no code implementations • International Conference on Security and Privacy in Digital Economy 2020 • Ying Zhao, Junjun Chen, Qianling Guo, Jian Teng, Di wu
In the second learning stage, Ot uses the transfer learning method to reconstruct and re-train the model to further improve the detection performance on the specific task.