A survey of outlier detection in high dimensional data streams

I Souiden, MN Omri, Z Brahmi - Computer Science Review, 2022 - Elsevier
The rapid evolution of technology has led to the generation of high dimensional data
streams in a wide range of fields, such as genomics, signal processing, and finance. The …

PCA-based multivariate statistical network monitoring for anomaly detection

J Camacho, A Pérez-Villegas, P García-Teodoro… - Computers & …, 2016 - Elsevier
The multivariate approach based on Principal Component Analysis (PCA) for anomaly
detection received a lot of attention from the networking community one decade ago, mainly …

Fast tensor factorization for accurate internet anomaly detection

K Xie, X Li, X Wang, G Xie, J Wen… - … /ACM transactions on …, 2017 - ieeexplore.ieee.org
Detecting anomalous traffic is a critical task for advanced Internet management. Many
anomaly detection algorithms have been proposed recently. However, constrained by their …

A PCA-based method for IoT network traffic anomaly detection

DH Hoang, HD Nguyen - 2018 20th International conference …, 2018 - ieeexplore.ieee.org
Network operators need effective tools to quickly detect anomalies in traffic data for
identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT …

Anomaly detection for cellular networks using big data analytics

B Li, S Zhao, R Zhang, Q Shi, K Yang - IET Communications, 2019 - Wiley Online Library
Broadband connectivity and mobile technology have been widely applied in the world. With
these advanced technologies, the proliferation of smart devices and their applications by …

Network intrusion detection using clustering and gradient boosting

P Verma, S Anwar, S Khan… - 2018 9th International …, 2018 - ieeexplore.ieee.org
An unauthorized activity on the network is called network intrusion and device or software
application which monitors the network parameters in order to detect such an intrusion is …

Applications of sketches in network traffic measurement: A survey

H Han, Z Yan, X Jing, W Pedrycz - Information Fusion, 2022 - Elsevier
Accurate and timely network traffic measurement is essential for network status monitoring,
network fault analysis, network intrusion detection, and network security management. With …

Graph based tensor recovery for accurate internet anomaly detection

K Xie, X Li, X Wang, G Xie, J Wen… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
Detecting anomalous traffic is a crucial task of managing networks. Many anomaly detection
algorithms have been proposed recently. However, constrained by their matrix-based traffic …

A new instrumented approach for translating American Sign Language into sound and text

JL Hernandez-Rebollar… - … on Automatic Face …, 2004 - ieeexplore.ieee.org
This work discusses an approach for capturing and translating isolated gestures of American
Sign Language into spoken and written words. The instrumented part of the system …

Deep learning detection of anomalous patterns from bus trajectories for traffic insight analysis

X Zhang, Y Zheng, Z Zhao, Y Liu… - Knowledge-Based …, 2021 - Elsevier
Existing data-driven methods for traffic anomaly detection are modeled on taxi trajectory
datasets. The concern is that the data may contain much inaccuracy about the actual traffic …