暂无分享,去创建一个
Yuanzhi Huang | Eamonn Ahearne | Szymon Baron | Andrew Parnell | Andrew C. Parnell | E. Ahearne | Yuanzhi Huang | S. Baron
[1] E. Ahearne,et al. An investigation of force components in orthogonal cutting of medical grade cobalt–chromium alloy (ASTM F1537) , 2017, Proceedings of the Institution of Mechanical Engineers. Part H, Journal of engineering in medicine.
[2] Lovekesh Vig,et al. Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.
[3] Hans-Peter Kriegel,et al. A survey on unsupervised outlier detection in high‐dimensional numerical data , 2012, Stat. Anal. Data Min..
[4] Subutai Ahmad,et al. Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.
[5] B. Rosner. Percentage Points for a Generalized ESD Many-Outlier Procedure , 1983 .
[6] M. Stephens. EDF Statistics for Goodness of Fit and Some Comparisons , 1974 .
[7] Subutai Ahmad,et al. Evaluating Real-Time Anomaly Detection Algorithms -- The Numenta Anomaly Benchmark , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[8] Jongwon Kim,et al. Real-Time Tool Breakage Monitoring for NC Milling Process , 1995 .
[9] Douglas C. Montgomery,et al. Introduction to Statistical Quality Control , 1986 .
[10] Moneer Helu,et al. Towards a generalized energy prediction model for machine tools. , 2017, Journal of manufacturing science and engineering.
[11] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[12] W. J. Dixon,et al. Processing Data for Outliers , 1953 .
[13] Sung-Hoon Ahn,et al. Condition monitoring and fault detection of wind turbines and related algorithms: A review , 2009 .
[14] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[15] R. Dennis Cook,et al. Detection of Influential Observation in Linear Regression , 2000, Technometrics.
[16] Kwang-Ho Ro,et al. Outlier detection for high-dimensional data , 2015 .
[17] Jin Zhang. Powerful goodness‐of‐fit tests based on the likelihood ratio , 2002 .
[18] B. Silverman,et al. Algorithm AS 176: Kernel Density Estimation Using the Fast Fourier Transform , 1982 .
[19] Douglas C. Montgomery,et al. An Overview of Six Sigma , 2008 .
[20] Damien McParland,et al. Prediction of tool-wear in turning of medical grade cobalt chromium molybdenum alloy (ASTM F75) using non-parametric Bayesian models , 2016, J. Intell. Manuf..
[21] Adrian E. Raftery,et al. Prediction under Model Uncertainty Via Dynamic Model Averaging : Application to a Cold Rolling Mill 1 , 2008 .
[22] John D. Kelleher,et al. Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies , 2015 .
[23] Hans-Peter Kriegel,et al. Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection , 2012, Data Mining and Knowledge Discovery.
[24] Roger M. Sauter,et al. Introduction to Statistical Quality Control (2nd ed.) , 1992 .
[25] H. Leon Harter,et al. Tables of Range and Studentized Range , 1960 .
[26] J. E. Jackson,et al. Control Procedures for Residuals Associated With Principal Component Analysis , 1979 .
[27] Romero-Troncoso René de Jesús,et al. Driver current analysis for sensorless tool breakage monitoring of CNC milling machines , 2003 .
[28] Ibrahim N. Tansel,et al. Micro-end-milling—III. Wear estimation and tool breakage detection using acoustic emission signals , 1998 .
[29] Brigid Mullany,et al. High Performance Cutting (HPC) in the New Era of Digital Manufacturing – A Roadmap , 2016 .
[30] Douglas M. Hawkins,et al. The Detection of Errors in Multivariate Data Using Principal Components , 1974 .
[31] H. Shao,et al. A cutting power model for tool wear monitoring in milling , 2004 .
[32] Tengyao Wang,et al. High dimensional change point estimation via sparse projection , 2016, 1606.06246.
[33] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[34] Martin Meckesheimer,et al. Automatic outlier detection for time series: an application to sensor data , 2007, Knowledge and Information Systems.
[35] Yusuf Altintas,et al. In-Process Detection of Tool Failure in Milling Using Cutting Force Models , 1989 .
[36] Adam G. Rehorn,et al. State-of-the-art methods and results in tool condition monitoring: a review , 2005 .
[37] Hongxing He,et al. Outlier Detection Using Replicator Neural Networks , 2002, DaWaK.
[38] L. Scrucca,et al. qcc: An R package for quality control charting and statistical process control , 2004 .
[39] Lon-Mu Liu,et al. Joint Estimation of Model Parameters and Outlier Effects in Time Series , 1993 .
[40] Leonard J. Tashman,et al. Out-of-sample tests of forecasting accuracy: an analysis and review , 2000 .
[41] Arun Kejariwal,et al. A Novel Technique for Long-Term Anomaly Detection in the Cloud , 2014, HotCloud.
[42] Kien A. Hua,et al. Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.
[43] Jin Jiang,et al. Erratum to: State-of-the-art methods and results in tool condition monitoring: a review , 2005 .
[44] Keith Worden,et al. DAMAGE DETECTION USING OUTLIER ANALYSIS , 2000 .
[45] Jon Rigelsford,et al. Manufacturing Automation: Metal Cutting Mechanics, Machine Tool Vibrations, and CNC Design , 2004 .
[46] Jacob Anhøj,et al. qicharts2: Quality Improvement Charts for R , 2018, J. Open Source Softw..
[47] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[48] Qiang Chen,et al. An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems , 2001 .
[49] Xue-wen Chen,et al. Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.
[50] Arun Kejariwal,et al. Automatic Anomaly Detection in the Cloud Via Statistical Learning , 2017, ArXiv.
[51] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[52] Charu C. Aggarwal,et al. Outlier Detection for Temporal Data: A Survey , 2014, IEEE Transactions on Knowledge and Data Engineering.
[53] Hervé Debar,et al. An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.