Computer Science ›› 2023, Vol. 50 ›› Issue (7): 53-59.doi: 10.11896/jsjkx.220900027
• Database & Big Data & Data Science • Previous Articles Next Articles
LI Hui, LI Wengen, GUAN Jihong
CLC Number:
[1]PANG G,SHEN C,CAO L,et al.Deep Learning for Anomaly Detection:A Review[J].ACM Computing Surveys,2021,54(2):38:1-38:38. [2]ILEBERI E,SUN Y,WANG Z.A machine learning based credit card fraud detection using the GA algorithm for feature selection[J].Journal of Big Data,2022,9(1):1-17. [3]BIN S R,SCHETININ V,SANT P.Review of Machine Lear-ning Approach on Credit Card Fraud Detection[J].Human-Centric Intelligent Systems,2022,2(1/2):55-68. [4]LI M M,HUANG K,ZITNIK M.Graph representation learning in biomedicine and healthcare[J].arXiv:2104.04883,2022. [5]WANG J,JIA Y,WANG D,et al.Weighted IForest and siamese GRU on small sample anomaly detection in healthcare[J].Computer Methods and Programs in Biomedicine,2022,218:106706. [6]CHAGANTI R,RAVI V,PHAM T D.Deep learning basedcross architecture internet of things malware detection and classification[J].Computers & Security,2022,120:102779. [7]DE PAULA MONTEIRO R,LOZADA M C,MENDIETA D R C,et al.A hybrid prototype selection-based deep learning approach for anomaly detection in industrial machines[J].Expert Systems with Applications,2022,204:117528. [8]KHARITONOV A,NAHHAS A,POHL M,et al.Comparative analysis of machine learning models for anomaly detection in manufacturing[J].Procedia Computer Science,2022,200:1288-1297. [9]ZAHEER M Z,MAHMOOD A,KHAN M H,et al.Generative cooperative learning for unsupervised video anomaly detection[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:14744-14754. [10]SCHÖLKOPF B,PLATT J C,SHAWE-TAYLOR J,et al.Estimating the Support of a High-Dimensional Distribution[J].Neural Computation,2001,13(7):1443-1471. [11]WU Y K,LI W,NI M Y,et al.Anomaly Detection Model Based on One-Class Support Vector Machine Fused Deep Autoencoder [J].Computer Science,2022,49(3):144-151. [12]TAX D M,DUIN R P.Support vector data description[J].Machine Learning,2004,54(1):45-66. [13]SHYU M L,CHEN S C,SARINNAPAKORN K,et al.A novel anomaly detection scheme based on principal component classi-fier[C]//Proceedings of the 3rd IEEE International Conference on Data Mining.2003:172-179. [14]LIU F T,TING K M,ZHOU Z H.Isolation Forest[C]//2008 Eighth IEEE International Conference on Data Mining.2008:413-422. [15]CHENG Z,ZOU C,DONG J.Outlier detection using isolationforest and local outlier factor[C]//Proceedings of the Confe-rence on Research in Adaptive and Convergent Systems.2019:161-168. [16]ZHANG R J,CHEN W,HANG M X,et al.Detection of Abnormal Flow of Imbalanced Samples Based on Variational Autoencoder[J].Computer Science,2021,48(7):62-69. [17]CHEN Q,DAI Y,LIU G.Research on KPI Anomaly Detection Model for Intelligent Operation and Maintenance[J].Journal of Chongqing University of Technology(Natural Science),2022,36(6):181-188. [18]ZHOU C,PAFFENROTH R C.Anomaly Detection with Robust Deep Autoencoders[C]//Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Halifax NS Canada:ACM,2017:665-674. [19]ZONG B,SONG Q,MIN M R,et al.Deep autoencoding gaussian mixture model for unsupervised anomaly detection[C]//International Conference on Learning Representations.2018:1-19. [20]RUFF L,VANDERMEULEN R,GOERNITZ N,et al.Deepone-class classification[C]//International Conference on Machine Learning.PMLR,2018:4393-4402. [21]CHALAPATHY R,CHAWLA S.Deep