Academic literature on the topic 'Unsupervised anomaly detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unsupervised anomaly detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Unsupervised anomaly detection"
倪, 一鸣, and 松灿 陈. "Continual unsupervised anomaly detection." SCIENTIA SINICA Informationis 52, no. 1 (January 1, 2022): 75. http://dx.doi.org/10.1360/ssi-2021-0192.
Full textShi, Chengming, Bo Luo, Hongqi Li, Bin Li, Xinyong Mao, and Fangyu Peng. "Anomaly Detection via Unsupervised Learning for Tool Breakage Monitoring." International Journal of Machine Learning and Computing 6, no. 5 (October 2016): 256–59. http://dx.doi.org/10.18178/ijmlc.2016.6.5.607.
Full textFarzad, Amir, and T. Aaron Gulliver. "Unsupervised log message anomaly detection." ICT Express 6, no. 3 (September 2020): 229–37. http://dx.doi.org/10.1016/j.icte.2020.06.003.
Full textGoernitz, N., M. Kloft, K. Rieck, and U. Brefeld. "Toward Supervised Anomaly Detection." Journal of Artificial Intelligence Research 46 (February 20, 2013): 235–62. http://dx.doi.org/10.1613/jair.3623.
Full textAlmalawi, Abdulmohsen, Adil Fahad, Zahir Tari, Asif Irshad Khan, Nouf Alzahrani, Sheikh Tahir Bakhsh, Madini O. Alassafi, Abdulrahman Alshdadi, and Sana Qaiyum. "Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data." Electronics 9, no. 6 (June 18, 2020): 1017. http://dx.doi.org/10.3390/electronics9061017.
Full textTian, Yu, Haihua Liao, Jing Xu, Ya Wang, Shuai Yuan, and Naijin Liu. "Unsupervised Spectrum Anomaly Detection Method for Unauthorized Bands." Space: Science & Technology 2022 (February 21, 2022): 1–10. http://dx.doi.org/10.34133/2022/9865016.
Full textLok, Lai Kai, Vazeerudeen Abdul Hameed, and Muhammad Ehsan Rana. "Hybrid machine learning approach for anomaly detection." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (August 1, 2022): 1016. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp1016-1024.
Full textGoldstein, Markus. "Special Issue on Unsupervised Anomaly Detection." Applied Sciences 13, no. 10 (May 11, 2023): 5916. http://dx.doi.org/10.3390/app13105916.
Full textZhou, Wei, Yuan Gao, Jianhang Ji, Shicheng Li, and Yugen Yi. "Unsupervised Anomaly Detection for Glaucoma Diagnosis." Wireless Communications and Mobile Computing 2021 (October 1, 2021): 1–14. http://dx.doi.org/10.1155/2021/5978495.
Full textChung, Hwehee, Jongho Park, Jongsoo Keum, Hongdo Ki, and Seokho Kang. "Unsupervised Anomaly Detection Using Style Distillation." IEEE Access 8 (2020): 221494–502. http://dx.doi.org/10.1109/access.2020.3043473.
Full textDissertations / Theses on the topic "Unsupervised anomaly detection"
Mazel, Johan. "Unsupervised network anomaly detection." Thesis, Toulouse, INSA, 2011. http://www.theses.fr/2011ISAT0024/document.
