πA survey of data mining and social network analysis based anomaly detection techniques
πJournal: EGYPTIAN INFORMATICS JOURNAL (I.F= 4.195)
πPublish year: 2016
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #data_mining #anomaly_detection #survey
πJournal: EGYPTIAN INFORMATICS JOURNAL (I.F= 4.195)
πPublish year: 2016
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #data_mining #anomaly_detection #survey
πGraph Anomaly Detection with Graph Neural Networks: Current Status and Challenges
πJournal: IEEE Access (I.F=3.476)
πPublish year: 2022
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Anomaly_Detection #Challenges
πJournal: IEEE Access (I.F=3.476)
πPublish year: 2022
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Anomaly_Detection #Challenges
πWeb Graph Similarity for Anomaly Detection
πPublish year: 2009
πStudy paper
π²Channel: @ComplexNetworkAnalysis
#paper #Anomaly_Detection #Graph
πPublish year: 2009
πStudy paper
π²Channel: @ComplexNetworkAnalysis
#paper #Anomaly_Detection #Graph
πGraph-based Time-Series Anomaly Detection: A Survey
πPublish year: 2023
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Time_Series #Anomaly #survey
πPublish year: 2023
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Time_Series #Anomaly #survey
πGraph Anomaly Detection with Graph Neural Networks: Current Status and Challenges
πJournal: IEEE ACCESS (I.F=3.476)
πPublish year: 2022
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Anomaly #Graph_Neural_Networks #Status #Challenges
πJournal: IEEE ACCESS (I.F=3.476)
πPublish year: 2022
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Anomaly #Graph_Neural_Networks #Status #Challenges
2020_Fraud_detection_A_systematic_literature_review_of_graph_based.pdf
1.4 MB
πFraud detection: A systematic literature review of graph-based anomaly detection approaches
πJournal: Decision Support Systems (I.F=6.969)
πPublish year: 2020
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Fraud #Detection #Review #graph_based #anomaly
πJournal: Decision Support Systems (I.F=6.969)
πPublish year: 2020
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #Fraud #Detection #Review #graph_based #anomaly
πA Survey on Graph Neural Networks for Time Series: Forecasting, Classification, Imputation, and Anomaly Detection
πPublish year: 2021
π Study the paper
π²Channel: @ComplexNetworkAnalysis
#paper #GNN #Survey #Neural_Network #Forecasting #Anomaly_Detection
πPublish year: 2021
π Study the paper
π²Channel: @ComplexNetworkAnalysis
#paper #GNN #Survey #Neural_Network #Forecasting #Anomaly_Detection
π2π1
π A Survey on Graph Neural Networks for Time Series: Forecasting, Classification, Imputation, and Anomaly Detection
πPublish year: 2023
πStudy paper
π²Channel: @ComplexNetworkAnalysis
#paper #survey #GNN #anomaly_detection #time_series
πPublish year: 2023
πStudy paper
π²Channel: @ComplexNetworkAnalysis
#paper #survey #GNN #anomaly_detection #time_series
π5
πMachine Learning for Anomaly Detection: A Systematic Review
π journal: IEEE Acess (I.F=3.476)
πPublish year: 2021
πStudy paper
π²Channel: @ComplexNetworkAnalysis
#paper #graph #Anomaly_detection #review
π journal: IEEE Acess (I.F=3.476)
πPublish year: 2021
πStudy paper
π²Channel: @ComplexNetworkAnalysis
#paper #graph #Anomaly_detection #review
π₯3
π Anomaly Detection: Algorithms, Explanations, Applications
π₯Free recorded tutorial by Dr. Dietterichβs.He is part of the leadership team for OSUβs Ecosystem Informatics programs including the NSF Summer Institute in Ecoinformatics
π₯Anomaly detection is important for data cleaning, cybersecurity, and robust AI systems. This talk will review recent work in our group on (a) benchmarking existing algorithms, (b) developing a theoretical understanding of their behavior, (c) explaining anomaly βalarmsβ to a data analyst, and (d) interactively re-ranking candidate anomalies in response to analyst feedback. Then the talk will describe two applications: (a) detecting and diagnosing sensor failures in weather networks and (b) open category detection in supervised learning.
π½ Watch
π±Channel: @ComplexNetworkAnalysis
#video #Anomaly_Detection #Algorithms #Explanations #Applications
π₯Free recorded tutorial by Dr. Dietterichβs.He is part of the leadership team for OSUβs Ecosystem Informatics programs including the NSF Summer Institute in Ecoinformatics
π₯Anomaly detection is important for data cleaning, cybersecurity, and robust AI systems. This talk will review recent work in our group on (a) benchmarking existing algorithms, (b) developing a theoretical understanding of their behavior, (c) explaining anomaly βalarmsβ to a data analyst, and (d) interactively re-ranking candidate anomalies in response to analyst feedback. Then the talk will describe two applications: (a) detecting and diagnosing sensor failures in weather networks and (b) open category detection in supervised learning.
π½ Watch
π±Channel: @ComplexNetworkAnalysis
#video #Anomaly_Detection #Algorithms #Explanations #Applications
YouTube
Anomaly Detection: Algorithms, Explanations, Applications
Anomaly detection is important for data cleaning, cybersecurity, and robust AI systems. This talk will review recent work in our group on (a) benchmarking existing algorithms, (b) developing a theoretical understanding of their behavior, (c) explaining anomalyβ¦
π2
πA Survey on Graph Neural Networks for Time Series: Forecasting, Classification, Imputation, and Anomaly Detection
πPublish year: 2023
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #GNN #Time_Series #Forecasting #Classification #Imputation #Anomaly_Detection #survey
πPublish year: 2023
πStudy paper
π±Channel: @ComplexNetworkAnalysis
#paper #GNN #Time_Series #Forecasting #Classification #Imputation #Anomaly_Detection #survey
π4
π A systematic literature review of methods and datasets for anomaly-based network intrusion detection
π Journal: Computers & Security (I.F=5.6)
π Publish year: 2022
π§βπ»Authors: Zhen Yang , Xiaodong Liu, Tong Li, Di Wu, Jinjiang Wang, Yunwei Zhao, Han Han
π’University: Beijing University of Technology, Beijing, China
π Study the paper
π±Channel: @ComplexNetworkAnalysis
#paper #anomaly #intrusion #review
π Journal: Computers & Security (I.F=5.6)
π Publish year: 2022
π§βπ»Authors: Zhen Yang , Xiaodong Liu, Tong Li, Di Wu, Jinjiang Wang, Yunwei Zhao, Han Han
π’University: Beijing University of Technology, Beijing, China
π Study the paper
π±Channel: @ComplexNetworkAnalysis
#paper #anomaly #intrusion #review
π2