2020
DOI: 10.1016/j.patcog.2019.107119
|View full text |Cite
|
Sign up to set email alerts
|

Generalized support vector data description for anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 48 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…A related challenge is formed by those species that are completely absent from the reference database on which the deep learning models are trained. Detecting such species requires techniques developed for multiple-class novelty/anomaly detection or open set/world recognition (94,95). A recent survey introduced various open set recognition methods with the two main approaches being discriminative and generative (96).…”
Section: Potential Deep Learning Applications In Entomologymentioning
confidence: 99%
“…A related challenge is formed by those species that are completely absent from the reference database on which the deep learning models are trained. Detecting such species requires techniques developed for multiple-class novelty/anomaly detection or open set/world recognition (94,95). A recent survey introduced various open set recognition methods with the two main approaches being discriminative and generative (96).…”
Section: Potential Deep Learning Applications In Entomologymentioning
confidence: 99%
“…To compare the performance of different procedures, we use two different performance measures which are introduced by Turkoz et al (2020). The total classification accuracy rate (TCAR) is used for determination of the best parameters with validation dataset and the classification accuracy rate for the testing dataset which is defined as follows:…”
Section: Experimental Methodologymentioning
confidence: 99%
“…Several ADS [7], [8] are used in recent IoT systems to detect anomalies and malicious nodes in the network and provide countermeasures to mitigate them. Consequently, they are considered as a solution to improve the system reliability.…”
Section: B Cloud and Fog Computingmentioning
confidence: 99%