Computer Science ›› 2020, Vol. 47 ›› Issue (9): 99-104.doi: 10.11896/jsjkx.200600170
• Database & Big Data & Data Science • Previous Articles Next Articles
ZHONG Ying-yu, CHEN Song-can
CLC Number:
[1] WEST J,BHATTACHARYA M.Intelligent financial fraud detection:a comprehensive review [J].Computers & Security,2016,57:47-66. [2] BAHNSEN A C,AOUADA D,STOJANOVIC A,et al.Feature engineering strategies for credit card fraud detection [J].Expert Systems with Applications,2016,51:134-142. [3] HUANG S Y,LIN C C,CHIU A A,et al.Fraud detection usingfraud triangle risk factors[J].Information Systems Frontiers,2017,19(6):1343-1356. [4] SHUAIB M,OSHO O,ISMAILA I,et al.Comparative analysis of classification algorithms for email spam detection [J].International Journal of Computer Network and Information Security,2018,10(1):60. [5] COLUCCIA A,DÁLCONZO A,RICCIATO F.Distribution-based anomaly detection via generalized likelihood ratio test:A general maximum entropy approach [J].Computer Networks,2013,57(17):3446-3462. [6] VU N H,GOPALKRISHNAN V,ASSENT I.An UnbiasedDistance-Based Outlier Detection Approach for High-Dimensional Data[C]//Database Systems for Advanced Applications - 16th International Conference(DASFAA 2011).Hong Kong,China,2011. [7] YU H,WANG B,XIAO G,et al.Distance-based outlier detection on uncertain data [J].Journal of Computer Research & Development,2010,1(3):293-298. [8] RADOVANOVIC M,NANOPOULOS A,IVANOVIC M.Re-verse nearest neighbors in unsupervised distance-based outlier detection [J].IEEE Transactions on Knowledge & Data Engineering,2015,27(5):1369-1382. [9] ZHANG Z,ZHU M,QIU J,et al.Outlier detection based on cluster outlier factor and mutual density[J].International Journal of Intelligent Information and Database Systems,2019,12(1/2):91-108. [10] TANG B,HE H.A local density-based approach for outlier detection [J].Neurocomputing,2017,241:171-180. [11] MISHRA G,AGARWAL S,JAIN P K,et al.Outlier detection using subset formation of clustering-based method[C]//International Conference on Advanced Computing Networking and Informatics.Singapore:Springer,2019:521-528. [12] AZHAR F.Fuzzy clustering-based semi-supervised approachfor outlier detection in big text data [J].Progress in Artificial Intelligence,2019,8(1):123-132. [13] LI X,CHEN S.A Concise yet Effective model for Non-Aligned Incomplete Multi-view and Missing Multi-Label Learning [J].arXiv:2005.00976,2020. [14] HU M,CHEN S.Doubly aligned incomplete multi-view clustering [J].arXiv:1903.02785,2019. [15] WANG Z,XU J,CHEN S,et al.Regularized multi-view learning machine based on response surface technique [J].Neurocompu-ting,2012,97:201-213. [16] QIAN Q,CHEN S,ZHOU X.Multi-view classification withcross-view must-link and cannot-link side information [J].Knowledge-Based Systems,2013,54:137-146. [17] GAO J,FAN W,TURAGA D,et al.A spectral framework for detecting inconsistency across multi-source objects relationships[C]//2011 IEEE 11-th International Conference on Data Mi-ning.IEEE,2011:1050-1055. [18] MARCOS A A,YAMADA M,KIMURA A,et al.Clustering-based anomaly detection in multi-view data[C]//Proceedings of the 22nd ACM international conference on Information & Knowledge Management.2013:1545-1548. [19] LI S,SHAO M,FU Y.Multi-view low-rank analysis for outlier detection[C]//Proceedings of the 2015 SIAM International Conference on Data Mining.SIAM,2015:748-756. [20] ZHAO H,FU Y.Dual-regularized multi-view outlier detection[C]//Twenty-Fourth International Joint Conference on Artificial Intelligence.2015. [21] LI K,LI S,DING Z,et al.Latent discriminant subspace representations for multi-view outlier detection[C]//Thirty-Second AAAI Conference on Artificial Intelligence.2018. [22] LUO Y,TAO D,RAMAMOHANARAO K,et al.Tensor canonical correlation analysis for multi-view dimension reduction [J].IEEE transactions on Knowledge and Data Engineering,2015,27(11):3111-3124. [23] CAO B,HE L,KONG X,et al.Tensor-based Multiview feature selection with applications to brain diseases[C]//2014 IEEE International Conference on Data Mining.IEEE,2014:40-49. [24] BU F.A high-order clustering algorithm based on dropout deep learning for heterogeneous data in cyber-physical-social systems [J].IEEE Access,2017,6:11687-11693. [25] LI C G,VIDAL R.Structured sparse subspace clustering:A unified optimization framework[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2015:277-286. [26] LIN Z,CHEN M,MA Y.The augmented Lagrange multipliermethod for exact recovery of corrupted low-rank matrices [J].arXiv:1009.5055,2010. [27] CAI J F,CANDÈS E J,SHEN Z.A singular value thresholding algorithm for matrix completion [J].SIAM Journal on optimization,2010,20(4):1956-1982. [28] LIU G,LIN Z,YU Y.Robust subspace segmentation by low-rank representation[C]//Proceedings of the 27th International Conference on Machine Learning (ICML-10).DBLP,2010:663-670. [29] LIU G,LIN Z,YAN S,et al.Robust recovery of subspace structures by low-rank representation [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2012,35(1):171-184. |
[1] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[2] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[3] | DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178. |
[4] | SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151. |
[5] | WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151. |
[6] | LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148. |
[7] | ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344. |
[8] | QING Lai-yun, ZHANG Jian-gong, MIAO Jun. Temporal Modeling for Online Anomaly Detection [J]. Computer Science, 2021, 48(7): 206-212. |
[9] | GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219. |
[10] | XING Hong-jie, HAO ZhongHebei. Novelty Detection Method Based on Global and Local Discriminative Adversarial Autoencoder [J]. Computer Science, 2021, 48(6): 202-209. |
[11] | ZOU Cheng-ming, CHEN De. Unsupervised Anomaly Detection Method for High-dimensional Big Data Analysis [J]. Computer Science, 2021, 48(2): 121-127. |
[12] | SHI Lin-shan, MA Chuang, YANG Yun, JIN Min. Anomaly Detection Algorithm Based on SSC-BP Neural Network [J]. Computer Science, 2021, 48(12): 357-363. |
[13] | YANG Yue-lin, BI Zong-ze. Network Anomaly Detection Based on Deep Learning [J]. Computer Science, 2021, 48(11A): 540-546. |
[14] | ZHANG Fan, HE Wen-qi, JI Hong-bing, LI Dan-ping, WANG Lei. Multi-view Dictionary-pair Learning Based on Block-diagonal Representation [J]. Computer Science, 2021, 48(1): 233-240. |
[15] | FENG An-ran, WANG Xu-ren, WANG Qiu-yun, XIONG Meng-bo. Database Anomaly Access Detection Based on Principal Component Analysis and Random Tree [J]. Computer Science, 2020, 47(9): 94-98. |
|