A survey on urban traffic anomalies detection algorithms

Y Djenouri, A Belhadi, JCW Lin, D Djenouri… - IEEE Access, 2019 - ieeexplore.ieee.org
This paper reviews the use of outlier detection approaches in urban traffic analysis. We
divide existing solutions into two main categories: flow outlier detection and trajectory outlier …

Orchestrating the development lifecycle of machine learning-based IoT applications: A taxonomy and survey

B Qian, J Su, Z Wen, DN Jha, Y Li, Y Guan… - ACM Computing …, 2020 - dl.acm.org
Machine Learning (ML) and Internet of Things (IoT) are complementary advances: ML
techniques unlock the potential of IoT with intelligence, and IoT applications increasingly …

Gee: A gradient-based explainable variational autoencoder for network anomaly detection

QP Nguyen, KW Lim, DM Divakaran… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
This paper looks into the problem of detecting network anomalies by analyzing NetFlow
records. While many previous works have used statistical models and machine learning …

Discovering spatio-temporal causal interactions in traffic data streams

W Liu, Y Zheng, S Chawla, J Yuan, X Xing - Proceedings of the 17th …, 2011 - dl.acm.org
The detection of outliers in spatio-temporal traffic data is an important research problem in
the data mining and knowledge discovery community. However to the best of our …

Antidote: understanding and defending against poisoning of anomaly detectors

BIP Rubinstein, B Nelson, L Huang… - Proceedings of the 9th …, 2009 - dl.acm.org
Statistical machine learning techniques have recently garnered increased popularity as a
means to improve network design and security. For intrusion detection, such methods build …

[HTML][HTML] Dimensionality reduction using principal component analysis for network intrusion detection

KK Vasan, B Surendiran - Perspectives in Science, 2016 - Elsevier
Intrusion detection is the identification of malicious activities in a given network by analyzing
its traffic. Data mining techniques used for this analysis study the traffic traces and identify …

Unsupervised network intrusion detection systems: Detecting the unknown without knowledge

P Casas, J Mazel, P Owezarski - Computer Communications, 2012 - Elsevier
Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized
signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic …

[PDF][PDF] {SEPIA}:{Privacy-Preserving} aggregation of {Multi-Domain} network events and statistics

M Burkhart, M Strasser, D Many… - 19th USENIX Security …, 2010 - usenix.org
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data
of multiple parties. Although MPC has been studied substantially, building solutions that are …

Spatio-temporal compressive sensing and internet traffic matrices (extended version)

M Roughan, Y Zhang, W Willinger… - IEEE/ACM Transactions …, 2011 - ieeexplore.ieee.org
Despite advances in measurement technology, it is still challenging to reliably compile large-
scale network datasets. For example, because of flaws in the measurement systems or …

Inferring the root cause in road traffic anomalies

S Chawla, Y Zheng, J Hu - 2012 IEEE 12th International …, 2012 - ieeexplore.ieee.org
We propose a novel two-step mining and optimization framework for inferring the root cause
of anomalies that appear in road traffic data. We model road traffic as a time-dependent flow …