Deep learning for anomaly detection: A review
Anomaly detection, aka outlier detection or novelty detection, has been a lasting yet active
research area in various research communities for several decades. There are still some …
research area in various research communities for several decades. There are still some …
Survey on categorical data for neural networks
JT Hancock, TM Khoshgoftaar - Journal of big data, 2020 - Springer
This survey investigates current techniques for representing qualitative data for use as input
to neural networks. Techniques for using qualitative data in neural networks are well known …
to neural networks. Techniques for using qualitative data in neural networks are well known …
Who are the phishers? phishing scam detection on ethereum via network embedding
Recently, blockchain technology has become a topic in the spotlight but also a hotbed of
various cybercrimes. Among them, phishing scams on blockchain have been found to make …
various cybercrimes. Among them, phishing scams on blockchain have been found to make …
[PDF][PDF] Outlier detection for time series with recurrent autoencoder ensembles.
We propose two solutions to outlier detection in time series based on recurrent autoencoder
ensembles. The solutions exploit autoencoders built using sparsely-connected recurrent …
ensembles. The solutions exploit autoencoders built using sparsely-connected recurrent …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …
developed and employed various attack vectors to make a malware much stealthier than …
Nodoze: Combatting threat alert fatigue with automated provenance triage
Large enterprises are increasingly relying on threat detection softwares (eg, Intrusion
Detection Systems) to allow them to spot suspicious activities. These softwares generate …
Detection Systems) to allow them to spot suspicious activities. These softwares generate …
Task-guided and path-augmented heterogeneous network embedding for author identification
In this paper, we study the problem of author identification under double-blind review setting,
which is to identify potential authors given information of an anonymized paper. Different …
which is to identify potential authors given information of an anonymized paper. Different …
On sampling strategies for neural network-based collaborative filtering
Recent advances in neural networks have inspired people to design hybrid
recommendation algorithms that can incorporate both (1) user-item interaction information …
recommendation algorithms that can incorporate both (1) user-item interaction information …
[PDF][PDF] Heterogeneous network representation learning.
Abstract Representation learning has offered a revolutionary learning paradigm for various
AI domains. In this survey, we examine and review the problem of representation learning …
AI domains. In this survey, we examine and review the problem of representation learning …