Bi-Level Rare Temporal Pattern Detection
暂无分享,去创建一个
Yu Cao | Jingrui He | Jae-sun Seo | Dawei Zhou | Jingrui He | Jae-sun Seo | Yu Cao | Dawei Zhou
[1] Araceli Sanchis,et al. Activity Recognition Using Hybrid Generative/Discriminative Models on Home Environments Using Binary Sensors , 2013, Sensors.
[2] Robert Sabourin,et al. A survey of techniques for incremental learning of HMM parameters , 2012, Inf. Sci..
[3] Andrew W. Moore,et al. Active Learning for Anomaly and Rare-Category Detection , 2004, NIPS.
[4] Jiebo Luo,et al. Tackling Mental Health by Integrating Unobtrusive Multimodal Sensing , 2015, AAAI.
[5] Qi Zhang,et al. EM-DD: An Improved Multiple-Instance Learning Technique , 2001, NIPS.
[6] Huan Liu,et al. Unsupervised Streaming Feature Selection in Social Media , 2015, CIKM.
[7] Jun Cheng,et al. A Wearable Smartphone-Based Platform for Real-Time Cardiovascular Disease Detection Via Electrocardiogram Processing , 2010, IEEE Transactions on Information Technology in Biomedicine.
[8] Jingrui He,et al. Nearest-Neighbor-Based Active Learning for Rare Category Detection , 2007, NIPS.
[9] Jingrui He,et al. Rare Category Detection on Time-Evolving Graphs , 2015, 2015 IEEE International Conference on Data Mining.
[10] Richard D. Braatz,et al. Data-driven Methods for Fault Detection and Diagnosis in Chemical Processes , 2000 .
[11] Li Chen,et al. REACH2-Mote: A Range-Extending Passive Wake-Up Wireless Sensor Node , 2015, TOSN.
[12] Wotao Yin,et al. A Block Coordinate Descent Method for Regularized Multiconvex Optimization with Applications to Nonnegative Tensor Factorization and Completion , 2013, SIAM J. Imaging Sci..
[13] Mark Billinghurst,et al. Wearable Devices: New Ways to Manage Information , 1999, Computer.
[14] Thomas G. Dietterich,et al. Solving the Multiple Instance Problem with Axis-Parallel Rectangles , 1997, Artif. Intell..
[15] Baoxin Li,et al. Efficient unsupervised abnormal crowd activity detection based on a spatiotemporal saliency detector , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).
[16] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[17] Zhi-Hua Zhou,et al. Multi-instance learning by treating instances as non-I.I.D. samples , 2008, ICML '09.
[18] L. Baum,et al. Statistical Inference for Probabilistic Functions of Finite State Markov Chains , 1966 .
[19] Rajeev Gandhi,et al. Ganesha: blackBox diagnosis of MapReduce systems , 2010, PERV.
[20] Thomas Hofmann,et al. Support Vector Machines for Multiple-Instance Learning , 2002, NIPS.
[21] Jingrui He,et al. Crowdsourcing via Tensor Augmentation and Completion , 2016, IJCAI.
[22] P. Tseng. Convergence of a Block Coordinate Descent Method for Nondifferentiable Minimization , 2001 .
[23] Jingrui He,et al. Graph-Based Rare Category Detection , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[24] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[25] Jingrui He,et al. MUVIR: Multi-View Rare Category Detection , 2015, IJCAI.
[26] Wan Li,et al. Deal or deceit: detecting cheating in distribution channels , 2014, CIKM.
[27] Eamonn J. Keogh,et al. DTW-D: time series semi-supervised learning from a single example , 2013, KDD.
[28] Jian Tang,et al. Truthful incentive mechanisms for crowdsourcing , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[29] Eamonn J. Keogh,et al. Rare Time Series Motif Discovery from Unbounded Streams , 2014, Proc. VLDB Endow..
[30] Tomás Lozano-Pérez,et al. A Framework for Multiple-Instance Learning , 1997, NIPS.
[31] David J. Hill,et al. Anomaly detection in streaming environmental sensor data: A data-driven modeling approach , 2010, Environ. Model. Softw..
[32] Qiang Ye,et al. Joint resource allocation for WLAN&WCDMA integrated networks based on spectral bandwidth mapping , 2011 .
[33] Charu C. Aggarwal,et al. Outlier Detection for Temporal Data , 2014, Outlier Detection for Temporal Data.
[34] P. Tseng,et al. On the convergence of the coordinate descent method for convex differentiable minimization , 1992 .
[35] Vipin Kumar,et al. Comparative Evaluation of Anomaly Detection Techniques for Sequence Data , 2008, 2008 Eighth IEEE International Conference on Data Mining.