Full textAnomaly detection has become a vital component of any network in today’s Internet. Ranging from non-malicious unexpected events such as flash-crowds and failures, to network attacks such as denials-of-service and network scans, network traffic anomalies can have serious detrimental effects on the performance and integrity of the network. The continuous arising of new anomalies and attacks create a continuous challenge to cope with events that put the network integrity at risk. Moreover, the inner polymorphic nature of traffic caused, among other things, by a highly changing protocol landscape, complicates anomaly detection system's task. In fact, most network anomaly detection systems proposed so far employ knowledge-dependent techniques, using either misuse detection signature-based detection methods or anomaly detection relying on supervised-learning techniques. However, both approaches present major limitations: the former fails to detect and characterize unknown anomalies (letting the network unprotected for long periods) and the latter requires training over labeled normal traffic, which is a difficult and expensive stage that need to be updated on a regular basis to follow network traffic evolution. Such limitations impose a serious bottleneck to the previously presented problem.We introduce an unsupervised approach to detect and characterize network anomalies, without relying on signatures, statistical training, or labeled traffic, which represents a significant step towards the autonomy of networks. Unsupervised detection is accomplished by means of robust data-clustering techniques, combining Sub-Space clustering with Evidence Accumulation or Inter-Clustering Results Association, to blindly identify anomalies in traffic flows. Correlating the results of several unsupervised detections is also performed to improve detection robustness. The correlation results are further used along other anomaly characteristics to build an anomaly hierarchy in terms of dangerousness. Characterization is then achieved by building efficient filtering rules to describe a detected anomaly. The detection and characterization performances and sensitivities to parameters are evaluated over a substantial subset of the MAWI repository which contains real network traffic traces.Our work shows that unsupervised learning techniques allow anomaly detection systems to isolate anomalous traffic without any previous knowledge. We think that this contribution constitutes a great step towards autonomous network anomaly detection.This PhD thesis has been funded through the ECODE project by the European Commission under the Framework Programme 7. The goal of this project is to develop, implement, and validate experimentally a cognitive routing system that meet the challenges experienced by the Internet in terms of manageability and security, availability and accountability, as well as routing system scalability and quality. The concerned use case inside the ECODE project is network anomaly
Joshi, Vineet. "Unsupervised Anomaly Detection in Numerical Datasets." University of Cincinnati / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1427799744.
Full textDi, Felice Marco. "Unsupervised anomaly detection in HPC systems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textForstén, Andreas. "Unsupervised Anomaly Detection in Receipt Data." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215161.
Full textMed de framsteg inom datahantering och datorkraft som gjorts så kommer också möjligheten att automatisera uppgifter som ej nödvändigtvis utförs av människor. Denna studie gjordes i samarbete med ett företag som digitaliserar företags kvitton. Vi undersöker möjligheten att automatisera sökandet av avvikande kvittodata, vilket kan avlasta revisorer. Vti studerar både avvikande användarbeteenden och individuella kvitton. Resultaten indikerar att automatisering är möjligt, vilket kan reducera behovet av mänsklig inspektion av kvitton
Cheng, Leon. "Unsupervised topic discovery by anomaly detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37599.
Full textWith the vast amount of information and public comment available online, it is of increasing interest to understand what is being said and what topics are trending online. Government agencies, for example, want to know what policies concern the public without having to look through thousands of comments manually. Topic detection provides automatic identification of topics in documents based on the information content and enhances many natural language processing tasks, including text summarization and information retrieval. Unsupervised topic detection, however, has always been a difficult task. Methods such as Latent Dirichlet Allocation (LDA) convert documents from word space into document space (weighted sums over topic space), but do not perform any form of classification, nor do they address the relation of generated topics with actual human level topics. In this thesis we attempt a novel way of unsupervised topic detection and classification by performing LDA and then clustering. We propose variations to the popular K-Mean Clustering algorithm to optimize the choice of centroids, and we perform experiments using Facebook data and the New York Times (NYT) corpus. Although the results were poor for the Facebook data, our method performed acceptably with the NYT data. The new clustering algorithms also performed slightly and consistently better than the normal K-Means algorithm.
Putina, Andrian. "Unsupervised anomaly detection : methods and applications." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT012.
Full textAn anomaly (also known as outlier) is an instance that significantly deviates from the rest of the input data and being defined by Hawkins as 'an observation, which deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism'. Anomaly detection (also known as outlier or novelty detection) is thus the machine learning and data mining field with the purpose of identifying those instances whose features appear to be inconsistent with the remainder of the dataset. In many applications, correctly distinguishing the set of anomalous data points (outliers) from the set of normal ones (inliers) proves to be very important. A first application is data cleaning, i.e., identifying noisy and fallacious measurement in a dataset before further applying learning algorithms. However, with the explosive growth of data volume collectable from various sources, e.g., card transactions, internet connections, temperature measurements, etc. the use of anomaly detection becomes a crucial stand-alone task for continuous monitoring of the systems. In this context, anomaly detection can be used to detect ongoing intrusion attacks, faulty sensor networks or cancerous masses.The thesis proposes first a batch tree-based approach for unsupervised anomaly detection, called 'Random Histogram Forest (RHF)'. The algorithm solves the curse of dimensionality problem using the fourth central moment (aka kurtosis) in the model construction while boasting linear running time. A stream based anomaly detection engine, called 'ODS', that leverages DenStream, an unsupervised clustering technique is presented subsequently and finally Automated Anomaly Detection engine which alleviates the human effort required when dealing with several algorithm and hyper-parameters is presented as last contribution
Audibert, Julien. "Unsupervised anomaly detection in time-series." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS358.
Full textAnomaly detection in multivariate time series is a major issue in many fields. The increasing complexity of systems and the explosion of the amount of data have made its automation indispensable. This thesis proposes an unsupervised method for anomaly detection in multivariate time series called USAD. However, deep neural network methods suffer from a limitation in their ability to extract features from the data since they only rely on local information. To improve the performance of these methods, this thesis presents a feature engineering strategy that introduces non-local information. Finally, this thesis proposes a comparison of sixteen time series anomaly detection methods to understand whether the explosion in complexity of neural network methods proposed in the current literature is really necessary
Dani, Mohamed Cherif. "Unsupervised anomaly detection for aircraft health monitoring system." Thesis, Sorbonne Paris Cité, 2017. http://www.theses.fr/2017USPCB258.
Full textThe limitation of the knowledge, technical, fundamental is a daily challenge for industries. The need to updates these knowledge are important for a competitive industry and also for an efficient reliability and maintainability of the systems. Actually, thanks to these machines and systems, the expansion of the data on quantity and frequency of generation is a real phenomenon. Within Airbus for example, and thanks to thousands of sensors, the aircrafts generate hundreds of megabytes of data per flight. These data are today exploited on the ground to improve safety and health monitoring system as a failure, incident and change detection. In theory, these changes, incident and failure are known as anomalies. An anomaly is known as deviation form a normal behavior of the data. Others define it as a behavior that do not conform the normal behavior. Whatever the definition, the anomaly detection process is very important for good functioning of the aircraft. Currently, the anomaly detection process is provided by several health monitoring equipments, one of these equipment is the Aircraft Health Monitoring System (ACMS), it records continuously the date of each sensor, and also monitor these sensors to detect anomalies and incident using triggers and predefined condition (exeedance approach). These predefined conditions are programmed by airlines and system designed according to a prior knowledge (physical, mechanical, etc.). However, several constraints limit the ACMS anomaly detection potential. We can mention, for example, the limitation the expert knowledge which is a classic problem in many domains, since the triggers are designed only to the targeted anomalies. Otherwise, the triggers do not cover all the system conditions. In other words, if a new behavior appears (new condition) in the sensor, after a maintenance action, parts changing, etc. the predefined conditions won't detect any thing and may be in many cases generated false alarms. Another constraint is that the triggers (predefined conditions) are static, they are unable to adapt their proprieties to each new condition. Another limitation is discussed gradually in the future chapters. The principle of objective of this thesis is to detect anomalies and changes in the ACMS data. In order to improve the health monitoring function of the ACMS. The work is based principally on two stages, the univariate anomaly detection stage, where we use the unsupervised learning to process the univariate sensors, since we don’t have any a prior knowledge of the system, and no documentation or labeled classes are available. The univariate analysis focuses on each sensor independently. The second stage of the analysis is the multivariate anomaly detection, which is based on density clustering, where the objective is to filter the anomalies detected in the first stage (false alarms) and to detect suspected behaviours (group of anomalies). The anomalies detected in both univariate and multivariate can be potential triggers or can be used to update the existing triggers. Otherwise, we propose also a generic concept of anomaly detection based on univariate and multivariate anomaly detection. And finally a new concept of validation anomalies within airbus
Dani, Mohamed Cherif. "Unsupervised anomaly detection for aircraft health monitoring system." Electronic Thesis or Diss., Sorbonne Paris Cité, 2017. http://www.theses.fr/2017USPCB258.
Full textThe limitation of the knowledge, technical, fundamental is a daily challenge for industries. The need to updates these knowledge are important for a competitive industry and also for an efficient reliability and maintainability of the systems. Actually, thanks to these machines and systems, the expansion of the data on quantity and frequency of generation is a real phenomenon. Within Airbus for example, and thanks to thousands of sensors, the aircrafts generate hundreds of megabytes of data per flight. These data are today exploited on the ground to improve safety and health monitoring system as a failure, incident and change detection. In theory, these changes, incident and failure are known as anomalies. An anomaly is known as deviation form a normal behavior of the data. Others define it as a behavior that do not conform the normal behavior. Whatever the definition, the anomaly detection process is very important for good functioning of the aircraft. Currently, the anomaly detection process is provided by several health monitoring equipments, one of these equipment is the Aircraft Health Monitoring System (ACMS), it records continuously the date of each sensor, and also monitor these sensors to detect anomalies and incident using triggers and predefined condition (exeedance approach). These predefined conditions are programmed by airlines and system designed according to a prior knowledge (physical, mechanical, etc.). However, several constraints limit the ACMS anomaly detection potential. We can mention, for example, the limitation the expert knowledge which is a classic problem in many domains, since the triggers are designed only to the targeted anomalies. Otherwise, the triggers do not cover all the system conditions. In other words, if a new behavior appears (new condition) in the sensor, after a maintenance action, parts changing, etc. the predefined conditions won't detect any thing and may be in many cases generated false alarms. Another constraint is that the triggers (predefined conditions) are static, they are unable to adapt their proprieties to each new condition. Another limitation is discussed gradually in the future chapters. The principle of objective of this thesis is to detect anomalies and changes in the ACMS data. In order to improve the health monitoring function of the ACMS. The work is based principally on two stages, the univariate anomaly detection stage, where we use the unsupervised learning to process the univariate sensors, since we don’t have any a prior knowledge of the system, and no documentation or labeled classes are available. The univariate analysis focuses on each sensor independently. The second stage of the analysis is the multivariate anomaly detection, which is based on density clustering, where the objective is to filter the anomalies detected in the first stage (false alarms) and to detect suspected behaviours (group of anomalies). The anomalies detected in both univariate and multivariate can be potential triggers or can be used to update the existing triggers. Otherwise, we propose also a generic concept of anomaly detection based on univariate and multivariate anomaly detection. And finally a new concept of validation anomalies within airbus
Sarossy, George. "Anomaly detection in Network data with unsupervised learning methods." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-55096.
Full textBook chapters on the topic "Unsupervised anomaly detection"
Deepak, P. "Anomaly Detection for Data with Spatial Attributes." In Unsupervised Learning Algorithms, 1–32. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-24211-8_1.
Full textAngiulli, Fabrizio, Fabio Fassetti, Luca Ferragina, and Rosaria Spada. "Cooperative Deep Unsupervised Anomaly Detection." In Discovery Science, 318–28. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-18840-4_23.
Full textSimarro Viana, Jaime, Ezequiel de la Rosa, Thijs Vande Vyvere, David Robben, Diana M. Sima, and CENTER-TBI Participants and Investigators. "Unsupervised 3D Brain Anomaly Detection." In Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 133–42. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72084-1_13.
Full textHiguera, Juan Ramón Bermejo, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo, and Rubén González Crespo. "Unsupervised Approaches in Anomaly Detection." In Intelligent Systems Reference Library, 57–83. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54038-7_3.
Full textZhao, Zhiruo, Kishan G. Mehrotra, and Chilukuri K. Mohan. "Ensemble Algorithms for Unsupervised Anomaly Detection." In Current Approaches in Applied Artificial Intelligence, 514–25. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19066-2_50.
