2023
DOI: 10.1007/978-3-031-26412-2_30
|View full text |Cite
|
Sign up to set email alerts
|

Multi-domain Active Learning for Semi-supervised Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The transfer anomaly detection methods presented in [9]- [12] make the same assumption as this work; that is, as in our method, these studies use both anomalous and normal samples in a related dataset, also known as source data, and only normal data in the data of the interest, also known as the target dataset. The algorithms presented in [10], [11] are instance-based transfer learning methods, where the source data is transferred to the target domain after estimating the distribution of both source data and the target data. After the transfer, an LOF-based anomaly detection algorithm is built using transferred source data in [10] or using both transferred source data and unlabeled target data in [11].…”
Section: B Transfer Learning In Anomaly Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…The transfer anomaly detection methods presented in [9]- [12] make the same assumption as this work; that is, as in our method, these studies use both anomalous and normal samples in a related dataset, also known as source data, and only normal data in the data of the interest, also known as the target dataset. The algorithms presented in [10], [11] are instance-based transfer learning methods, where the source data is transferred to the target domain after estimating the distribution of both source data and the target data. After the transfer, an LOF-based anomaly detection algorithm is built using transferred source data in [10] or using both transferred source data and unlabeled target data in [11].…”
Section: B Transfer Learning In Anomaly Detectionmentioning
confidence: 99%
“…The algorithms presented in [10], [11] are instance-based transfer learning methods, where the source data is transferred to the target domain after estimating the distribution of both source data and the target data. After the transfer, an LOF-based anomaly detection algorithm is built using transferred source data in [10] or using both transferred source data and unlabeled target data in [11]. An important assumption of the methods presented in [10], [11] is that an ample amount of target data is needed to ensure accurate density estimation of the target data distribution.…”
Section: B Transfer Learning In Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation