… when similarities are “too high” or “too low.” In this paper, we focus on anomalydetection for … We do this by computing one or more similarityscores between two consecutive web graphs…
N Rafiee, R Gholamipoor, M Kollmann - arXiv preprint arXiv …, 2020 - academia.edu
… We therefore train a semantic similarityscore, s(x, x′), to detect semantic differences between nearby examples on the unit-hypersphere, which are determined by the readily trained …
… Other than these two issues, the supervised anomalydetection problem is similar to building … Scoring-based anomalydetection techniques allow the analyst to use a domainspecific …
… This paper examines the use of distance and similarity measures as used in Network Intrusion Detection (NID). There are a set of fundamental definitions of distance measures as …
C Li, L Guo, H Gao, Y Li - IEEE Transactions on Instrumentation …, 2021 - ieeexplore.ieee.org
… anomalydetection method called similarity-measured isolation forest (SM-iForest) is proposed to detect … Thereafter, the feature matrix was reused to measure the anomalyscore of each …
S Ranshous, S Shen, D Koutra… - Wiley …, 2015 - Wiley Online Library
… related work in graph mining, anomalydetection, and the high-… of anomalies that these algorithms detect, namely, anomalous … of the changes in similarityscores. Edges with the highest …
T Lane, CE Brodley - … Workshop: AI Approaches to Fraud Detection …, 1997 - cdn.aaai.org
… To examine the hypothesis that detecting match adjacency is useful for this task, we modified MC-P to bias the similarityscore in favor of adjacent matches (as described below). This …
AM Safin, E Burnaev - Advances in Systems Science and Applications, 2017 - ijassa.ipu.ru
… was indicated, the anomalyscore provided by this … anomalyscore produced by EXPoSE. To that end, the idea of Conformal AnomalyDetection is adopted to build an anomalydetector …
… enabling our approach is that the distribution of the normal examples’ anomalyscores in both domains will be similar if they are derived using the same anomalydetection algorithm. …