Results 1 to 10 of about 307,816 (329)

Machine learning for Internet of things anomaly detection under low-quality data

open access: yesInternational Journal of Distributed Sensor Networks, 2022
With the popularization of Internet of things, its network security has aroused widespread concern. Anomaly detection is one of the important technologies to protect network security.
Shangbin Han, Qianhong Wu, Yang Yang
doaj   +1 more source

Anomaly Detection of Hyperspectral Images Based on Transformer With Spatial–Spectral Dual-Window Mask

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2023
Anomaly detection has become one of the crucial tasks in hyperspectral images processing. However, most deep learning-based anomaly detection methods often suffer from the incapability of utilizing spatial–spectral information, which decreases the
Song Xiao   +5 more
doaj   +1 more source

Comparative Analysis of Anomaly Detection Techniques Using Generative Adversarial Network

open access: yesSir Syed University Research Journal of Engineering and Technology, 2023
Anomaly detection in a piece of data is a challenging task. Researchers use different approaches to classify data as anomalous. These include traditional, supervised, unsupervised, and semi-supervised techniques.
Imran Ullah Khan   +4 more
doaj  

Hyperspectral Anomaly Detection Method Based on Low Rank Total Variation Regu-larization

open access: yesJisuanji kexue yu tansuo, 2020
Hyperspectral remote sensing technology provides abundant spectral information for exploring objects and supplies a better data source for anomaly detection.
XU Chao, ZHAN Tianming
doaj   +1 more source

A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data. [PDF]

open access: yesPLoS ONE, 2016
Anomaly detection is the process of identifying unexpected items or events in datasets, which differ from the norm. In contrast to standard classification tasks, anomaly detection is often applied on unlabeled data, taking only the internal structure of ...
Markus Goldstein, Seiichi Uchida
doaj   +1 more source

Scalable and Interpretable One-class SVMs with Deep Learning and Random Fourier features

open access: yes, 2018
One-class support vector machine (OC-SVM) for a long time has been one of the most effective anomaly detection methods and extensively adopted in both research as well as industrial applications.
A Zimek   +15 more
core   +1 more source

Deep Predictive Coding Neural Network for RF Anomaly Detection in Wireless Networks

open access: yes, 2018
Intrusion detection has become one of the most critical tasks in a wireless network to prevent service outages that can take long to fix. The sheer variety of anomalous events necessitates adopting cognitive anomaly detection methods instead of the ...
Jauhar, Ahmad   +3 more
core   +1 more source

Traffic Anomaly Detection Algorithm for Wireless Sensor Networks Based on Improved Exploitation of the GM(1,1) Model

open access: yesInternational Journal of Distributed Sensor Networks, 2016
As WSNs gain popularity, they are becoming more and more necessary for traffic anomaly detection. Because worms, attacks, intrusions, and other kinds of malicious behaviors can be recognized by traffic analysis and anomaly detection, WSN traffic anomaly ...
Qin Yu   +3 more
doaj   +1 more source

Utility Analysis about Log Data Anomaly Detection Based on Federated Learning

open access: yesApplied Sciences, 2023
Logs that record system information are managed in anomaly detection, and more efficient anomaly detection methods have been proposed due to their increase in complexity and scale.
Tae-Ho Shin, Soo-Hyung Kim
doaj   +1 more source

Hyperspectral anomaly detection: a performance comparison of existing techniques

open access: yesInternational Journal of Digital Earth, 2022
Anomaly detection in Hyperspectral Imagery (HSI) has received considerable attention because of its potential application in several areas. Numerous anomaly detection algorithms for HSI have been proposed in the literature; however, due to the use of ...
Noman Raza Shah   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy