Results 291 to 300 of about 2,419,123 (314)
Some of the next articles are maybe not open access.
Deep Optimal Isolation Forest with Genetic Algorithm for Anomaly Detection
Industrial Conference on Data Mining, 2023Anomaly detection is one of the crucial research topics in artificial intelligence, encompassing various fields such as health monitoring, network intrusion detection, and fraud detection in financial transactions.
Haolong Xiang +5 more
semanticscholar +1 more source
Structural Health Monitoring, 2023
This study presented an unsupervised anomaly detection-based framework for distributed damage detection in concrete using ultrasonic response signals. A deep fully connected auto-encoder was employed to reconstruct the ultrasonic response signals.
Vahab Toufigh, Iman Ranjbar
semanticscholar +1 more source
This study presented an unsupervised anomaly detection-based framework for distributed damage detection in concrete using ultrasonic response signals. A deep fully connected auto-encoder was employed to reconstruct the ultrasonic response signals.
Vahab Toufigh, Iman Ranjbar
semanticscholar +1 more source
Fuzzy C-Means-based Isolation Forest
Applied Soft Computing, 2021Abstract The problem of finding anomalies (outliers) in databases is one of the most important issues in modern data analysis. One of the reasons is the occurrence of this issue in almost every type of database, including numerical, categorical, time, mixed, or graphic data.
Paweł Karczmarek +3 more
openaire +1 more source
IEEE Transactions on Instrumentation and Measurement
The increasing complexity and varying operational conditions of today’s rotating machinery present significant challenges for automated fault diagnosis.
Yaqiong Lv +5 more
semanticscholar +1 more source
The increasing complexity and varying operational conditions of today’s rotating machinery present significant challenges for automated fault diagnosis.
Yaqiong Lv +5 more
semanticscholar +1 more source
IEEE Access
Aiming at the existing user abnormal electricity consumption detection methods that have the problem of difficult classification of user similar electricity consumption patterns, this paper proposes an unsupervised isolation forest abnormal electricity ...
Jianyuan Wang, Xiaoyao Li
semanticscholar +1 more source
Aiming at the existing user abnormal electricity consumption detection methods that have the problem of difficult classification of user similar electricity consumption patterns, this paper proposes an unsupervised isolation forest abnormal electricity ...
Jianyuan Wang, Xiaoyao Li
semanticscholar +1 more source
Anomaly Detection Based on Isolated Forests
2021Anomaly detection plays an important role in big data, which deals with high dimensional data effectively and quickly. In this paper is going to propose an anomaly detection method based on isolated forests. In the proposed method, the original data set is divided into different initial static blocks to calculate the intra-block density and mean ...
Jun-Liang Li +5 more
openaire +1 more source
Enhancing Network Security: Leveraging Isolation Forest for Malware Detection
2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT)In this work it has been shown that the growth of computer attacks continues to advance constantly, as well as the large number of vulnerability detection and protection tools that exist, therefore, not protecting a computer system allows easy access by ...
Janardan Pawar +5 more
semanticscholar +1 more source
An Ensemble Framework for Network Anomaly Detection Using Isolation Forest and Autoencoders
2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS)In today's digitally interconnected world, securing computer networks against potential threats is of utmost importance integrity and confidentiality of sensitive information are some of the integral concerns when securing the networks from malicious ...
M. G +4 more
semanticscholar +1 more source
Isolation Forest Algorithm Against UAV’s GPS Spoofing Attack
2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on CybermaticsNowadays, Unmanned Aerial Vehicle (UAV) platforms are a valuable source of data for inspection, surveillance, mapping, and 3D modeling issues. Embedded electronic and communication systems within UAVs are based on the integration of the Internet of ...
Ahmed Burhan Mohammed +2 more
semanticscholar +1 more source
Anomaly Detection in Streaming Data using Isolation Forest
2024 Seventh International Women in Data Science Conference at Prince Sultan University (WiDS PSU)In the era of constant data generation and exchange, the concept of data streams, which entails the rapid and organized transmission of vast volumes of data online, has become prevalent.
Mohammed Shaker Kareem +1 more
semanticscholar +1 more source

