1 code implementation • MILCOM 2017 • Juan Zhao, Sachin Shetty, Jan Wei Pan
We evaluated the technique on publicly available datasets, and the results demonstrate the effectiveness of transfer learning to detect new network attacks.
Transfer Learning