A review of novelty detection
Novelty detection is the task of classifying test data that differ in some respect from the data
that are available during training. This may be seen as “one-class classification”, in which a …
that are available during training. This may be seen as “one-class classification”, in which a …
[書籍][B] An introduction to outlier analysis
CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …
mining and statistics literature. In most applications, the data is created by one or more …
Convolutional prototype network for open set recognition
Despite the success of convolutional neural network (CNN) in conventional closed-set
recognition (CSR), it still lacks robustness for dealing with unknowns (those out of known …
recognition (CSR), it still lacks robustness for dealing with unknowns (those out of known …
There and back again: Outlier detection between statistical reasoning and data mining algorithms
Outlier detection has been a topic in statistics for centuries. Over mainly the last two
decades, there has been also an increasing interest in the database and data mining …
decades, there has been also an increasing interest in the database and data mining …
Anomaly detection: A survey
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …
research areas and application domains. Many anomaly detection techniques have been …
[PDF][PDF] Outlier detection: A survey
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct map** between outliers in data and …
several application domains have realized the direct map** between outliers in data and …
Online extremism detection: A systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools
Social media platforms are popular for expressing personal views, emotions and beliefs.
Social media platforms are influential for propagating extremist ideologies for group …
Social media platforms are influential for propagating extremist ideologies for group …
[HTML][HTML] Root cause attribution of delivery risks via causal discovery with reinforcement learning
S Bo, M **ao - Algorithms, 2024 - mdpi.com
Managing delivery risks is a critical challenge in modern supply chain management due to
the increasing complexity and interdependencies of global supply networks. Existing …
the increasing complexity and interdependencies of global supply networks. Existing …
Anomaly detection methods for categorical data: A review
Anomaly detection has numerous applications in diverse fields. For example, it has been
widely used for discovering network intrusions and malicious events. It has also been used …
widely used for discovering network intrusions and malicious events. It has also been used …
A systematic literature review on outlier detection in wireless sensor networks
A wireless sensor network (WSN) is defined as a set of spatially distributed and
interconnected sensor nodes. WSNs allow one to monitor and recognize environmental …
interconnected sensor nodes. WSNs allow one to monitor and recognize environmental …