A review of novelty detection

MAF Pimentel, DA Clifton, L Clifton, L Tarassenko - Signal processing, 2014 - Elsevier
Novelty detection is the task of classifying test data that differ in some respect from the data
that are available during training. This may be seen as “one-class classification”, in which a …

[書籍][B] An introduction to outlier analysis

CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …

Convolutional prototype network for open set recognition

HM Yang, XY Zhang, F Yin, Q Yang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Despite the success of convolutional neural network (CNN) in conventional closed-set
recognition (CSR), it still lacks robustness for dealing with unknowns (those out of known …

There and back again: Outlier detection between statistical reasoning and data mining algorithms

A Zimek, P Filzmoser - Wiley Interdisciplinary Reviews: Data …, 2018 - Wiley Online Library
Outlier detection has been a topic in statistics for centuries. Over mainly the last two
decades, there has been also an increasing interest in the database and data mining …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

[PDF][PDF] Outlier detection: A survey

V Chandola, A Banerjee, V Kumar - ACM Computing Surveys, 2007 - researchgate.net
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct map** between outliers in data and …

Online extremism detection: A systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools

M Gaikwad, S Ahirrao, S Phansalkar, K Kotecha - Ieee Access, 2021 - ieeexplore.ieee.org
Social media platforms are popular for expressing personal views, emotions and beliefs.
Social media platforms are influential for propagating extremist ideologies for group …

[HTML][HTML] Root cause attribution of delivery risks via causal discovery with reinforcement learning

S Bo, M **ao - Algorithms, 2024 - mdpi.com
Managing delivery risks is a critical challenge in modern supply chain management due to
the increasing complexity and interdependencies of global supply networks. Existing …

Anomaly detection methods for categorical data: A review

A Taha, AS Hadi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Anomaly detection has numerous applications in diverse fields. For example, it has been
widely used for discovering network intrusions and malicious events. It has also been used …

A systematic literature review on outlier detection in wireless sensor networks

M Safaei, S Asadi, M Driss, W Boulila, A Alsaeedi… - Symmetry, 2020 - mdpi.com
A wireless sensor network (WSN) is defined as a set of spatially distributed and
interconnected sensor nodes. WSNs allow one to monitor and recognize environmental …