{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:38:19Z","timestamp":1770230299687,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,22]]},"DOI":"10.1109\/isncc62547.2024.10759010","type":"proceedings-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T18:45:16Z","timestamp":1732646716000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Towards an in-Depth Evaluation of the Performance, Suitability and Plausibility of Few-Shot Meta Transfer Learning on An Unknown Out-of-Distribution Cyber-attack Detection"],"prefix":"10.1109","author":[{"given":"Tosin","family":"Ige","sequence":"first","affiliation":[{"name":"The University of Texas at El Paso,Dept. of Computer Science,Texas,USA"}]},{"given":"Christopher","family":"Kiekintveld","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Dept. of Computer Science,Texas,USA"}]},{"given":"Aritran","family":"Piplai","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Dept. of Computer Science,Texas,USA"}]},{"given":"Amy","family":"Wagler","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Dept. of Public Health Science,Texas,USA"}]},{"given":"Olukunle","family":"Kolade","sequence":"additional","affiliation":[{"name":"United State Navy,Office of Naval Research,Pentagon,USA"}]},{"given":"Bolanle","family":"Hafiz Matti","sequence":"additional","affiliation":[{"name":"Palo Alto Networks Inc,Office of Network Security,Texas,USA"}]}],"member":"263","reference":[{"key":"ref1","author":"Adewale","year":"2023","journal-title":"Encoder-decoder based long short-term memory (lstm) model for video captioning"},{"key":"ref2","article-title":"Learning feed-forward one-shot learners","volume":"29","author":"Bertinetto","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref3","article-title":"Forecastpfn: Synthetically-trained zero-shot forecasting","volume":"36","author":"Dooley","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref4","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"International conference on machine learning","author":"Finn","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25942"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AIBThings58340.2023.10292485"},{"key":"ref7","volume-title":"Deep learning-based speech and vision synthesis to improve phishing attack de-tection through a multi-layer adaptive framework","author":"Ige","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/eit60633.2024.10609847"},{"key":"ref9","author":"Ige","year":"2024","journal-title":"An in-depth investigation into the performance of state-of-the-art zero-shot, single-shot, and few-shot learning approaches on an out-of-distribution zero-day malware attack detection"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140202"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.mattod.2023.03.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01472"},{"key":"ref14","first-page":"23103","article-title":"A closer look at few-shot classification again","author":"Luo","year":"2023","journal-title":"International Conference on Machine Learning"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref16","author":"Okomayin","year":"2023","journal-title":"Ambient technology & intelligence"},{"key":"ref17","first-page":"7510","article-title":"Meta variance trans-fer: Learning to augment from the others","volume-title":"International conference on machine learning","author":"Park","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICICACS60521.2024.10498932"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103589"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3582688"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3018506"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00049"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v35.i3.pp1653-1660"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101748"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00450"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102273"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01077"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7491"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"ref30","author":"Yu","year":"2024","journal-title":"A survey on evaluation of out-of-distribution generalization"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110216"}],"event":{"name":"2024 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Washington DC, DC, USA","start":{"date-parts":[[2024,10,22]]},"end":{"date-parts":[[2024,10,25]]}},"container-title":["2024 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10758900\/10758934\/10759010.pdf?arnumber=10759010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:18:48Z","timestamp":1732735128000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10759010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,22]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/isncc62547.2024.10759010","relation":{},"subject":[],"published":{"date-parts":[[2024,10,22]]}}}