Articles with "based anomaly" as a keyword



Log‐based anomaly detection for distributed systems: State of the art, industry experience, and open issues

Sign Up to like & get
recommendations!
Published in 2024 at "Journal of Software: Evolution and Process"

DOI: 10.1002/smr.2650

Abstract: Distributed systems have been widely used in many safety‐critical areas. Any abnormalities (e.g., service interruption or service quality degradation) could lead to application crashes or decrease user satisfaction. These things may cause serious economic losses.… read more here.

Keywords: anomaly detection; based anomaly; log based; distributed systems ... See more keywords
Photo by radowanrehan from unsplash

Mallat’s Scattering Transform Based Anomaly Sensing for Detection of Seizures in Scalp EEG

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2736014

Abstract: Epilepsy is one of the most common neurological disorders, which manifests as unprovoked seizures. The prevalence of epilepsy is higher in developing countries, where medical facilities are ill-equipped and under-staffed. Mobile EEG devices promise a… read more here.

Keywords: detection; anomaly sensing; mallat scattering; transform based ... See more keywords

Random Finite Set-Based Anomaly Detection for Safety Monitoring in Construction Sites

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2932137

Abstract: Low visibility hazard detection in construction sites is a crucial task for prevention of fatal accidents. Manual monitoring of construction workers to ensure they follow the safety rules (e.g., wear high-visibility vests) is a cumbersome… read more here.

Keywords: based anomaly; monitoring; safety; construction ... See more keywords

PGGAN-Based Anomaly Classification on Chest X-Ray Using Weighted Multi-Scale Similarity

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3102954

Abstract: To use artificial intelligence to assist in diagnoses applications, a model to utilize quality data is required, which results in massive time and cost. In medical data, data imbalance occurs because the amount of data… read more here.

Keywords: based anomaly; multi scale; classification; similarity ... See more keywords

Enhancing Sound-Based Anomaly Detection Using Deep Denoising Autoencoder

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3414435

Abstract: Traditional sensor-based methods that detect machine malfunctions in industrial environments are often costly and complex; sound-based anomaly detection offers a simpler alternative. Such methods, however, must contend with industrial noise that masks the sound patterns… read more here.

Keywords: methodology; deep denoising; anomaly detection; based anomaly ... See more keywords
Photo from wikipedia

Federated-Learning-Based Anomaly Detection for IoT Security Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3077803

Abstract: The Internet of Things (IoT) is made up of billions of physical devices connected to the Internet via networks that perform tasks independently with less human intervention. Such brilliant automation of mundane tasks requires a… read more here.

Keywords: federated learning; learning based; based anomaly; iot security ... See more keywords

CapBad: Content-Agnostic, Payload-Based Anomaly Detector for Industrial Control Protocols

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3138534

Abstract: Efficient anomaly detection methods are urgently needed to prevent attacks in the application layer of the Industrial Internet of Things (IIoT). The existing intrusion detection systems have certain limitations in detecting abnormal packets exploited by… read more here.

Keywords: anomaly detector; based anomaly; content agnostic; payload based ... See more keywords

Epileptic Seizure Detection by Cascading Isolation Forest-Based Anomaly Screening and EasyEnsemble

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Neural Systems and Rehabilitation Engineering"

DOI: 10.1109/tnsre.2022.3163503

Abstract: The electroencephalogram (EEG), for measuring the electrophysiological activity of the brain, has been widely applied in automatic detection of epilepsy seizures. Various EEG-based seizure detection algorithms have already yielded high sensitivity, but training those algorithms… read more here.

Keywords: forest based; seizure; based anomaly; isolation forest ... See more keywords
Photo from academic.microsoft.com

Isolation‐based anomaly detection using nearest‐neighbor ensembles

Sign Up to like & get
recommendations!
Published in 2018 at "Computational Intelligence"

DOI: 10.1111/coin.12156

Abstract: The first successful isolation‐based anomaly detector, ie, iForest, uses trees as a means to perform isolation. Although it has been shown to have advantages over existing anomaly detectors, we have identified 4 weaknesses, ie, its… read more here.

Keywords: isolation based; anomaly detection; using nearest; detection using ... See more keywords

Squirrel search method for deep learning-based anomaly identification in videos

Sign Up to like & get
recommendations!
Published in 2024 at "Bulletin of Electrical Engineering and Informatics"

DOI: 10.11591/eei.v13i2.5933

Abstract: The monitoring of human behavior and traffic surveillance in various locations has become increasingly important in recent years. However, identifying abnormal activity in real-world settings is a challenging task due to the many different types… read more here.

Keywords: deep learning; method; search; squirrel search ... See more keywords

Towards a more secure reconstruction-based anomaly detection model for power transformer differential protection

Sign Up to like & get
recommendations!
Published in 2024 at "Frontiers in Energy Research"

DOI: 10.3389/fenrg.2024.1444697

Abstract: Cyberattacks against Power Transformer Differential Protection (PTDP) have the potential to cause significant disruption and widespread blackouts in power infrastructure. Recent literature has demonstrated how reconstruction-based anomaly detection models can play a critical role in… read more here.

Keywords: detection; anomaly detection; based anomaly; reconstruction based ... See more keywords