Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

Outlier detection: Methods, models, and classification

A Boukerche, L Zheng, O Alfandi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Over the past decade, we have witnessed an enormous amount of research effort dedicated
to the design of efficient outlier detection techniques while taking into consideration …

Deep isolation forest for anomaly detection

H Xu, G Pang, Y Wang, Y Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Isolation forest (iForest) has been emerging as arguably the most popular anomaly detector
in recent years due to its general effectiveness across different benchmarks and strong …

The shape of learning curves: a review

T Viering, M Loog - IEEE Transactions on Pattern Analysis and …, 2022 - ieeexplore.ieee.org
Learning curves provide insight into the dependence of a learner's generalization
performance on the training set size. This important tool can be used for model selection, to …

Learning representations of ultrahigh-dimensional data for random distance-based outlier detection

G Pang, L Cao, L Chen, H Liu - Proceedings of the 24th ACM SIGKDD …, 2018 - dl.acm.org
Learning expressive low-dimensional representations of ultrahigh-dimensional data, eg,
data with thousands/millions of features, has been a major way to enable learning methods …

A comprehensive survey of anomaly detection algorithms

D Samariya, A Thakkar - Annals of Data Science, 2023 - Springer
Anomaly or outlier detection is consider as one of the vital application of data mining, which
deals with anomalies or outliers. Anomalies are considered as data points that are …

Toward deep supervised anomaly detection: Reinforcement learning from partially labeled anomaly data

G Pang, A van den Hengel, C Shen, L Cao - Proceedings of the 27th …, 2021 - dl.acm.org
We consider the problem of anomaly detection with a small set of partially labeled anomaly
examples and a large-scale unlabeled dataset. This is a common scenario in many …

Statistical analysis of nearest neighbor methods for anomaly detection

X Gu, L Akoglu, A Rinaldo - Advances in Neural Information …, 2019 - proceedings.neurips.cc
Nearest-neighbor (NN) procedures are well studied and widely used in both supervised and
unsupervised learning problems. In this paper we are concerned with investigating the …

Isolation‐based anomaly detection using nearest‐neighbor ensembles

TR Bandaragoda, KM Ting, D Albrecht… - Computational …, 2018 - Wiley Online Library
The first successful isolation‐based anomaly detector, ie, iForest, uses trees as a means to
perform isolation. Although it has been shown to have advantages over existing anomaly …

AI-enhanced blockchain technology: A review of advancements and opportunities

D Ressi, R Romanello, C Piazza, S Rossi - Journal of Network and …, 2024 - Elsevier
Blockchain technology has rapidly gained popularity, permeating various fields due to its
inherent features of security, transparency, and decentralization. Blockchain-based …