2021
DOI: 10.1109/tgrs.2020.3038722
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Hyperspectral Imagery Based on Gaussian Mixture Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(20 citation statements)
references
References 46 publications
0
20
0
Order By: Relevance
“…One is referred to BKG separation-before-anomaly detection, which separates BKG before anomaly detection takes place [43], [44]. Another is BKG removal-before-anomaly detection, which removes estimated BKG [45], [46] or reconstructed BKG via autoencoder (AE) or generative adversarial network (GAN) [47], [48], [49] prior to anomaly detection. Recently, a third approach is to use graph theory to better characterize anomalies from BKG in a rather robust manner [50], [51].…”
Section: Effective Anomaly Spacementioning
confidence: 99%
“…One is referred to BKG separation-before-anomaly detection, which separates BKG before anomaly detection takes place [43], [44]. Another is BKG removal-before-anomaly detection, which removes estimated BKG [45], [46] or reconstructed BKG via autoencoder (AE) or generative adversarial network (GAN) [47], [48], [49] prior to anomaly detection. Recently, a third approach is to use graph theory to better characterize anomalies from BKG in a rather robust manner [50], [51].…”
Section: Effective Anomaly Spacementioning
confidence: 99%
“…If any kind of anomaly is detected, it will give an alert to the system. Gaussian Mixture Model (GMM) [20] is used for object detection in this framework. The main components that are used in this method are preprocessing phase, feature extraction phase, and recognition phase.…”
Section: Multiple Anomalous Activity Detectionmentioning
confidence: 99%
“…This threshold value either knowledge-based or not adaptive to changing WSN environmental conditions. The novel contribution to vampire node detection follows the unsupervised anomaly detection, [21][22][23] which is predominantly used in computer vision and first time introduced in vampire attack detection. The Gaussian mixture model (GMM) is used to find the vampire node based on the connected nodes' anomalous co-operative trust values.…”
Section: Cooperative Trust Calculation and Vampire Node Detectionmentioning
confidence: 99%