Detection of Thin Boundaries between Different Types of Anomalies in Outlier Detection Using Enhanced Neural Networks
暂无分享,去创建一个
[1] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[2] Craig E. Wills,et al. Adaptive resource management , 1995, MASCOTS '95. Proceedings of the Third International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[3] Lei Zhang,et al. Abnormal Detection Research Based on Outlier Mining , 2018, 2018 11th International Conference on Intelligent Computation Technology and Automation (ICICTA).
[4] Michael J. Pont,et al. Improving the performance of radial basis function classifiers in condition monitoring and fault diagnosis applications where 'unknown' faults may occur , 2002, Pattern Recognit. Lett..
[5] Xiaojie Li,et al. Outlier Detection Based on the Data Structure , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[6] Abolfazl Toroghi Haghighat,et al. Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps , 2017, KSII Trans. Internet Inf. Syst..
[7] Arthur Zimek,et al. On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study , 2016, Data Mining and Knowledge Discovery.
[8] Yu-Ru Lin,et al. Anomaly detection in spatiotemporal data via regularized non-negative tensor analysis , 2018, Data Mining and Knowledge Discovery.
[9] Gregory F Cooper,et al. Conditional outlier detection for clinical alerting. , 2010, AMIA ... Annual Symposium proceedings. AMIA Symposium.
[10] Rahul Sharma,et al. Parallel Implementation of Niblack’s Binarization Approach on CUDA , 2011 .
[11] Amin Keshavarzi,et al. Analysis and Prediction of Crimes by Clustering and Classification , 2015 .
[12] Mehran Mohsenzadeh,et al. Recognition of Data Records in Semi-structured Web-Pages Using Ontology and chi2 Statistical Distribution , 2008, ADMA.
[13] Malik Yousef,et al. One-Class SVMs for Document Classification , 2002, J. Mach. Learn. Res..
[14] Ji Zhang,et al. Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy , 2009 .
[15] Oliver Schulte,et al. Model-Based Outlier Detection for Object-Relational Data , 2015, 2015 IEEE Symposium Series on Computational Intelligence.
[16] Chang-Tien Lu,et al. Spatial Outlier Detection: A Graph-Based Approach , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).
[17] Charu C. Aggarwal,et al. Outlier Detection for Temporal Data , 2014, Outlier Detection for Temporal Data.
[18] P. Hanson,et al. Spastic paretic hemifacial contracture related to multiple sclerosis: a rare and under-recognized entity , 2017, Acta Neurologica Belgica.
[19] Charu C. Aggarwal,et al. Outlier Analysis , 2013, Springer New York.
[20] M. F. Augusteijn,et al. Neural network classification and novelty detection , 2002 .
[21] Amin Keshavarzi,et al. Efficient cluster head selection using Naïve Bayes classifier for wireless sensor networks , 2017, Wirel. Networks.
[22] Frank Klawonn,et al. A Novel Approach to Noise Clustering for Outlier Detection , 2006, Soft Comput..
[23] Ian Davidson,et al. Discovering Contexts and Contextual Outliers Using Random Walks in Graphs , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[24] Manoj Singh,et al. Outlier detection using divide-and-conquer strategy in density based clustering , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).
[25] Ray J. Frank,et al. The detection of fraud in mobile phone networks , 1996 .
[26] Thomas G. Dietterich,et al. Improving the Performance of Radial Basis Function Networks by Learning Center Locations , 1991, NIPS.
[27] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[28] Shivam Agarwal,et al. Data Mining: Data Mining Concepts and Techniques , 2013, 2013 International Conference on Machine Intelligence and Research Advancement.
[29] Don R. Hush,et al. A Classification Framework for Anomaly Detection , 2005, J. Mach. Learn. Res..
[30] Jarvis D. Haupt,et al. Identifying Outliers in Large Matrices via Randomized Adaptive Compressive Sampling , 2014, IEEE Transactions on Signal Processing.
[31] Colin Campbell,et al. A Linear Programming Approach to Novelty Detection , 2000, NIPS.
[32] Mohiuddin Ahmed,et al. Network traffic analysis based on collective anomaly detection , 2014, 2014 9th IEEE Conference on Industrial Electronics and Applications.
[33] Volker Tresp,et al. Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[34] Yue Zhao,et al. XGBOD: Improving Supervised Outlier Detection with Unsupervised Representation Learning , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[35] Taylor Boyd,et al. Outliers in data envelopment analysis , 2016 .
[36] Lefteris Angelis,et al. Towards an Integrated Platform for Big Data Analysis , 2020, ArXiv.
[37] Ji Zhang,et al. Detecting global outliers from large distributed databases , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[38] Su Yang,et al. Anomaly Detection on Collective Moving Patterns: A Hidden Markov Model Based Solution , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[39] Tapani Raiko,et al. Semi-supervised detection of collective anomalies with an application in high energy particle physics , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).
[40] Durvasula V. L. N. Somayajulu,et al. Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[41] James Theiler,et al. Resampling approach for anomaly detection in multispectral images , 2003, SPIE Defense + Commercial Sensing.
[42] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[43] Leman Akoglu,et al. Explaining anomalies in groups with characterizing subspace rules , 2017, Data Mining and Knowledge Discovery.
[44] Mohamed Limam,et al. A Three-Stage Process to Detect Outliers and False Positives Generated by Intrusion Detection Systems , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[45] Akihiro Yamamoto,et al. Outlier detection using binary decision diagrams , 2017, Data Mining and Knowledge Discovery.
[46] Takehisa Yairi,et al. An approach to spacecraft anomaly detection problem using kernel feature space , 2005, KDD '05.
[47] Diane J. Cook,et al. Graph-based anomaly detection , 2003, KDD '03.
[48] Sanjay Ranka,et al. Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.
[49] Abolfazl Toroghi Haghighat,et al. Enhanced time-aware QoS prediction in multi-cloud: a hybrid k-medoids and lazy learning approach (QoPC) , 2019, Computing.
[50] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[51] Sungzoon Cho,et al. Machine learning-based anomaly detection via integration of manufacturing, inspection and after-sales service data , 2017, Ind. Manag. Data Syst..
[52] Sameer Singh,et al. An approach to novelty detection applied to the classification of image regions , 2004, IEEE Transactions on Knowledge and Data Engineering.
[53] Charles R. Farrar,et al. Novelty detection under changing environmental conditions , 2001, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.
[54] Harsh Sadawarti,et al. Comparative Analysis of Outlier Detection Techniques , 2014 .
[55] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[56] J. Hollmen,et al. Residual generation and visualization for understanding novel process conditions , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[57] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[58] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[59] Li Jun,et al. HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[60] A. Pujari. An Efficient Clustering Algorithm for Outlier Detection , 2020 .