Exploring High-Order Correlations for Industry Anomaly Detection
暂无分享,去创建一个
Rongrong Ji | Yue Gao | Nan Wang | Zizhao Zhang | Quan Miao | Xibin Zhao | Yue Gao | Nan Wang | Zizhao Zhang | Rongrong Ji | Xibin Zhao | Quan Miao
[1] Zhi-Hua Zhou,et al. Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[2] Athanasios Voulodimos,et al. Bayesian filter based behavior recognition in workflows allowing for user feedback , 2012, Comput. Vis. Image Underst..
[3] A. Asuncion,et al. UCI Machine Learning Repository, University of California, Irvine, School of Information and Computer Sciences , 2007 .
[4] Arindam Banerjee,et al. Semi-supervised Clustering by Seeding , 2002, ICML.
[5] Feiping Nie,et al. Detecting Coherent Groups in Crowd Scenes by Multiview Clustering , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Toby P. Breckon,et al. GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training , 2018, ACCV.
[7] Yanchun Zhang,et al. Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams , 2016, ACM Trans. Internet Techn..
[8] Qian Du,et al. GETNET: A General End-to-End 2-D CNN Framework for Hyperspectral Image Change Detection , 2019, IEEE Transactions on Geoscience and Remote Sensing.
[9] Khalid Benabdeslem,et al. Local-to-Global Unsupervised Anomaly Detection from Temporal Data , 2017, PAKDD.
[10] Walid G. Morsi,et al. Fault Detection and Classification Based on Co-training of Semisupervised Machine Learning , 2018, IEEE Transactions on Industrial Electronics.
[11] Xiao-Yuan Jing,et al. Label propagation based semi-supervised learning for software defect prediction , 2016, Automated Software Engineering.
[12] Daniel Nikovski,et al. Regularized covariance matrix estimation with high dimensional data for supervised anomaly detection problems , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[13] Yang Feng,et al. Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications , 2018, WWW.
[14] Marc Sebban,et al. Efficient Top Rank Optimization with Gradient Boosting for Supervised Anomaly Detection , 2017, ECML/PKDD.
[15] Jayant Kalagnanam,et al. Sparse Gaussian Markov Random Field Mixtures for Anomaly Detection , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).
[16] Jun Zhou,et al. Anomaly Detection with Partially Observed Anomalies , 2018, WWW.
[17] Remus Pusca,et al. Information Fusion With Belief Functions for Detection of Interturn Short-Circuit Faults in Electrical Machines Using External Flux Sensors , 2018, IEEE Transactions on Industrial Electronics.
[18] Jeff Calder,et al. Anomaly Detection and Classification for Streaming Data using PDEs , 2016, SIAM J. Appl. Math..
[19] Xin Li,et al. Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network , 2018, IJCAI.
[20] R. Derakhshani,et al. GETnet: a general framework for evolutionary temporal neural networks , 2005, Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005..
[21] Yuh-Jye Lee,et al. Anomaly detection via over-sampling principal component analysis , 2009 .
[22] Gang Niu,et al. Analysis of Learning from Positive and Unlabeled Data , 2014, NIPS.
[23] Bernhard Schölkopf,et al. Learning with Hypergraphs: Clustering, Classification, and Embedding , 2006, NIPS.
[24] Gang Niu,et al. Convex Formulation for Learning from Positive and Unlabeled Data , 2015, ICML.
[25] Paolo Ferrari,et al. A Method for Anomalies Detection in Real-Time Ethernet Data Traffic Applied to PROFINET , 2018, IEEE Transactions on Industrial Informatics.
[26] S. Siva Prakash,et al. Credit Card Fraud Detection using Adaboost and Majority Voting , 2019 .
[27] OwezarskiPhilippe,et al. Online and Scalable Unsupervised Network Anomaly Detection Method , 2017 .
[28] Luc Van Gool,et al. Cascaded Confidence Filtering for Improved Tracking-by-Detection , 2010, ECCV.
[29] Nikolaos D. Doulamis,et al. Fast and Adaptive Deep Fusion Learning for Detecting Visual Objects , 2012, ECCV Workshops.
[30] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[31] Mario J. Duran,et al. Open-Switch Fault Detection in Five-Phase Induction Motor Drives Using Model Predictive Control , 2018, IEEE Transactions on Industrial Electronics.
[32] Chunjie Zhou,et al. Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems , 2018, IEEE Transactions on Industrial Electronics.
[33] Jun Shang,et al. Recursive Dynamic Transformed Component Statistical Analysis for Fault Detection in Dynamic Processes , 2018, IEEE Transactions on Industrial Electronics.
[34] Fei Tony Liu,et al. Isolation-Based Anomaly Detection , 2012, TKDD.
[35] Xiaoli Li,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. 1 Classification of Energy Consumption in Buildings with Outlier Detection , 2022 .
[36] Michael T. Goodrich,et al. Education forum: Web Enhanced Textbooks , 1998, SIGA.
[37] Theodora A. Varvarigou,et al. IMPROVING MULTI-CAMERA ACTIVITY RECOGNITION BY EMPLOYING NEURAL NETWORK BASED READJUSTMENT , 2012, Appl. Artif. Intell..
[38] Philippe Thomas,et al. Semi-Supervised Learning by Olivier Chapelle, Bernhard Schölkopf, and Alexander Zien (Review) , 2009 .
[39] Zulfiqar Ali,et al. Innovative Method for Unsupervised Voice Activity Detection and Classification of Audio Segments , 2018, IEEE Access.
[40] Xuelong Li,et al. Hierarchical Feature Selection for Random Projection , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[41] Paul Montague,et al. An efficient semi-supervised SVM for anomaly detection , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[42] Jayant Kalagnanam,et al. Multi-task Multi-modal Models for Collective Anomaly Detection , 2017, 2017 IEEE International Conference on Data Mining (ICDM).
[43] Jun Zhou,et al. POSTER: A PU Learning based System for Potential Malicious URL Detection , 2017, CCS.
[44] Nizar Bouguila,et al. Unsupervised Anomaly Intrusion Detection via Localized Bayesian Feature Selection , 2011, 2011 IEEE 11th International Conference on Data Mining.
[45] Ligang Wu,et al. Fault Detection for Underactuated Manipulators Modeled by Markovian Jump Systems , 2016, IEEE Transactions on Industrial Electronics.