Enhancing one-class support vector machines for unsupervised anomaly detection
暂无分享,去创建一个
Slim Abdennadher | Markus Goldstein | Mennatallah Amer | S. Abdennadher | Markus Goldstein | Mennatallah Amer | Slim Abdennadher
[1] Uriel J. Carrasquilla. Benchmarking Algorithms for Detecting Anomalies in Large Datasets , 2010 .
[2] Yufeng Liu,et al. Robust Truncated Hinge Loss Support Vector Machines , 2007 .
[3] Bernhard Schölkopf,et al. Support Vector Method for Novelty Detection , 1999, NIPS.
[4] Jirí Benes,et al. On neural networks , 1990, Kybernetika.
[5] Xi-chuan Zhou,et al. Integrating outlier filtering in large margin training , 2011, Journal of Zhejiang University SCIENCE C.
[6] Robert P. W. Duin,et al. Support vector domain description , 1999, Pattern Recognit. Lett..
[7] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[8] Massimiliano Pontil,et al. Support Vector Machines for 3D Object Recognition , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Ralf Herbrich,et al. Adaptive margin support vector machines for classification , 1999 .
[10] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[11] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[12] Boleslaw K. Szymanski,et al. Some Properties of the Gaussian Kernel for One Class Learning , 2007, ICANN.
[13] Hongxing He,et al. Outlier Detection Using Replicator Neural Networks , 2002, DaWaK.
[14] Gajendra P. S. Raghava,et al. Machine learning techniques in disease forecasting: a case study on rice blast prediction , 2006, BMC Bioinformatics.
[15] Thomas M. Breuel,et al. Anomaly detection by combining decision trees and parametric densities , 2008, 2008 19th International Conference on Pattern Recognition.
[16] Wenjian Wang,et al. Determination of the spread parameter in the Gaussian kernel for classification and regression , 2003, Neurocomputing.
[17] M. Kendall. Rank Correlation Methods , 1949 .
[18] P. Laskov,et al. Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines , 2004, Prax. Inf.verarb. Kommun..
[19] Wenjie Hu,et al. Robust Anomaly Detection Using Support Vector Machines , 2003 .
[20] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[21] Faisal Shafait,et al. Distortion Measurement for Automatic Document Verification , 2011, 2011 International Conference on Document Analysis and Recognition.
[22] Clara Pizzuti,et al. Fast Outlier Detection in High Dimensional Spaces , 2002, PKDD.
[23] Chih-Jen Lin,et al. Working Set Selection Using Second Order Information for Training Support Vector Machines , 2005, J. Mach. Learn. Res..
[24] Koby Crammer,et al. Robust Support Vector Machine Training via Convex Outlier Ablation , 2006, AAAI.
[25] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[26] Zengyou He,et al. A Unified Subspace Outlier Ensemble Framework for Outlier Detection , 2005, WAIM.
[27] Sudipto Guha,et al. ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[28] Jesús S. Aguilar-Ruiz,et al. SNN: A Supervised Clustering Algorithm , 2001, IEA/AIE.
[29] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[30] Hans-Peter Kriegel,et al. LoOP: local outlier probabilities , 2009, CIKM.
[31] Federico Girosi,et al. An improved training algorithm for support vector machines , 1997, Neural Networks for Signal Processing VII. Proceedings of the 1997 IEEE Signal Processing Society Workshop.
[32] Eamonn J. Keogh,et al. Approximations to magic: finding unusual medical time series , 2005, 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05).
[33] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[34] M. Amer,et al. Nearest-Neighbor and Clustering based Anomaly Detection Algorithms for RapidMiner , 2012 .
[35] Qing Song,et al. An accelerated decomposition algorithm for robust support vector Machines , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.
[36] Yi Liu,et al. Minimum Enclosing and Maximum Excluding Machine for Pattern Description and Discrimination , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[37] Boleslaw K. Szymanski,et al. FUZZY ROC CURVES FOR THE 1 CLASS SVM: APPLICATION TO INTRUSION DETECTION , 2005 .
[38] Alan L. Yuille,et al. The Concave-Convex Procedure (CCCP) , 2001, NIPS.
[39] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .
[40] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[41] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[42] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[43] William M. Campbell,et al. Phonetic Speaker Recognition with Support Vector Machines , 2003, NIPS.
[44] Jian Tang,et al. Enhancing Effectiveness of Outlier Detections for Low Density Patterns , 2002, PAKDD.
[45] V. Vapnik. Pattern recognition using generalized portrait method , 1963 .
[46] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[47] Yoram Singer,et al. Leveraging the margin more carefully , 2004, ICML.
[48] H. Hotelling. Relations Between Two Sets of Variates , 1936 .
[49] Mubarak Shah,et al. Learning object motion patterns for anomaly detection and improved object detection , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[50] Tong Zhang,et al. Analysis of Multi-stage Convex Relaxation for Sparse Regularization , 2010, J. Mach. Learn. Res..
[51] Anthony K. H. Tung,et al. Ranking Outliers Using Symmetric Neighborhood Relationship , 2006, PAKDD.
[52] Ingo Mierswa,et al. YALE: rapid prototyping for complex data mining tasks , 2006, KDD '06.
[53] Wenjie Hu,et al. Robust support vector machine with bullet hole image classification , 2002 .
[54] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[55] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[56] Andreas Dengel,et al. Histogram-based Outlier Score (HBOS): A fast Unsupervised Anomaly Detection Algorithm , 2012 .
[57] Charu C. Aggarwal,et al. Outlier ensembles: position paper , 2013, SKDD.
[58] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD 2000.
[59] Charu C. Aggarwal,et al. Outlier Analysis , 2013, Springer New York.
[60] Boleslaw K. Szymanski,et al. The unbalanced classification problem: detecting breaches in security , 2006 .