International Uzbekistan-Malaysia Conference on “Computational Models and Technologies (Cmt2020)”: Cmt2020 2021
DOI: 10.1063/5.0058132
|View full text |Cite
|
Sign up to set email alerts
|

Data preprocessing on input

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…One of the real ways to reduce the cost of resources for detecting attacks is the selection of informative feature sets [10]. The main goals pursued in feature selection are to achieve high accuracy and prevent retraining of algorithms [15]. When identifying selection methods, they are divided into 3 main types [16]:…”
Section: Releated Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the real ways to reduce the cost of resources for detecting attacks is the selection of informative feature sets [10]. The main goals pursued in feature selection are to achieve high accuracy and prevent retraining of algorithms [15]. When identifying selection methods, they are divided into 3 main types [16]:…”
Section: Releated Workmentioning
confidence: 99%
“…When developing a model based on machine learning algorithms, it is of particular importance to decide on the composition of the feature set and objects used as input data [15], [26]. The goals pursued in the selection of informative features:…”
Section: Releated Workmentioning
confidence: 99%
“…The main drawbacks of most existing approaches to anomaly detection are summarized [19], [20]. These approaches are not optimized for detecting anomalies, a consequence, these approaches are often not efficient enough, which leads to too many false alarms (when normal instances are identified as anomalies) or too many anomalies; many existing methods are limited to low-dimensional data and small data size due to their legacy algorithms.…”
mentioning
confidence: 99%
“…These approaches are not optimized for detecting anomalies, a consequence, these approaches are often not efficient enough, which leads to too many false alarms (when normal instances are identified as anomalies) or too many anomalies; many existing methods are limited to low-dimensional data and small data size due to their legacy algorithms. Based on this overview in the previous paragraphs, we compare our method with these methods regarding our statement of the task, and the main contributions of the paper in continuity [20] are: − We construct a latent feature by a simple-linear combination of two features in order to conduct logical analysis based on two features; − We propose an expert-based model which leverages the latent feature to solve the problem of logical inconsistencies; − We suggest how to utilize this model providing a general example, and we also compare the results with results of existing methods, even though many of them are suitable for another task. For example, the DBSCAN is a clustering algorithm, however, it can separate the noisy clusters too [21].…”
mentioning
confidence: 99%