暂无分享,去创建一个
[1] Adrian G. Bors,et al. Kernel-based classification using quantum mechanics , 2007, Pattern Recognit..
[2] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[3] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[4] T.Y. Lin,et al. Anomaly detection , 1994, Proceedings New Security Paradigms Workshop.
[5] Monique Snoeck,et al. APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions , 2015, Decis. Support Syst..
[6] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[7] Aidong Zhang,et al. FindOut: Finding Outliers in Very Large Datasets , 2002, Knowledge and Information Systems.
[8] M. Overton. NONSMOOTH OPTIMIZATION VIA BFGS , 2008 .
[9] Assaf Gottlieb,et al. Algorithm for data clustering in pattern recognition problems based on quantum mechanics. , 2001, Physical review letters.
[10] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[11] Sanjay Chawla,et al. Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.
[12] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[13] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[14] David Horn,et al. The Method of Quantum Clustering , 2001, NIPS.
[15] Charu C. Aggarwal,et al. On Abnormality Detection in Spuriously Populated Data Streams , 2005, SDM.
[16] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[17] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[18] Panu Somervuo,et al. Self-organizing maps of symbol strings , 1998, Neurocomputing.
[19] E. Massera,et al. On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario , 2008 .
[20] Minghu Jiang,et al. Analyzing documents with Quantum Clustering: A novel pattern recognition algorithm based on quantum mechanics , 2016, Pattern Recognit. Lett..
[21] Jorge Nocedal,et al. A Limited Memory Algorithm for Bound Constrained Optimization , 1995, SIAM J. Sci. Comput..
[22] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.