Learning for Anomaly Detection:A Survey[J].arXiv:1901.03407,2019. [22]RUFF L,VANDERMEULEN R A,GÖRNITZ N,et al.Deep Semi-Supervised Anomaly Detection[J].arXiv:1906.02694,2020. [23]GÖRNITZ N,KLOFT M,RIECK K,et al.Toward supervisedanomaly detection[J].Journal of Artificial Intelligence Research,2013,46:235-262. [24]YUAN F N,ZHANG L,SHI J T,et al.Review of Autoencoder Neural Network Theory and Applications [J].Journal of Computers,2019,42(1):203-230. [25]AKCAY S,ATAPOUR-ABARGHOUEI A,BRECKON T P.Ganomaly:Semi-supervised anomaly detection via adversarial training[C]//Asian Conference on Computer Vision.Springer,2018:622-637. [26]GONG D,TAN M,ZHANG Y,et al.Blind Image Deconvolution by Automatic Gradient Activation[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:1827-1836. [27]ODDS-Outlier Detection DataSets[EB/OL].http://odds.cs.stonybrook.edu/. [28]KINGMA D P,BA J.Adam:A method for stochastic optimization[J].arXiv:1412.6980,2014. |
[1] | HENG Hongjun, ZHOU Wenhua. Anomaly Detection Method Based on Context Information Fusion and Noise Adaptation [J]. Computer Science, 2023, 50(7): 237-245. |
[2] | GU Yuhang, HAO Jie, CHEN Bing. Semi-supervised Semantic Segmentation for High-resolution Remote Sensing Images Based on DataFusion [J]. Computer Science, 2023, 50(6A): 220500001-6. |
[3] | SUN Kaiwei, WANG Zhihao, LIU Hu, RAN Xue. Maximum Overlap Single Target Tracking Algorithm Based on Attention Mechanism [J]. Computer Science, 2023, 50(6A): 220400023-5. |
[4] | ZHANG Guohua, YAN Xuefeng, GUAN Donghai. Anomaly Detection of Time-series Based on Multi-modal Feature Fusion [J]. Computer Science, 2023, 50(6A): 220700094-7. |
[5] | WANG Qingyu, WANG Hairui, ZHU Guifu, MENG Shunjian. Study on SQL Injection Detection Based on FlexUDA Model [J]. Computer Science, 2023, 50(6A): 220600172-6. |
[6] | QIN Liang, XIE Liang, CHEN Shengshuang, XU Haijiao. Online Semi-supervised Cross-modal Hashing Based on Anchor Graph Classification [J]. Computer Science, 2023, 50(6): 183-193. |
[7] | SUN Xuekui, DAI Hua, ZHOU Jianguo, YANG Geng, CHEN Yanli. LTTFAD:Log Template Topic Feature-based Anomaly Detection [J]. Computer Science, 2023, 50(6): 313-321. |
[8] | ZHAO Song, FU Hao, WANG Hongxing. Pseudo-abnormal Sample Selection for Video Anomaly Detection [J]. Computer Science, 2023, 50(5): 146-154. |
[9] | ZHANG Renbin, ZUO Yicong, ZHOU Zelin, WANG Long, CUI Yuhang. Multimodal Generative Adversarial Networks Based Multivariate Time Series Anomaly Detection [J]. Computer Science, 2023, 50(5): 355-362. |
[10] | RAO Dan, SHI Hongwei. Study on Air Traffic Flow Recognition and Anomaly Detection Based on Deep Clustering [J]. Computer Science, 2023, 50(3): 121-128. |
[11] | CUI Jingsong, ZHANG Tongtong, GUO Chi, GUO Wenfei. Network Equipment Anomaly Detection Based on Time Delay Feature [J]. Computer Science, 2023, 50(3): 371-379. |
[12] | LI Haitao, WANG Ruimin, DONG Weiyu, JIANG Liehui. Semi-supervised Network Traffic Anomaly Detection Method Based on GRU [J]. Computer Science, 2023, 50(3): 380-390. |
[13] | WANG Xiangwei, HAN Rui, Chi Harold LIU. Hierarchical Memory Pool Based Edge Semi-supervised Continual Learning Method [J]. Computer Science, 2023, 50(2): 23-31. |
[14] | WANG Guan-yu, ZHONG Ting, FENG Yu, ZHOU Fan. Collaborative Filtering Recommendation Method Based on Vector Quantization Coding [J]. Computer Science, 2022, 49(9): 48-54. |
[15] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
|