2021
DOI: 10.1155/2021/4026132
|View full text |Cite
|
Sign up to set email alerts
|

Graph Regularized Deep Sparse Representation for Unsupervised Anomaly Detection

Abstract: Anomaly detection (AD) aims to distinguish the data points that are inconsistent with the overall pattern of the data. Recently, unsupervised anomaly detection methods have aroused huge attention. Among these methods, feature representation (FR) plays an important role, which can directly affect the performance of anomaly detection. Sparse representation (SR) can be regarded as one of matrix factorization (MF) methods, which is a powerful tool for FR. However, there are some limitations in the original SR. On … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 57 publications
0
2
0
Order By: Relevance
“…Injecting graphs to show network links and also to show that agents are very effective in terms of speedy recovery from an attack, even if a significant number of nodes are compromised. To our knowledge, graph-based learning models have never been widely used in IoT communication environments, and have never been used to identify dangerous sources or predict future attacks [18,19].…”
Section: System Methodologymentioning
confidence: 99%
“…Injecting graphs to show network links and also to show that agents are very effective in terms of speedy recovery from an attack, even if a significant number of nodes are compromised. To our knowledge, graph-based learning models have never been widely used in IoT communication environments, and have never been used to identify dangerous sources or predict future attacks [18,19].…”
Section: System Methodologymentioning
confidence: 99%
“…There are a lot of factors to consider when designing solutions for the Internet of Things, including the sheer number of interconnected gadgets, the level of complexity involved, the prevalence of competing trends, and the wide range of variables that must be managed. The present security methods are only suitable for brief sessions on powerful computers [ 3 ].…”
Section: Introductionmentioning
confidence: 99%