| [1]Reddy D K K, Nayak J, Behera H S, et al. A systematic literature review on swarm intelligence based intrusion detection system: Past, present and future[J]. Archives of Computational Methods in Engineering, 2024, 31(5): 27172784[2]Abdulganiyu O H, Ait Tchakoucht T, Saheed Y K. A systematic literature review for network intrusion detection system(IDS)[J]. International Journal of Information Security, 2023, 22(5): 11251162[3]翁铜铜, 矫桂娥, 张文俊. 一种融合时空特征的物联网入侵检测方法[J].信息安全研究, 2025, 11(3): 241248[4]王秀玉, 吴晓鸰, 冯永晋. 融合过欠采样与GAN的网络入侵检测方法[J].小型微型计算机系统, 2025, 46(2): 449455[5]Iman M, Arabnia H R, Rasheed K. A review of deep transfer learning and recent advancements[J]. Technologies, 2023, 11(2): 40[6]刘文琪, 胡涛, 闫洁, 等. 基于DeepInsight和迁移学习的入侵检测技术[J].工程科学学报, 2024, 46(12): 22382245[7]Han F, Ye P, Duan S, et al. AdaiD: Active domain adaptation for intrusion detection[C] Proc of the 32nd ACM Int Conf on Multimedia. New York: ACM, 2024: 74047413[8]Wu J, Wang Y, Dai H, et al. Adaptive birecommendation and selfimproving network for heterogeneous domain adaptationassisted IoT intrusion detection[J]. IEEE Internet of Things Journal, 2023, 10(15): 1320513220[9]Chen X, Yin H, Chen Q, et al. Multisource subdomain negative transfer suppression and multiple pseudolabels guidance alignment: A method for fault diagnosis under crossworking conditions[J]. ISA Transactions, 2024, 154: 389406[10]Zhao Y, Han H, Shan S, et al. Deep subdomain alignment for crossdomain image classification[C] Proc of the IEEECVF Winter Conf on Applications of Computer Vision. Piscataway, NJ: IEEE, 2024: 28202829[11]Chen Y, Pan Y, Wang Y, et al. Transferrable contrastive learning for visual domain adaptation[C] Proc of the 29th ACM Int Conf on Multimedia. New York: ACM, 2021: 33993408[12]Li J, Li Z, Lü S. Feature concatenation for adversarial domain adaptation[J]. Expert Systems with Applications, 2021, 169: 114490[13]Liang J, Hu D, Feng J. Do we really need to access the source data? source hypothesis transfer for unsupervised domain adaptation[C] Proc of Int Conf on Machine Learning. New York: PMLR, 2020: 60286039[14]AlShahrani B M M, Quasim M T. Classification of cyberattack using Adaboost regression classifier and securing the network[J]. Turkish Journal of Computer and Mathematics Education, 2021, 12(10): 12151223[15]Zhang H, Li J L, Liu X M, et al. Multidimensional feature fusion and stacking ensemble mechanism for network intrusion detection[J]. Future Generation Computer Systems, 2021, 122: 130143[16]Liu S, Wang B. Optimized modified ResNet18: A residual neural network for high resolution[C] Proc of the 4th IEEE Int Conf on Electronic Technology, Communication and Information (ICETCI). Piscataway, NJ: IEEE, 2024: 15[17]Wang L H, Dai Q, Du T, et al. Lightweight intrusion detection model based on CNN and knowledge distillation[J]. Applied Soft Computing, 2024, 165: 112118 |