2013
DOI: 10.1007/978-3-642-40597-6_19
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Techniques for Anomalies Detection and Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…CNNs leverage the concept of local receptive fields, where small filters scan the input image to capture local patterns and structures. (Aziz et al, 2013b;Banu et al, 2017;Ding et al, 2015;Elshazly et al, 2013c;Kumar et al, 2015b;Sayed et al, 2020;Samanta et al, 2018). As the information propagates through the network, deeper layers extract increasingly abstract and task-specific features.…”
Section: Feature Extraction Using Convolutional Neural Networkmentioning
confidence: 99%
“…CNNs leverage the concept of local receptive fields, where small filters scan the input image to capture local patterns and structures. (Aziz et al, 2013b;Banu et al, 2017;Ding et al, 2015;Elshazly et al, 2013c;Kumar et al, 2015b;Sayed et al, 2020;Samanta et al, 2018). As the information propagates through the network, deeper layers extract increasingly abstract and task-specific features.…”
Section: Feature Extraction Using Convolutional Neural Networkmentioning
confidence: 99%
“…They showed that in general J48 gave better results than other classifiers, while for certain attacks Naïve Bayes gave the best results. Subsequently in (Abdel-Aziz et al, 2013b), Aziz et al proposed an anomaly detector generation approach using genetic algorithm in combination with several feature selection techniques, including principle component analysis, sequential floating, and correlation-based feature selection. To generate a set of detectors from a single run, a genetic algorithm was applied with deterministic crowding niching techniques.…”
Section: Related Work and Our Contributionmentioning
confidence: 99%
“…In general, these methods strive to explicitly and effectively model the non-outliers as means to detect the outliers. 18 As an example, these methods are used by the financial industry to define normal patterns of customer spending in order to capture the anomalous, fraudulent transactions. 19 In this study, we defined mIDH GBM as anomalies within the distribution of all GBMs and utilized established anomaly detection methods for their detection.…”
mentioning
confidence: 99%