Anomaly detection methods for categorical data: A review

A Taha, AS Hadi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Anomaly detection has numerous applications in diverse fields. For example, it has been
widely used for discovering network intrusions and malicious events. It has also been used …

Detection of outliers

AS Hadi, AHMR Imon, M Werner - Wiley Interdisciplinary …, 2009 - Wiley Online Library
We present an overview of the major developments in the area of detection of outliers.
These include projection pursuit approaches as well as Mahalanobis distance‐based …

A deep-learned embedding technique for categorical features encoding

MK Dahouda, I Joe - IEEE Access, 2021 - ieeexplore.ieee.org
Many machine learning algorithms and almost all deep learning architectures are incapable
of processing plain texts in their raw form. This means that their input to the algorithms must …

The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set

N Moustafa, J Slay - Information Security Journal: A Global …, 2016 - Taylor & Francis
Over the last three decades, Network Intrusion Detection Systems (NIDSs), particularly,
Anomaly Detection Systems (ADSs), have become more significant in detecting novel …

Similarity encoding for learning with dirty categorical variables

P Cerda, G Varoquaux, B Kégl - Machine Learning, 2018 - Springer
For statistical learning, categorical variables in a table are usually considered as discrete
entities and encoded separately to feature vectors, eg, with one-hot encoding.“Dirty” non …

Multi-pie

R Gross, I Matthews, J Cohn, T Kanade… - Image and vision …, 2010 - Elsevier
A close relationship exists between the advancement of face recognition algorithms and the
availability of face databases varying factors that affect facial appearance in a controlled …

A multi-level intrusion detection method for abnormal network behaviors

SY Ji, BK Jeong, S Choi, DH Jeong - Journal of Network and Computer …, 2016 - Elsevier
Abnormal network traffic analysis has become an increasingly important research topic to
protect computing infrastructures from intruders. Yet, it is challenging to accurately discover …

Novelty detection in data streams

ER Faria, IJCR Gonçalves, AC de Carvalho… - Artificial Intelligence …, 2016 - Springer
In massive data analysis, data usually come in streams. In the last years, several studies
have investigated novelty detection in these data streams. Different approaches have been …

Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT

A Verma, V Ranga - Wireless Personal Communications, 2019 - Springer
Over the past few years, Internet of Things security has attracted the attention of many
researchers due to its challenging and constrained nature. Particularly in the development of …

Multimodal deep representation learning for video classification

H Tian, Y Tao, S Pouyanfar, SC Chen, ML Shyu - World Wide Web, 2019 - Springer
Real-world applications usually encounter data with various modalities, each containing
valuable information. To enhance these applications, it is essential to effectively analyze all …