Making reconstruction-based method great again for video anomaly detection

Y Wang, C Qin, Y Bai, Y Xu, X Ma… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Anomaly detection in videos is a significant yet challenging problem. Previous approaches
based on deep neural networks employ either reconstruction-based or prediction-based …

Towards explainable visual anomaly detection

Y Wang, D Guo, S Li, Y Fu - arXiv preprint arXiv:2302.06670, 2023 - arxiv.org
Anomaly detection and localization of visual data, including images and videos, are of great
significance in both machine learning academia and applied real-world scenarios. Despite …

SLA2P: Self-supervised Anomaly Detection with Adversarial Perturbation

Y Wang, C Qin, R Wei, Y Xu, Y Bai… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Anomaly detection is a foundational yet difficult problem in machine learning. In this work,
we propose a new and effective framework, dubbed as SLA 2 P, for unsupervised anomaly …

A Bidirectional Differential Evolution Based Unknown Cyberattack Detection System

H Huang, T Li, B Li, W Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The evolving unknown cyberattacks, compounded by the widespread emerging
technologies (say 5G, Internet of Things, etc.), have rapidly expanded the cyber threat …

Momentum is All You Need for Data-Driven Adaptive Optimization

Y Wang, Y Kang, C Qin, H Wang, Y Xu… - … Conference on Data …, 2023 - ieeexplore.ieee.org
Adaptive gradient methods, eg, ADAM, have achieved tremendous success in data-driven
machine learning, especially deep learning. Employing adaptive learning rates according to …

Towards Zero-shot 3D Anomaly Localization

Y Wang, KC Peng, Y Fu - arXiv preprint arXiv:2412.04304, 2024 - arxiv.org
3D anomaly detection and localization is of great significance for industrial inspection. Prior
3D anomaly detection and localization methods focus on the setting that the testing data …

SORTAD: Self-Supervised Optimized Random Transformations for Anomaly Detection in Tabular Data

G Hay, P Liberman - arXiv preprint arXiv:2311.11018, 2023 - arxiv.org
We consider a self-supervised approach to anomaly detection in tabular data. Random
transformations are applied to the data, and then each transformation is identified based on …

A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks

H Huang, B Li, T Li - IEEE INFOCOM 2024-IEEE Conference …, 2024 - ieeexplore.ieee.org
The evolving unknown cyberattacks have rapidly increased the cyber threat surface.
However, since only known cyberattack samples are usually available, most existing …

Unveiling the Power of Transfer Learning Towards Efficient Artificial Intelligence

C Qin - 2023 - search.proquest.com
Large-scale models, abundant data, and dense computation are the pivotal pillars of deep
neural networks. The present-day deep learning models have made significant strides in …

Towards Efficient Deep Learning in Computer Vision via Network Sparsity and Distillation

H Wang - 2024 - search.proquest.com
Artificial intelligence (AI) empowered by deep learning, has been profoundly transforming
the world. However, the excessive size of these models remains a central obstacle that limits …