A comprehensive survey of anomaly detection techniques for high dimensional big data
Anomaly detection in high dimensional data is becoming a fundamental research problem
that has various applications in the real world. However, many existing anomaly detection …
that has various applications in the real world. However, many existing anomaly detection …
Supervised feature selection techniques in network intrusion detection: A critical review
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
Assuring the machine learning lifecycle: Desiderata, methods, and challenges
Machine learning has evolved into an enabling technology for a wide range of highly
successful applications. The potential for this success to continue and accelerate has placed …
successful applications. The potential for this success to continue and accelerate has placed …
Multiscale topology optimization using neural network surrogate models
We are concerned with optimization of macroscale elastic structures that are designed
utilizing spatially varying microscale metamaterials. The macroscale optimization is …
utilizing spatially varying microscale metamaterials. The macroscale optimization is …
[ספר][B] Machine learning: an algorithmic perspective
S Marsland - 2011 - taylorfrancis.com
Traditional books on machine learning can be divided into two groups-those aimed at
advanced undergraduates or early postgraduates with reasonable mathematical knowledge …
advanced undergraduates or early postgraduates with reasonable mathematical knowledge …
[ספר][B] Clustering
R Xu, D Wunsch - 2008 - books.google.com
This is the first book to take a truly comprehensive look at clustering. It begins with an
introduction to cluster analysis and goes on to explore: proximity measures; hierarchical …
introduction to cluster analysis and goes on to explore: proximity measures; hierarchical …
[ספר][B] Exploratory data analysis with MATLAB
WL Martinez, AR Martinez, J Solka - 2017 - api.taylorfrancis.com
Praise for the Second Edition:" The authors present an intuitive and easy-to-read book.…
accompanied by many examples, proposed exercises, good references, and …
accompanied by many examples, proposed exercises, good references, and …
Intrinsic dimension estimation: Advances and open problems
Dimensionality reduction methods are preprocessing techniques used for co** with high
dimensionality. They have the aim of projecting the original data set of dimensionality N …
dimensionality. They have the aim of projecting the original data set of dimensionality N …
Clustering algorithms in biomedical research: a review
Applications of clustering algorithms in biomedical research are ubiquitous, with typical
examples including gene expression data analysis, genomic sequence analysis, biomedical …
examples including gene expression data analysis, genomic sequence analysis, biomedical …
Metric space of collider events
When are two collider events similar? Despite the simplicity and generality of this question,
there is no established notion of the distance between two events. To address this question …
there is no established notion of the distance between two events. To address this question …