GAN-based anomaly detection: A review

X **a, X Pan, N Li, X He, L Ma, X Zhang, N Ding - Neurocomputing, 2022 - Elsevier
Supervised learning algorithms have shown limited use in the field of anomaly detection due
to the unpredictability and difficulty in acquiring abnormal samples. In recent years …

A unifying review of deep and shallow anomaly detection

L Ruff, JR Kauffmann, RA Vandermeulen… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Deep learning approaches to anomaly detection (AD) have recently improved the state of
the art in detection performance on complex data sets, such as large collections of images or …

A survey of machine unlearning

TT Nguyen, TT Huynh, Z Ren, PL Nguyen… - arxiv preprint arxiv …, 2022 - arxiv.org
Today, computer systems hold large amounts of personal data. Yet while such an
abundance of data allows breakthroughs in artificial intelligence, and especially machine …

Remember what you want to forget: Algorithms for machine unlearning

A Sekhari, J Acharya, G Kamath… - Advances in Neural …, 2021 - proceedings.neurips.cc
We study the problem of unlearning datapoints from a learnt model. The learner first
receives a dataset $ S $ drawn iid from an unknown distribution, and outputs a model …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Federated unlearning: How to efficiently erase a client in fl?

A Halimi, S Kadhe, A Rawat, N Baracaldo - arxiv preprint arxiv …, 2022 - arxiv.org
With privacy legislation empowering the users with the right to be forgotten, it has become
essential to make a model amenable for forgetting some of its training data. However …

A comprehensive survey of forgetting in deep learning beyond continual learning

Z Wang, E Yang, L Shen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Forgetting refers to the loss or deterioration of previously acquired knowledge. While
existing surveys on forgetting have primarily focused on continual learning, forgetting is a …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

Host-based IDS: A review and open issues of an anomaly detection system in IoT

I Martins, JS Resende, PR Sousa, S Silva… - Future Generation …, 2022 - Elsevier
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …