2024
DOI: 10.1109/access.2023.3349132
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey of Deep Transfer Learning for Anomaly Detection in Industrial Time Series: Methods, Applications, and Directions

Peng Yan,
Ahmed Abdulkadir,
Paul-Philipp Luley
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(3 citation statements)
references
References 125 publications
0
3
0
Order By: Relevance
“…Based on the above problem statement and the various TL for TSF shortcomings discussed in [10,11], we define the following research questions (RQs):…”
Section: Problem Statement and Research Questionsmentioning
confidence: 99%
“…Based on the above problem statement and the various TL for TSF shortcomings discussed in [10,11], we define the following research questions (RQs):…”
Section: Problem Statement and Research Questionsmentioning
confidence: 99%
“…Hybrid approaches in anomaly detection combine multiple techniques to leverage the strengths of each method, thereby enhancing detection accuracy and reducing false positives. These approaches integrate different algorithms and models to create a more robust system capable of handling diverse data patterns and evolving threats [75]. The synergy between various methods helps mitigate the weaknesses inherent in individual techniques, resulting in a more comprehensive and effective anomaly detection solution.…”
Section: Hybrid Approachesmentioning
confidence: 99%
“…Reference source not found., anomaly detection in electrocardiogram (ECG) time series data stands out as a critical application 4. The typical workflow of time series anomaly detection generally involves the following steps 5: (1) partitioning the available time series dataset into training and testing sets; (2) selecting appropriate feature extraction methods; (3) establishing anomaly detection models to identify abnormal patterns; (4) conducting anomaly detection and evaluation on the testing set.…”
Section: Introductionmentioning
confidence: 99%