4.4 Article

An improved agglomerative hierarchical clustering anomaly detection method for scientific data

Related references

Note: Only part of the references are listed.
Article Computer Science, Interdisciplinary Applications

Exploiting Epistemic Uncertainty of Anatomy Segmentation for Anomaly Detection in Retinal OCT

Philipp Seebock et al.

IEEE TRANSACTIONS ON MEDICAL IMAGING (2020)

Article Engineering, Mechanical

Localised gear anomaly detection without historical data for reference density estimation

Stephan Schmidt et al.

MECHANICAL SYSTEMS AND SIGNAL PROCESSING (2019)

Article Engineering, Electrical & Electronic

Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic

Razan Abdulhammed et al.

IEEE SENSORS LETTERS (2019)

Article Computer Science, Information Systems

CoDetect: Financial Fraud Detection With Anomaly Feature Detection

Dongxu Huang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Credit Card Fraud Detection Using AdaBoost and Majority Voting

Kuldeep Randhawa et al.

IEEE ACCESS (2018)

Article Physics, Applied

An integrated framework for anomaly detection in big data of medical wireless sensors

Bharti Saneja et al.

MODERN PHYSICS LETTERS B (2018)

Article Computer Science, Information Systems

Enhanced Network Anomaly Detection Based on Deep Neural Networks

Sheraz Naseer et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

Statistical Anomaly Detection for Train Fleets

Anders Holst et al.

AI MAGAZINE (2017)

Article Astronomy & Astrophysics

Fifty years of pulsar candidate selection: from simple filters to a new principled real-time classification approach

R. J. Lyon et al.

MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY (2016)

Proceedings Paper Computer Science, Hardware & Architecture

An Anomaly Detection Model based on One-class SVM to Detect Network Intrusions

Ming Zhang et al.

2015 11TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN) (2015)

Article Computer Science, Artificial Intelligence

Learned lessons in credit card fraud detection from a practitioner perspective

Andrea Dal Pozzolo et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Software Engineering

Noisy data elimination using mutual k-nearest neighbor for classification mining

Huawen Liu et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2012)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Artificial Intelligence

FCM-based model selection algorithms for determining the number of clusters

HJ Sun et al.

PATTERN RECOGNITION (2004)