[PDF][PDF] Rolling bearing anomaly detection based on generative adversarial networks

F Hua - Artificial Intelligence and Robotics Research, 2019 - pdf.hanspub.org
… number of abnormal samples. However, machine learning algorithms and deep learning
methods, such as Naive Bayes (NB) and Convolutional Neural Networks (CNN), are difficult to …

[PDF][PDF] A method of APT attack detection based on DBN-SVDD

F Liu, Y Li, F Xia, J Zhou - Comput. Sci. Appl, 2017 - pdf.hanspub.org
… the detection scheme for APT attack has three schemes: sandbox scheme, network anomaly
… Comparison with the results of other deep learning methods 表2. 与其他深度学习方法的结果…

[PDF][PDF] A review of the application of deep learning in trajectory data mining

X Li, J Pi - Computer Science and Application, 2019 - pdf.hanspub.org
… In the last decade, deep learning has been proved to be successful … deep learning models
showed their powerful learning abilities, such as Deep Convolutional Neural Network, Deep

[PDF][PDF] Abnormal vessel behavior detection based on AIS Data

S Zhang, Q Tang - Artificial Intelligence and Robotics Research, 2015 - pdf.hanspub.org
… us with promising ways to investigate the law of ship motions and the detection of abnormal
behaviours. In this paper, various algorithms used for detecting abnormal behaviours of ship …

[PDF][PDF] Flood Hazard Assessment Methods: Research Review

H Chen, Y Liu, K Lin, T Lan, Z Liu, W Li - J. Water Resour. Res, 2020 - pdf.hanspub.org
… forecast members based on supervised machine learning with application to runoff …
different rainfall return periods based on deep learning and data warehouse. Science of the …

[HTML][HTML] Open sourcing a deep learning solution for detecting nsfw images

J Mahadeokar, G Pesavento - Retrieved August, 2016 - csdndocs.com
… , we are releasing our deep learning model that will allow … detection, and provide feedback
to us on ways to improve the classifier. Our general purpose Caffe deep neural network

[PDF][PDF] A design and simulation of adaptive intrusion detection system based on data mining

X Su, T Shi - Computer Science and Application, 2018 - pdf.hanspub.org
… of abnormal behavior. For cases of being more than safety threshold value, using the isolated
forest detection … , and thus find abnormal data to achieve the detection effect. Experiments …

[PDF][PDF] A review of research on vehicle re-identification methods with unsupervised learning

Y Xu, X Guo, L Rong - J. Front. Comput. Sci. Technol, 2023 - researchgate.net
… A deep learning-based approach to progressive vehicle re-identification for urban
surveillance[C]//Proceedings of the European Conference on Computer Vision, Amsterdam, Oct8-16, …

基于模式识别的结构健康监测异常数据诊断

K Gao, S Weng, Z Chen, H Zhu… - Jianzhu Jiegou Xuebao …, 2024 - research.polyu.edu.hk
… data anomalies identification method based on feature extraction and pattern recognition
neural network (… , and the operation time is only one-tenth of the time of deep learning methods. …

网络异常检测领域概念漂移问题研究综述

杜冠瑶, 郭勇杰, 龙春, 赵静, 万巍 - 数据与计算发展前沿, 2024 - jfdc.cnic.cn
… in the field of network anomaly detection. In comparison to … the field of flow data in network
anomaly detection. [Literature Scope] … methods, machine learning methods, and deep learning