Constructing a meta-learner for unsupervised anomaly detection

M Gutowska, S Little, A Mccarren - IEEE Access, 2023 - ieeexplore.ieee.org
Unsupervised anomaly detection (AD) is critical for a wide range of practical applications,
from network security to health and medical tools. Due to the diversity of problems, no single …

Novel meta-features for automated machine learning model selection in anomaly detection

M Kotlar, M Punt, Z Radivojević, M Cvetanović… - IEEE …, 2021 - ieeexplore.ieee.org
A growing number of research papers shed light on automated machine learning (AutoML)
frameworks, which are becoming a promising solution for building complex machine …

Meta-learning for Robust Anomaly Detection

A Kumagai, T Iwata, H Takahashi… - International …, 2023 - proceedings.mlr.press
We propose a meta-learning method to improve the anomaly detection performance on
unseen target tasks that have only unlabeled data. Existing meta-learning methods for …

Anomaly detection with score distribution discrimination

M Jiang, S Han, H Huang - Proceedings of the 29th ACM SIGKDD …, 2023 - dl.acm.org
Recent studies give more attention to the anomaly detection (AD) methods that can leverage
a handful of labeled anomalies along with abundant unlabeled data. These existing …

Leveraging vector-quantized variational autoencoder inner metrics for anomaly detection

H Gangloff, MT Pham, L Courtrai… - 2022 26th International …, 2022 - ieeexplore.ieee.org
Anomaly Detection (AD) is an important research topic, with very diverse applications such
as industrial defect detection, medical diagnosis, fraud detection, intrusion detection, etc …

N-1 experts: Unsupervised anomaly detection model selection

C Le Clei, Y Pushak, F Zogaj, MO Kareshk… - First Conference on …, 2022 - openreview.net
Manually finding the best combination of machine learning training algorithm, model and
hyperparameters can be challenging. In supervised settings, this burden has been …

Meta-learning to improve unsupervised intrusion detection in cyber-physical systems

T Zoppi, M Gharib, M Atif, A Bondavalli - ACM Transactions on Cyber …, 2021 - dl.acm.org
Artificial Intelligence (AI)-based classifiers rely on Machine Learning (ML) algorithms to
provide functionalities that system architects are often willing to integrate into critical Cyber …

Aesmote: Adversarial reinforcement learning with smote for anomaly detection

X Ma, W Shi - IEEE Transactions on Network Science and …, 2020 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) play a vital role in securing today's Data-Centric
Networks. In a dynamic environment such as the Internet of Things (IoT), which is vulnerable …

Active learning methodology for expert-assisted anomaly detection in mobile communications

JA Trujillo, I de-la-Bandera, J Burgueño, D Palacios… - Sensors, 2022 - mdpi.com
Due to the great complexity, heterogeneity, and variety of services, anomaly detection is
becoming an increasingly important challenge in the operation of new generations of mobile …

AutoML: state of the art with a focus on anomaly detection, challenges, and research directions

M Bahri, F Salutari, A Putina, M Sozio - International Journal of Data …, 2022 - Springer
The last decade has witnessed the explosion of machine learning research studies with the
inception of several algorithms proposed and successfully adopted in different application …