Domain Anomaly Detection in Machine Perception: A System Architecture and Taxonomy
暂无分享,去创建一个
David Windridge | William J. Christmas | Josef Kittler | Fei Yan | Teófilo Emídio de Campos | John Illingworth | Magda Osman | J. Kittler | F. Yan | David Windridge | W. Christmas | J. Illingworth | M. Osman | T. D. Campos
[1] B. Ripley,et al. Robust Statistics , 2018, Wiley Series in Probability and Statistics.
[2] Deepak Agarwal,et al. Detecting anomalies in cross-classified streams: a Bayesian approach , 2006, Knowledge and Information Systems.
[3] Reda Alhajj,et al. A comprehensive survey of numeric and symbolic outlier mining techniques , 2006, Intell. Data Anal..
[4] Nathalie Japkowicz,et al. A Novelty Detection Approach to Classification , 1995, IJCAI.
[5] Stephen R. Marsland,et al. A tale of two filters-on-line novelty detection , 2002, Proceedings 2002 IEEE International Conference on Robotics and Automation (Cat. No.02CH37292).
[6] W. R. Buckland,et al. Outliers in Statistical Data , 1979 .
[7] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[8] Volker Roth,et al. Kernel Fisher Discriminants for Outlier Detection , 2006, Neural Computation.
[9] Gunnar Rätsch,et al. Constructing Boosting Algorithms from SVMs: An Application to One-Class Classification , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[11] Sanjay Ranka,et al. Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.
[12] Hynek Hermansky,et al. Detection of out-of-vocabulary words in posterior based ASR , 2007, INTERSPEECH.
[13] Paul Helman,et al. A statistically based system for prioritizing information exploration under uncertainty , 1997, IEEE Trans. Syst. Man Cybern. Part A.
[14] Andrew McCallum,et al. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.
[15] Daphna Weinshall,et al. Identification of Novel Classes in Object Class Recognition , 2012, Detection and Identification of Rare Audiovisual Cues.
[16] Tao Xiang,et al. Identifying Rare and Subtle Behaviors: A Weakly Supervised Joint Topic Model , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Symeon Papavassiliou,et al. Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[18] Hynek Hermansky,et al. Posterior-based out of vocabulary word detection in telephone speech , 2009, INTERSPEECH.
[19] Stephen J. Roberts,et al. A Probabilistic Resource Allocating Network for Novelty Detection , 1994, Neural Computation.
[20] Robert P. W. Duin,et al. Data domain description using support vectors , 1999, ESANN.
[21] Martin Meckesheimer,et al. Automatic outlier detection for time series: an application to sensor data , 2007, Knowledge and Information Systems.
[22] Jeff G. Schneider,et al. Detecting anomalous records in categorical datasets , 2007, KDD '07.
[23] Sanjay Chawla,et al. SLOM: a new measure for local spatial outliers , 2006, Knowledge and Information Systems.
[24] Zengyou He,et al. Mining class outliers: concepts, algorithms and applications in CRM , 2004, Expert Syst. Appl..
[25] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[26] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[27] Shin Ando,et al. Clustering Needles in a Haystack: An Information Theoretic Analysis of Minority and Outlier Detection , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[28] Peter J. Rousseeuw,et al. Robust regression and outlier detection , 1987 .
[29] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[30] Daphna Weinshall,et al. Exploiting Object Hierarchy: Combining Models from Different Category Levels , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[31] Germano C. Vasconcelos,et al. Investigating feedforward neural networks with respect to the rejection of spurious patterns , 1995, Pattern Recognit. Lett..
[32] Jianzhong Li,et al. Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree , 2007, ADMA.
[33] Chandan Srivastava,et al. Support Vector Data Description , 2011 .
[34] S. Roberts. Novelty detection using extreme value statistics , 1999 .
[35] Vipin Kumar,et al. Predicting rare classes: can boosting make any weak learner strong? , 2002, KDD.
[36] A. McNeil. Extreme Value Theory for Risk Managers , 1999 .
[37] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[38] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[39] Venkatesh Saligrama,et al. Video Anomaly Identification , 2010, IEEE Signal Processing Magazine.
[40] F. Y. Edgeworth,et al. XLI. On discordant observations , 1887 .
[41] Pierre Baldi,et al. A principled approach to detecting surprising events in video , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[42] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[43] Raymond T. Ng,et al. Distance-based outliers: algorithms and applications , 2000, The VLDB Journal.
[44] David Windridge,et al. Ball event recognition using hmm for automatic tennis annotation , 2010, 2010 IEEE International Conference on Image Processing.
[45] Don R. Hush,et al. A Classification Framework for Anomaly Detection , 2005, J. Mach. Learn. Res..
[46] Peter J. Rousseeuw,et al. Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.
[47] Jiri Matas,et al. Adaptive Parameter Optimization for Real-time Tracking , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[48] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.
[49] William J. Christmas,et al. Ieee Transactions on Pattern Analysis and Machine Intelligence 1 Layered Data Association Using Graph-theoretic Formulation with Application to Tennis Ball Tracking in Monocular Sequences , 2022 .
[50] Lionel Tarassenko,et al. Choosing an appropriate model for novelty detection , 1997 .
[51] J. B. Hampshire,et al. Real-time object classification and novelty detection for collaborative video surveillance , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[52] Ji Zhang,et al. Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance , 2006, Knowledge and Information Systems.
[53] Robert P. W. Duin,et al. Support vector domain description , 1999, Pattern Recognit. Lett..
[54] Hynek Hermansky,et al. Combination of strongly and weakly constrained recognizers for reliable detection of OOVS , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[55] Xin Li,et al. Blind image quality assessment , 2002, Proceedings. International Conference on Image Processing.
[56] Sameer Singh,et al. Novelty detection: a review - part 2: : neural network based approaches , 2003, Signal Process..
[57] Luc Van Gool,et al. Detection and Identification of Rare Audiovisual Cues , 2012, Studies in Computational Intelligence.
[58] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[59] Thomas S. Ferguson,et al. On the Rejection of Outliers , 1961 .
[60] H. Arp. Discordant observations. , 1990, Science.
[61] Eamonn J. Keogh,et al. Finding the most unusual time series subsequence: algorithms and applications , 2006, Knowledge and Information Systems.
[62] Kavé Salamatian,et al. Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.
[63] David Windridge,et al. A Memory Architecture and Contextual Reasoning Framework for Cognitive Vision , 2005, SCIA.
[64] Daphna Weinshall,et al. Beyond Novelty Detection: Incongruent Events, When General and Specific Classifiers Disagree , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[65] Petr Motlícek,et al. The DIRAC AWEAR audio-visual platform for detection of unexpected and incongruent events , 2008, ICMI '08.
[66] Mario Vento,et al. To reject or not to reject: that is the question-an answer in case of neural classifiers , 2000, IEEE Trans. Syst. Man Cybern. Part C.