1. Electroencephalogram-Based Preference Prediction Using Deep Transfer Learning
2. Rui Chen, Shenglin Zhang, Dongwen Li, Yuzhe Zhang, Fangrui Guo, Weibin Meng, Dan Pei, Yuzhi Zhang, Xu Chen, and Yuqing Liu. 2020. Logtransfer: Cross-system log anomaly detection for software systems with transfer learning. In 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE). IEEE, 37–47.
3. A Payload Based Malicious HTTP Traffic Detection Method Using Transfer Semi-Supervised Learning
4. A rapid defense mechanism based on MF-DL for DDoS attack in IPv6 networks;YF CHOU, B YI, XW;Chinese Journal of Computers,2021
5. Andrew P. Moore Dawn M. Cappelli and Randall F. Trzeciak. 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Addison-Wesley Professional.