Sequential Adversarial Anomaly Detection for One-Class Event Data
暂无分享,去创建一个
[1] Xiuyuan Cheng,et al. Neural Spectral Marked Point Processes , 2021, ICLR.
[2] Shuang Li,et al. Imitation Learning of Neural Spatio-Temporal Point Processes , 2021, IEEE Transactions on Knowledge and Data Engineering.
[3] Yasin Yilmaz,et al. Any-Shot Sequential Anomaly Detection in Surveillance Videos , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[4] Yao Xie,et al. Deep Fourier Kernel for Self-Attentive Point Processes , 2020, AISTATS.
[5] Shixiang Zhu,et al. Adversarial Anomaly Detection for Marked Spatio-Temporal Streaming Data , 2019, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Min-hwan Oh,et al. Sequential Anomaly Detection using Inverse Reinforcement Learning , 2019, KDD.
[7] Shixiang Zhu,et al. Spatial-Temporal-Textual Point Processes for Crime Linkage Detection , 2019, 1902.00440.
[8] Le Song,et al. Learning Temporal Point Processes via Reinforcement Learning , 2018, NeurIPS.
[9] Alexander Binder,et al. Deep One-Class Classification , 2018, ICML.
[10] Yao Xie,et al. Crime Event Embedding with Unsupervised Feature Selection , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[11] Utkarsh Upadhyay,et al. Deep Reinforcement Learning of Marked Temporal Point Processes , 2018, NeurIPS.
[12] Truong Thu Huong,et al. Real Time Data-Driven Approaches for Credit Card Fraud Detection , 2018, ICEBA 2018.
[13] Sanjay Chawla,et al. Anomaly Detection using One-Class Neural Networks , 2018, ArXiv.
[14] Yao Xie,et al. Crime Incidents Embedding Using Restricted Boltzmann Machines , 2017, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[15] Alex Reinhart,et al. A Review of Self-Exciting Spatio-Temporal Point Processes and Their Applications , 2017, Statistical Science.
[16] Shenghua Gao,et al. Remembering history with convolutional LSTM for anomaly detection , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).
[17] Le Song,et al. Wasserstein Learning of Deep Generative Point Process Models , 2017, NIPS.
[18] Sanjay Chawla,et al. Robust, Deep and Inductive Anomaly Detection , 2017, ECML/PKDD.
[19] Shuang Li,et al. Detecting Changes in Dynamic Events Over Networks , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[20] Hongyuan Zha,et al. Modeling the Intensity Function of Point Process Via Recurrent Neural Networks , 2017, AAAI.
[21] M. Pushpa,et al. Analysis on credit card fraud identification techniques based on KNN and outlier detection , 2017, 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).
[22] Jason Eisner,et al. The Neural Hawkes Process: A Neurally Self-Modulating Multivariate Point Process , 2016, NIPS.
[23] F. Lillo,et al. Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. , 2016, Physical Review E.
[24] Utkarsh Upadhyay,et al. Recurrent Marked Temporal Point Processes: Embedding Event History to Vector , 2016, KDD.
[25] Lovekesh Vig,et al. LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection , 2016, ArXiv.
[26] Lance Sherry,et al. Anomaly detection in aircraft data using Recurrent Neural Networks (RNN) , 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS).
[27] Yoshua Bengio,et al. A Recurrent Latent Variable Model for Sequential Data , 2015, NIPS.
[28] Tong Wang,et al. Finding Patterns with a Rotten Core: Data Mining for Crime Series with Cores , 2015, Big Data.
[29] Ian J. Goodfellow,et al. On distinguishability criteria for estimating generative models , 2014, ICLR.
[30] Alexander J. Smola,et al. Efficient mini-batch training for stochastic optimization , 2014, KDD.
[31] Aaron C. Courville,et al. Generative Adversarial Nets , 2014, NIPS.
[32] Sabine Van Huffel,et al. Detecting rare events using extreme value statistics applied to epileptic convulsions in children , 2014, Artif. Intell. Medicine.
[33] Ameet Talwalkar,et al. Foundations of Machine Learning , 2012, Adaptive computation and machine learning.
[34] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[35] Bernhard Schölkopf,et al. A Kernel Two-Sample Test , 2012, J. Mach. Learn. Res..
[36] David A. Clifton,et al. Novelty Detection with Multivariate Extreme Value Statistics , 2011, J. Signal Process. Syst..
[37] Lăcrămioara Bălan,et al. Credit card Fraud , 2011, Plant Molecular Biology Reporter.
[38] Y. Sahin,et al. Detecting credit card fraud by ANN and logistic regression , 2011, 2011 International Symposium on Innovations in Intelligent Systems and Applications.
[39] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[40] Anind K. Dey,et al. Maximum Entropy Inverse Reinforcement Learning , 2008, AAAI.
[41] Jianmin Jiang,et al. One class support vector machine for anomaly detection in the communication network performance data , 2007 .
[42] Robert E. Schapire,et al. A Game-Theoretic Approach to Apprenticeship Learning , 2007, NIPS.
[43] Benjamin Recht,et al. Random Features for Large-Scale Kernel Machines , 2007, NIPS.
[44] Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[45] Pieter Abbeel,et al. Apprenticeship learning via inverse reinforcement learning , 2004, ICML.
[46] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[47] J. Corcoran. Modelling Extremal Events for Insurance and Finance , 2002 .
[48] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[49] Yoshua Bengio,et al. Convolutional networks for images, speech, and time series , 1998 .
[50] S. Hochreiter,et al. Long Short-Term Memory , 1997, Neural Computation.
[51] D. Siegmund. Sequential Analysis: Tests and Confidence Intervals , 1985 .
[52] A. Hawkes. Spectra of some self-exciting and mutually exciting point processes , 1971 .
[53] W. Rudin,et al. Fourier Analysis on Groups. , 1965 .
[54] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[55] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[56] Yibo Wang,et al. Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud , 2018, Decis. Support Syst..
[57] Abhinav Srivastava,et al. Credit Card Fraud Detection Using Hidden Markov Model , 2008, IEEE Transactions on Dependable and Secure Computing.
[58] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[59] George Karypis,et al. A Comparison of Document Clustering Techniques , 2000 .
[60] Andrew Y. Ng,et al. Pharmacokinetics of a novel formulation of ivermectin after administration to goats , 2000, ICML.
[61] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.