMI.2011.114"},{"key":"8_CR9","unstructured":"Farnham, G., Leune, K.: Tools and standards for cyber threat intelligence projects. Technical report, SANS Institute InfoSec Reading Room, p. 10 (2013)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Gretton, A., Smola, A., Huang, J., Schmittfull, M., Borgwardt, K., Sch\u00f6lkopf, B.: Covariate shift by kernel mean matching. Dataset shift in machine learning (2009)","DOI":"10.7551\/mitpress\/9780262170055.003.0008"},{"key":"8_CR11","unstructured":"Iyer, A., Nath, S., Sarawagi, S.: Maximum mean discrepancy for class ratio estimation: convergence bounds and kernel selection. In: Proceedings of the 31st International Conference on Machine Learning (ICML 2014), pp. 530\u2013538 (2014)"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TPAMI.2010.68","volume":"33","author":"IN Junejo","year":"2011","unstructured":"Junejo, I.N., Dexter, E., Laptev, I., Perez, P.: View-independent action recognition from temporal self-similarities. IEEE Transactions on Pattern Analysis and Machine Intelligence 33(1), 172\u2013185 (2011)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-40261-6_19","volume-title":"Computer Analysis of Images and Patterns","author":"M K\u00f6rner","year":"2013","unstructured":"K\u00f6rner, M., Denzler, J.: Temporal self-similarity for appearance-based action recognition in multi-view setups. In: Wilson, R., Hancock, E., Bors, A., Smith, W. (eds.) CAIP 2013, Part I. LNCS, vol. 8047, pp. 163\u2013171. Springer, Heidelberg (2013)"},{"key":"8_CR14","unstructured":"M\u00fcller, M., Clausen, C.: Transposition-invariant self-similarity matrices. In: Proceedings of the 8th International Conference on Music Information Retrieval (ISMIR), pp. 47\u201350 (2007)"},{"key":"8_CR15","unstructured":"Palatucci, M., Pomerleau, D., Hinton, G.E., Mitchell, T.M.: Zero-shot learning with semantic output codes. In: Advances in Neural Information Processing Systems (NIPS), pp. 1410\u20131418 (2009)"},{"issue":"2","key":"8_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0378-3758(00)00115-4","volume":"90","author":"H Shimodaira","year":"2000","unstructured":"Shimodaira, H.: Improving predictive inference under covariate shift by weighting the log-likelihood function. Journal of statistical planning and inference 90(2), 227\u2013244 (2000)","journal-title":"Journal of statistical planning and inference"},{"key":"8_CR17","unstructured":"Socher, R., Ganjoo, M., Manning, C.D., Ng, A.: Zero-shot learning through cross-modal transfer. In: Advances in Neural Information Processing Systems, pp. 935\u2013943 (2013)"},{"key":"8_CR18","unstructured":"Zhang, K., Sch\u00f6lkopf, B., Muandet, K., Wang, Z.: Domain adaptation under target and conditional shift. In: Dasgupta, S., Mcallester, D. (eds.) Proceedings of the 30th International Conference on Machine Learning (ICML 2013), JMLR Workshop and Conference Proceedings, vol. 28, pp. 819\u2013827 (2013)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23461-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T00:11:24Z","timestamp":1599437484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23461-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319234601","9783319234618"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23461-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}