Traffic anomaly detection using deep semi-supervised learning at the mobile edge

A Pelati, M Meo, P Dini - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
In this paper, we design an Anomaly Detection (AD) framework for mobile data traffic,
capable of identifying different types of anomalous events generated by flash crowds in …

Unsupervised anomaly detection of healthcare providers using generative adversarial networks

K Naidoo, V Marivate - Responsible Design, Implementation and Use of …, 2020 - Springer
Healthcare fraud is considered a challenge for many societies. Health care funding that
could be spent on medicine, care for the elderly or emergency room visits are instead lost to …

" Was It You Who Stole 500 Rubles?"-The Multimodal Deception Detection

V Karpova, P Popenova, N Glebko… - … Publication of the 2020 …, 2020 - dl.acm.org
Automatic deception detection is a challenging issue since human behaviors are too
complex to establish any standard behavioral signs that would explicitly indicate that a …

An initial investigation on sliding windows for anomaly-based intrusion detection

T Zoppi, A Ceccarellli… - 2019 IEEE world congress …, 2019 - ieeexplore.ieee.org
The growing systems complexity calls for dedicated monitoring and data analysis strategies
aiming to detect faults, attacks and errors before they escalate into failures. Distributed and …

Cellular frustration algorithms for anomaly detection applications

B Faria, F Vistulo de Abreu - Plos one, 2019 - journals.plos.org
Cellular frustrated models have been developed to describe how the adaptive immune
system works. They are composed by independent agents that continuously pair and unpair …

Identifying Abnormal Energy Consumption Patterns in Industrial Settings: Application of Local Outlier Factor Algorithm for a Processing Factory in Vietnam

HA Dang, VD Dao, CD Dang… - 2023 Asia Meeting on …, 2023 - ieeexplore.ieee.org
In practice, the energy consumption of industrial equipment rises mostly due to wear and
tear, which might include leaks or faulty plant conditions. By using statistical techniques and …

Independent and Sequential Ensemble Methods for Anomaly Detection

MS Di Blasi - 2023 - webthesis.biblio.polito.it
Anomaly detection problems are particularly important in various real-word contest such as
fraud detection, finance, intrusion detection and cyber-security. Several methods that are …

[PDF][PDF] Machine Learning techniques to shape Intelligent Human-Centered Cyber-Physical Systems

EG Cicceri - 2022 - researchgate.net
During the last years of technological development, we are seeing exponential growth in the
number of Internet of Things (IoT) devices we interact with daily, which is leading to an …

[PDF][PDF] Machine Learning approaches for Anomaly Detection in Industrial IoT scenarios

E Convento - 2022 - thesis.unipd.it
1.1 Main Goals Data-driven techniques are gaining more and more ground becoming more
powerful and complex, capable of performing incredible tasks. On the other hand the …

[PDF][PDF] A Grid Partition-Based Local Outlier Factor for Big Data Stream Processing

RA Alsini - 2021 - objects.lib.uidaho.edu
Outlier detection is getting significant attention in the research field of big data. Detecting the
outlier is important in various applications such as communication, finance, fraud detection …