Anomaly detection methods for categorical data: A review
Anomaly detection has numerous applications in diverse fields. For example, it has been
widely used for discovering network intrusions and malicious events. It has also been used …
widely used for discovering network intrusions and malicious events. It has also been used …
Detection of outliers
We present an overview of the major developments in the area of detection of outliers.
These include projection pursuit approaches as well as Mahalanobis distance‐based …
These include projection pursuit approaches as well as Mahalanobis distance‐based …
A deep-learned embedding technique for categorical features encoding
MK Dahouda, I Joe - IEEE Access, 2021 - ieeexplore.ieee.org
Many machine learning algorithms and almost all deep learning architectures are incapable
of processing plain texts in their raw form. This means that their input to the algorithms must …
of processing plain texts in their raw form. This means that their input to the algorithms must …
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
Over the last three decades, Network Intrusion Detection Systems (NIDSs), particularly,
Anomaly Detection Systems (ADSs), have become more significant in detecting novel …
Anomaly Detection Systems (ADSs), have become more significant in detecting novel …
Similarity encoding for learning with dirty categorical variables
For statistical learning, categorical variables in a table are usually considered as discrete
entities and encoded separately to feature vectors, eg, with one-hot encoding.“Dirty” non …
entities and encoded separately to feature vectors, eg, with one-hot encoding.“Dirty” non …
Multi-pie
A close relationship exists between the advancement of face recognition algorithms and the
availability of face databases varying factors that affect facial appearance in a controlled …
availability of face databases varying factors that affect facial appearance in a controlled …
A multi-level intrusion detection method for abnormal network behaviors
Abnormal network traffic analysis has become an increasingly important research topic to
protect computing infrastructures from intruders. Yet, it is challenging to accurately discover …
protect computing infrastructures from intruders. Yet, it is challenging to accurately discover …
Novelty detection in data streams
In massive data analysis, data usually come in streams. In the last years, several studies
have investigated novelty detection in these data streams. Different approaches have been …
have investigated novelty detection in these data streams. Different approaches have been …
Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT
Over the past few years, Internet of Things security has attracted the attention of many
researchers due to its challenging and constrained nature. Particularly in the development of …
researchers due to its challenging and constrained nature. Particularly in the development of …
Multimodal deep representation learning for video classification
Real-world applications usually encounter data with various modalities, each containing
valuable information. To enhance these applications, it is essential to effectively analyze all …
valuable information. To enhance these applications, it is essential to effectively analyze all …