[1] AKHIL J, SULTANA A. Intelligent network intrusion detection system using data mining techniques[C]//Proceedings of the 2nd International Conference on Applied and Theoretical Computing and Communication Technology. Piscataway:IEEE, 2016:329-333. [2] AHMADI R, MACREDIE R D, TUCKER A. Intrusion detection using transfer learning in machine learning classifiers between non-cloud and cloud datasets[C]//Proceedings of the 2018 International Conference on Intelligent Data Engineering and Automated Learning, LNCS 11314. Berlin:Springer, 2018:556-566. [3] ALJAWARNEH S, ALDWAIRI M, YASSEIN M B. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model[J]. Journal of Computational Science, 2018, 25:152-160. [4] 陈虹,万广雪,肖振久. 基于优化数据处理的深度信念网络模型的入侵检测方法[J]. 计算机应用, 2017, 37(6):1636-1643. (CHEN H, WAN G X, XIAO Z J. Intrusion detection method of deep belief network model based on optimization of data processing[J]. Journal of Computer Applications, 2017, 37(6):1636-1643.) [5] LIU J, HE J, ZHANG W, et al. ANID-SEoKELM:adaptive network intrusion detection based on selective ensemble of kernel ELMs with random features[J]. Knowledge-Based Systems, 2019, 177:104-116. [6] BENMESSAHEL I, XIE K, CHELLAL M, et al. A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization[J]. Evolutionary Intelligence, 2019, 12(2):131-146. [7] Canadian Institute for Cybersecurity, University of New Business. NSL-KDD dataset[DB/OL].[2018-07-20]. https://www.unb.ca/cic/datasets/nsl.html. [8] 汪世义,陶亮,王华彬. 几种机器学习方法在IDS中的性能比较[J]. 计算机仿真, 2010, 27(8):92-94. (WANG S Y, TAO L, WANG H B. Performance comparison of several machine learning methods for intrusion detection[J]. Computer Simulation, 2010, 27(8):92-94.) [9] 刘冬兰,马雷,刘新,等. 基于深度学习的电力大数据融合与异常检测方法[J]. 计算机应用与软件, 2018, 35(4):61-64. (LIU D L, MA L, LIU X, et al. Deep learning based anomaly detection approach for power big data[J]. Computer Applications and Software, 2018, 35(4):61-64.) [10] PAN S J, YANG Q. A survey on transfer learning[J]. IEEE Transactions on Knowledge & Data Engineering, 2010, 22(10):1345-1359. [11] XIAO J, WANG R, TENG G, et al. A transfer learning based classifier ensemble model for customer credit scoring[C]//Proceedings of the 7th International Joint Conference on Computational Sciences and Optimization. Piscataway:IEEE, 2014:64-68. [12] SUN Q, AMIN M, YAN B, et al. Transfer learning for bilingual content classification[C]//Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2015:2147-2156. [13] SHAO L, ZHU F, LI X. Transfer learning for visual categorization:a survey[J]. IEEE Transactions on Neural Networks and Learning Systems, 2015, 26(5):1019-1034. [14] TANG J, ZHAO Z, BEI J, et al. The application of transfer learning on e-commerce recommender systems[C]//Proceedings of the 10th Web Information System and Application Conference. Piscataway:IEEE, 2013:479-482. [15] HUYNH B Q, LI H, GIGER M L. Digital mammographic tumor classification using transfer learning from deep convolutional neural networks[J]. Journal of Medical Imaging, 2016, 3(3):No.034501. [16] ZHAO H, LIU Q, YANG Y. Transfer learning with ensemble of multiple feature representations[C]//Proceedings of the IEEE 16th International Conference on Software Engineering Research, Management and Applications. Piscataway:IEEE, 2018:54-61. [17] DAI W, YANG Q, XUE G, et al. Boosting for transfer learning[C]//Proceedings of the 2007 International Conference on Machine Learning. New York:ACM, 2007:193-200. [18] JAVAID A, NIYAZ Q, SUN W, et al. A deep learning approach for network intrusion detection system[C]//Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). Brussels, Belgium:ICST, 2016:21-26. [19] AMBUSAIDI M A, HE X, NANDA P, et al. Building an intrusion detection system using a filter-based feature selection algorithm[J]. IEEE Transactions on Computers, 2016, 65(10):2986-2998. [20] KABIR E, HU J, WANG H, et al. A novel statistical technique for intrusion detection systems[J]. Future Generation Computer Systems, 2018, 79:303-318. |