-
161
Low-Cost Active Anomaly Detection with Switching Latency
Published 2021-03-01Subjects: “…anomaly detection…”
Get full text
Article -
162
Event-Based Anomaly Detection for Searches for New Physics
Published 2022-09-01Subjects: “…anomaly detection…”
Get full text
Article -
163
Similarity matrix-based anomaly detection for clinical intervention
Published 2022-06-01“…These computed measures can then be used for anomaly detection, baseline routine computation, and trajectory clustering. …”
Get full text
Article -
164
Autoencoder-Like Knowledge Distillation Network for Anomaly Detection
Published 2023-01-01Subjects: “…Anomaly detection…”
Get full text
Article -
165
Augmenting anomaly detection for autonomous vehicles with symbolic rules
Published 2019Get full text
Thesis -
166
Machine learning for automated anomaly detection in semiconductor manufacturing
Published 2019Get full text
Thesis -
167
-
168
Anomaly Detection in Collider Physics via Factorized Observables
Published 2023“…This goal has motivated the use of machine learning for unsupervised anomaly detection. In this paper, we introduce a new anomaly detection strategy called FORCE: factorized observables for regressing conditional expectations. …”
Get full text
Thesis -
169
Developing Pattern and Anomaly Detection Methods in Influence Campaigns
Published 2023“…This project seeks to expand on the previous work of Group 52 on GIM, incorporating pattern and anomaly detection methods. Several statistical and machine learning methods were applied to a data set of approximately 30,000 news articles from a 2-year period between August 2019 and August 2021. …”
Get full text
Thesis -
170
Anomaly detection in brain connectivity structure : an application to epilepsy
Published 2013Get full text
Thesis -
171
Time series clustering and anomaly detection in the financial markets
Published 2021“…Time series clustering and anomaly detection provide researches with useful domain insights but are also two of the most challenging time series data mining issues. …”
Get full text
Final Year Project (FYP) -
172
An incremental clustering method for anomaly detection in flight data
Published 2022“…Safety is a top priority for civil aviation. New anomaly detection methods, primarily clustering methods, have been developed to monitor pilot operations and detect any risks from such flight data. …”
Get full text
Journal Article -
173
Anomaly detection in smart grids using machine learning
Published 2022“…In this dissertation, anomaly detection strategies based on reinforcement learning (RL) are proposed. …”
Get full text
Thesis-Master by Coursework -
174
Anomaly detection for industrial parts using PatchCore
Published 2022“…The decision of an anomaly detection revolves around a binary problem. This paper will delve into a state-of-the-art method of anomaly detection known as PatchCore and its effectiveness on various datasets. …”
Get full text
Final Year Project (FYP) -
175
Event recognition and anomaly detection using machine learning
Published 2024“…Abnormal event recognition and anomaly detection aim to discover incidents, patterns or objects that do not conform to expected behaviour. …”
Get full text
Thesis-Doctor of Philosophy -
176
Anomaly detection for X-ray of PCB & IC images
Published 2024Get full text
Final Year Project (FYP) -
177
-
178
Anomaly detection using pattern-of-life visual metaphors
Published 2019“…Similar to other anomaly-detection techniques, false positives do exist in our general approach as well. …”
Journal article -
179
Anomaly detection in networks with application to financial transaction networks
Published 2019“…We compare our method with Oddball, a widely used method for anomaly detection in networks, as well as to random classification. …”
Working paper -
180
Packet header anomaly detection using statistical analysis
Published 2014“…The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disputes. …”
Conference or Workshop Item