Deep Structured Cross-Modal Anomaly Detection
暂无分享,去创建一个
Xia Hu | Jundong Li | Mengnan Du | Ninghao Liu | Yuening Li
[1] Jundong Li,et al. SpecAE: Spectral AutoEncoder for Anomaly Detection in Attributed Networks , 2019, CIKM.
[2] Qingquan Song,et al. Graph Recurrent Networks With Attributed Random Walks , 2019, KDD.
[3] Hongxia Yang,et al. Is a Single Vector Enough?: Exploring Node Polysemy for Network Embedding , 2019, KDD.
[4] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[5] Liwei Wang,et al. Learning Two-Branch Neural Networks for Image-Text Matching Tasks , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Dinggang Shen,et al. Collaborative Multi-View Denoising , 2016, KDD.
[7] Yu Cheng,et al. Deep Structured Energy Based Models for Anomaly Detection , 2016, ICML.
[8] Yin Li,et al. Learning Deep Structure-Preserving Image-Text Embeddings , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[9] Charu C. Aggarwal,et al. Heterogeneous Network Embedding via Deep Architectures , 2015, KDD.
[10] Jingrui He,et al. MUVIR: Multi-View Rare Category Detection , 2015, IJCAI.
[11] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[12] Tomoharu Iwata,et al. Clustering-based anomaly detection in multi-view data , 2013, CIKM.
[13] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[14] Quoc V. Le,et al. Exploiting Similarities among Languages for Machine Translation , 2013, ArXiv.
[15] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] Deepak S. Turaga,et al. A Spectral Framework for Detecting Inconsistency across Multi-source Object Relationships , 2011, 2011 IEEE 11th International Conference on Data Mining.
[17] Juhan Nam,et al. Multimodal Deep Learning , 2011, ICML.
[18] Dieter Fox,et al. A large-scale hierarchical multi-view RGB-D object dataset , 2011, 2011 IEEE International Conference on Robotics and Automation.
[19] Hugo Larochelle,et al. Efficient Learning of Deep Boltzmann Machines , 2010, AISTATS.
[20] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[21] Shotaro Akaho,et al. A kernel method for canonical correlation analysis , 2006, ArXiv.
[22] Chein-I Chang,et al. Anomaly detection and classification for hyperspectral imagery , 2002, IEEE Trans. Geosci. Remote. Sens..
[23] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[24] Colin Fyfe,et al. Kernel and Nonlinear Canonical Correlation Analysis , 2000, IJCNN.
[25] José R. Dorronsoro,et al. Neural fraud detection in credit card operations , 1997, IEEE Trans. Neural Networks.
[26] Ming Shao,et al. Multi-View Low-Rank Analysis for Outlier Detection , 2015, SDM.
[27] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[28] Qiuping Xu. Canonical correlation Analysis , 2014 .
[29] Nikolaos G. Bourbakis,et al. A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[30] H. Abdi. Partial Least Square Regression PLS-Regression , 2007 .
[31] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .