Abstract Outlying Aspect Mining (OAM) aims to find the subspaces (aka aspects) in which a given query is an outlier with respect to a given data set. Existing OAM algorithms use …
In real-world applications, data can be represented using different units/scales. For example, weight in kilograms or pounds and fuel-efficiency in km/l or l/100 km. One unit can be a …
In response to its rapid territorial gains in Syria and Iraq and due to its brutality and human rights abuses, on September 10, 2014, Barack Obama, then President of the United States …
M Garchery, M Granitzer - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
We address intrusion detection in audit sessions, focusing on masquerades and insider threats. Unsupervised intrusion detection can straightforwardly be addressed through …
G Incorvaia, D Hond, H Asgari - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The use of Machine Learning (ML) models as predictive tools has increased dramatically in recent years. However, data-driven systems (such as ML models) exhibit a degree of …
M Davidow, DS Matteson - … Analysis and Data Mining: The ASA …, 2022 - Wiley Online Library
Anomaly detection aims to identify observations that deviate from the typical pattern of data. Anomalous observations may correspond to financial fraud, health risks, or incorrectly …
D Samariya, J Ma - International Conference on Health Information …, 2022 - Springer
The identification of anomalous records in medical data is an important problem with numerous applications such as detecting anomalous reading, anomalous patient health …
G Incorvaia, D Hond, H Asgari - Electronics, 2024 - mdpi.com
The use of Machine Learning (ML) models as predictive tools has increased dramatically in recent years. However, data-driven systems (such as ML models) exhibit a degree of …
S Aryal, JR Wells - Machine Learning and Knowledge Discovery in …, 2021 - Springer
Anomaly Detection (AD) is used in many real-world applications such as cybersecurity, banking, and national intelligence. Though many AD algorithms have been proposed in the …