Full textZimmerer, David, Daniel Paech, Carsten Lüth, Jens Petersen, Gregor Köhler, and Klaus Maier-Hein. "Unsupervised Anomaly Detection in the Wild." In Informatik aktuell, 26–31. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-36932-3_6.
Full textGraß, Alexander, Christian Beecks, and Jose Angel Carvajal Soto. "Unsupervised Anomaly Detection in Production Lines." In Machine Learning for Cyber Physical Systems, 18–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-58485-9_3.
Full textEskin, Eleazar, Andrew Arnold, Michael Prerau, Leonid Portnoy, and Sal Stolfo. "A Geometric Framework for Unsupervised Anomaly Detection." In Advances in Information Security, 77–101. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0953-0_4.
Full textSyarif, Iwan, Adam Prugel-Bennett, and Gary Wills. "Unsupervised Clustering Approach for Network Anomaly Detection." In Networked Digital Technologies, 135–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30507-8_13.
Full textWeng, Lingxuan, Maohan Liang, Ruobin Gao, and Zhong Shuo Chen. "Deep Learning-Empowered Unsupervised Maritime Anomaly Detection." In Communications in Computer and Information Science, 189–202. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8178-6_15.
Full textConference papers on the topic "Unsupervised anomaly detection"
Blum, Ashlae. "A Temporal Approach to Unsupervised Anomaly Detection." In A Temporal Approach to Unsupervised Anomaly Detection. US DOE, 2021. http://dx.doi.org/10.2172/1825324.
Full textAlnutefy, Suliman, and Ali Alsuwayh. "Unsupervised Anomaly Detection." In 4th International Conference on AI, Machine Learning and Applications. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.140210.
Full textLi, Tangqing, Zheng Wang, Siying Liu, and Wen-Yan Lin. "Deep Unsupervised Anomaly Detection." In 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 2021. http://dx.doi.org/10.1109/wacv48630.2021.00368.
Full textZhang, Zheng, and Liang Zhao. "Unsupervised Deep Subgraph Anomaly Detection (Extended Abstract)." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/730.
Full textBekiroglu, Korkut, Ali Tekeoglu, Bruno Andriamanalimanana, Saumendra Sengupta, Chen-Fu Chiang, and Jorge Novillo. "Hankel-based Unsupervised Anomaly Detection." In 2020 American Control Conference (ACC). IEEE, 2020. http://dx.doi.org/10.23919/acc45564.2020.9147583.
Full textBang, Jaeho, Sungchul Kim, Ryan Rossi, Tong Yu, and Handong Zhao. "Interpretable Unsupervised Log Anomaly Detection." In 2023 IEEE International Conference on Big Data (BigData). IEEE, 2023. http://dx.doi.org/10.1109/bigdata59044.2023.10386852.
Full textZhang, Zheng, and Liang Zhao. "Unsupervised Deep Subgraph Anomaly Detection." In 2022 IEEE International Conference on Data Mining (ICDM). IEEE, 2022. http://dx.doi.org/10.1109/icdm54844.2022.00086.
Full textYe, Hangting, Zhining Liu, Xinyi Shen, Wei Cao, Shun Zheng, Xiaofan Gui, Huishuai Zhang, Yi Chang, and Jiang Bian. "UADB: Unsupervised Anomaly Detection Booster." In 2023 IEEE 39th International Conference on Data Engineering (ICDE). IEEE, 2023. http://dx.doi.org/10.1109/icde55515.2023.00199.
Full textChen, Xinqiang, Lumei Su, Guansen Deng, Mingyong Huang, Jiajun Wu, and Yanqing Peng. "Weak anomaly-reinforced autoencoder for unsupervised anomaly detection." In Thirteenth International Conference on Machine Vision, edited by Wolfgang Osten, Jianhong Zhou, and Dmitry P. Nikolaev. SPIE, 2021. http://dx.doi.org/10.1117/12.2587017.
Full textFine, Benjamin T. "Unsupervised anomaly detection with minimal sensing." In the 47th Annual Southeast Regional Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1566445.1566525.
Full text