2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 2018
DOI: 10.1109/dasc/picom/datacom/cyberscitec.2018.00078
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Anomaly Detection Using Deep Learning on Time Series Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…A graph neural network (GNN) considers correlations among sensors and hidden relationships within multivariate time series, and it has also found application in the domain of anomaly detection [14][15][16]. Besides these reconstruction-error-based methods, various neural network models have also been applied to build prediction-error-based detection methods, such as RNNs [17][18][19][20], CNNs [21], and GNNs [22,23]. Most existing anomaly detection methods are typically end-to-end models that predominantly output deterministic anomaly labels: classifying instances as either anomalies or not.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A graph neural network (GNN) considers correlations among sensors and hidden relationships within multivariate time series, and it has also found application in the domain of anomaly detection [14][15][16]. Besides these reconstruction-error-based methods, various neural network models have also been applied to build prediction-error-based detection methods, such as RNNs [17][18][19][20], CNNs [21], and GNNs [22,23]. Most existing anomaly detection methods are typically end-to-end models that predominantly output deterministic anomaly labels: classifying instances as either anomalies or not.…”
Section: Related Workmentioning
confidence: 99%
“…They lack the capability to indicate the confidence level or the probabilistic nature of their assessments, which is crucial in scenarios for which the distinction between normal and anomalous is not clear-cut. Moreover, the majority of existing research [8,9,13,18] focuses on enhancing the accuracy of detection while often neglecting the importance of providing explanations for the detected results. The authors of [24] introduced a novel design process that integrates human experts into the learning loop by presenting model outcomes in an understandable form.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the LSTM method is applied to identify the intrusions in a network system [59]. Various steps are carried out in the proposed method de􀅫ined in the table above [63]. As a result, the proposed LSTM model method is utilized for indicating results as the output classi􀅫ication, known as Binary Classi􀅫ication, which is used to detect normal and malicious activities, and the other is known as Multiclass Clas-si􀅫ication, which is used to give 􀅫ive outputs including R2L, Probe, Normal, DOS, U2R [54].…”
Section: B Working Of Lstmmentioning
confidence: 99%
“…, the results after the application of the confusion matrix in association with LSTM are shown by the classi􀅫ication of a binary and multiclass classi􀅫ier. Therefore, the paper results as giving 99.2% accuracy for the Binary classi􀅫ication model and 96.9% accuracy for the Multiclass classi􀅫ication model based on classi􀅫ications done by LSTM[54,63].…”
mentioning
confidence: 99%
“…In order to overcome the drawback of hand-crafted features, many models based on deep appearance features are proposed to detect abnormal events. The above deep appearance features can be obtained by using convolutional neural networks [36], [37], recurrent neural networks [38], [39] and autoencoder networks [40], [41].…”
Section: B Deep Appearance Features-based Modelsmentioning
confidence: 99%