A comprehensive survey of anomaly detection techniques for high dimensional big data

S Thudumu, P Branch, J **, J Singh - Journal of big data, 2020‏ - Springer
Anomaly detection in high dimensional data is becoming a fundamental research problem
that has various applications in the real world. However, many existing anomaly detection …

Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021‏ - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

Assuring the machine learning lifecycle: Desiderata, methods, and challenges

R Ashmore, R Calinescu, C Paterson - ACM Computing Surveys (CSUR), 2021‏ - dl.acm.org
Machine learning has evolved into an enabling technology for a wide range of highly
successful applications. The potential for this success to continue and accelerate has placed …

Multiscale topology optimization using neural network surrogate models

DA White, WJ Arrighi, J Kudo, SE Watts - Computer Methods in Applied …, 2019‏ - Elsevier
We are concerned with optimization of macroscale elastic structures that are designed
utilizing spatially varying microscale metamaterials. The macroscale optimization is …

[ספר][B] Machine learning: an algorithmic perspective

S Marsland - 2011‏ - taylorfrancis.com
Traditional books on machine learning can be divided into two groups-those aimed at
advanced undergraduates or early postgraduates with reasonable mathematical knowledge …

[ספר][B] Clustering

R Xu, D Wunsch - 2008‏ - books.google.com
This is the first book to take a truly comprehensive look at clustering. It begins with an
introduction to cluster analysis and goes on to explore: proximity measures; hierarchical …

[ספר][B] Exploratory data analysis with MATLAB

WL Martinez, AR Martinez, J Solka - 2017‏ - api.taylorfrancis.com
Praise for the Second Edition:" The authors present an intuitive and easy-to-read book.…
accompanied by many examples, proposed exercises, good references, and …

Intrinsic dimension estimation: Advances and open problems

F Camastra, A Staiano - Information Sciences, 2016‏ - Elsevier
Dimensionality reduction methods are preprocessing techniques used for co** with high
dimensionality. They have the aim of projecting the original data set of dimensionality N …

Clustering algorithms in biomedical research: a review

R Xu, DC Wunsch - IEEE reviews in biomedical engineering, 2010‏ - ieeexplore.ieee.org
Applications of clustering algorithms in biomedical research are ubiquitous, with typical
examples including gene expression data analysis, genomic sequence analysis, biomedical …

Metric space of collider events

PT Komiske, EM Metodiev, J Thaler - Physical review letters, 2019‏ - APS
When are two collider events similar? Despite the simplicity and generality of this question,
there is no established notion of the distance between two events. To address this question …