Your selections:
Autonomous behavior modeling approach for diverse anomaly detection application
- Amar, Muhammad, Wilson, Campbell, Gondal, Iqbal
Coupled attention networks for multivariate time series anomaly detection
- Xia, Feng, Chen, Xin, Yu, Shuo, Hou, Mingliang, Liu, Mujie, You, Linlin
Classification under streaming emerging new classes : A solution using completely-random trees
- Mu, Xin, Ting, Kaiming, Zhou, Zhi-Hua
- Ting, Kaiming, Zhou, Guang, Liu, Fei, Tan, Swee
Half-space mass : a maximally robust and efficient data depth method
- Chen, Bo, Ting, Kaiming, Washio, Takashi, Haffari, Gholamreza
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
Unitary anomaly detection for ubiquitous safety in machine health monitoring
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Isolation-based anomaly detection using nearest-neighbor ensembles
- Bandaragoda, Tharindu, Ting, Kaiming, Albrecht, David, Liu, Fei, Zhu, Ye, Wells, Jonathan
Proposed machine learning techniques for bridge structural health monitoring : a laboratory study
- Noori Hoshyar, Azadeh, Rashidi, Maria, Yu, Yang, Samali, Bijan
A tree-based stacking ensemble technique with feature selection for network intrusion detection
- Rashid, Mamanur, Kamruzzaman, Joarder, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven
LiNearN : A new approach to nearest neighbour density estimator
- Wells, Jonathan, Ting, Kaiming, Washio, Takashi
Anomaly detection on health data
- Samariya, Durgesh, Ma, Jiangang
- Razzak, Imran, Zafar, Khurram, Imran, Muhammad, Xu, Guandong
Defying the gravity of learning curve : A characteristic of nearest neighbour anomaly detectors
- Ting, Kaiming, Washio, Takashi, Wells, Jonathan, Aryal, Sunil
Supervised anomaly detection in uncertain pseudoperiodic data streams
- Ma, Jiangang, Sun, Le, Wang, Hua, Zhang, Yanchun, Aickelin, Uwe
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Deep video anomaly detection : opportunities and challenges
- Ren, Jing, Xia, Feng, Liu, Yemeng, Lee, Ivan
Educational anomaly analytics : features, methods, and challenges
- Guo, Teng, Bai, Xiaomei, Tian, Xue, Firmin, Sally, Xia, Feng
Are you sure you would like to clear your session, including search history and login status?