Related references
Note: Only part of the references are listed.The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation
Davide Chicco et al.
BMC GENOMICS (2020)
Exploiting Epistemic Uncertainty of Anatomy Segmentation for Anomaly Detection in Retinal OCT
Philipp Seebock et al.
IEEE TRANSACTIONS ON MEDICAL IMAGING (2020)
Localised gear anomaly detection without historical data for reference density estimation
Stephan Schmidt et al.
MECHANICAL SYSTEMS AND SIGNAL PROCESSING (2019)
An Improved High-Throughput Data Processing Based on Combinatorial Materials Chip Approach for Rapid Construction of Fe-Cr-Ni Composition-Phase Map
Zhaoyang Zhao et al.
ACS COMBINATORIAL SCIENCE (2019)
Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic
Razan Abdulhammed et al.
IEEE SENSORS LETTERS (2019)
CoDetect: Financial Fraud Detection With Anomaly Feature Detection
Dongxu Huang et al.
IEEE ACCESS (2018)
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Kuldeep Randhawa et al.
IEEE ACCESS (2018)
An integrated framework for anomaly detection in big data of medical wireless sensors
Bharti Saneja et al.
MODERN PHYSICS LETTERS B (2018)
Enhanced Network Anomaly Detection Based on Deep Neural Networks
Sheraz Naseer et al.
IEEE ACCESS (2018)
Statistical Anomaly Detection for Train Fleets
Anders Holst et al.
AI MAGAZINE (2017)
Fifty years of pulsar candidate selection: from simple filters to a new principled real-time classification approach
R. J. Lyon et al.
MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY (2016)
An Anomaly Detection Model based on One-class SVM to Detect Network Intrusions
Ming Zhang et al.
2015 11TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN) (2015)
Learned lessons in credit card fraud detection from a practitioner perspective
Andrea Dal Pozzolo et al.
EXPERT SYSTEMS WITH APPLICATIONS (2014)
Noisy data elimination using mutual k-nearest neighbor for classification mining
Huawen Liu et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2012)
Anomaly detection
Varun Chandola et al.
ACM COMPUTING SURVEYS (2009)
FCM-based model selection algorithms for determining the number of clusters
HJ Sun et al.
PATTERN RECOGNITION (2004)