Deep learning for anomaly detection: A review

G Pang, C Shen, L Cao, AVD Hengel - ACM computing surveys (CSUR), 2021 - dl.acm.org
Anomaly detection, aka outlier detection or novelty detection, has been a lasting yet active
research area in various research communities for several decades. There are still some …

Survey of machine learning techniques for malware analysis

D Ucci, L Aniello, R Baldoni - Computers & Security, 2019 - Elsevier
Co** with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …

Deep learning-enabled anomaly detection for IoT systems

A Abusitta, GHS de Carvalho, OA Wahab, T Halabi… - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) systems have become an intrinsic technology in various
industries and government services. Unfortunately, IoT devices and networks are known to …

Deep anomaly detection with deviation networks

G Pang, C Shen, A Van Den Hengel - Proceedings of the 25th ACM …, 2019 - dl.acm.org
Although deep learning has been applied to successfully address many data mining
problems, relatively limited work has been done on deep learning for anomaly detection …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks

O Suciu, R Marginean, Y Kaya, H Daume III… - 27th USENIX Security …, 2018 - usenix.org
Recent results suggest that attacks against supervised machine learning systems are quite
effective, while defenses are easily bypassed by new attacks. However, the specifications for …

Learning representations of ultrahigh-dimensional data for random distance-based outlier detection

G Pang, L Cao, L Chen, H Liu - Proceedings of the 24th ACM SIGKDD …, 2018 - dl.acm.org
Learning expressive low-dimensional representations of ultrahigh-dimensional data, eg,
data with thousands/millions of features, has been a major way to enable learning methods …

Shield: Fast, practical defense and vaccination for deep learning using jpeg compression

N Das, M Shanbhogue, ST Chen, F Hohman… - Proceedings of the 24th …, 2018 - dl.acm.org
The rapidly growing body of research in adversarial machine learning has demonstrated
that deep neural networks (DNNs) are highly vulnerable to adversarially generated images …

Analyzing and detecting emerging Internet of Things malware: A graph-based approach

H Alasmary, A Khormali, A Anwar, J Park… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The steady growth in the number of deployed Internet of Things (IoT) devices has been
paralleled with an equal growth in the number of malicious software (malware) targeting …

Weakly supervised anomaly detection: A survey

M Jiang, C Hou, A Zheng, X Hu, S Han… - arxiv preprint arxiv …, 2023 - arxiv.org
Anomaly detection (AD) is a crucial task in machine learning with various applications, such
as detecting emerging diseases, identifying financial frauds, and detecting fake news …