2022
DOI: 10.1007/978-981-16-8862-1_45
|View full text |Cite
|
Sign up to set email alerts
|

Smart Anomaly Detection Using Data-Driven Techniques in IoT Edge: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 44 publications
0
1
0
Order By: Relevance
“…The output feature of the one-hot encoding is either 1's or 0's. To accelerate the speed and diminish the precision loss of the DL techniques, a popular Min-Max normalization is executed, and the old samples (χ Min , χ Max ) are converted to new samples (F min , F max ) using Equation (1) [46]. the data point count in the majority and minority classes is high, which results in the class imbalance problem.…”
Section: ) Frame Work For Anomaly Detectionmentioning
confidence: 99%
“…The output feature of the one-hot encoding is either 1's or 0's. To accelerate the speed and diminish the precision loss of the DL techniques, a popular Min-Max normalization is executed, and the old samples (χ Min , χ Max ) are converted to new samples (F min , F max ) using Equation (1) [46]. the data point count in the majority and minority classes is high, which results in the class imbalance problem.…”
Section: ) Frame Work For Anomaly Detectionmentioning
confidence: 99%
“…Anomaly detection(AD) or outlier detection refers to the techniques for identifying patterns or observations in data that do not conform to an expected behavior [131]. This techniques are used in variety of IoT smart applications [131] such as, smart city, smart monitoring and smart power management. Mostly of this applications used sensors as an input device.…”
Section: Tinyml and Anomaly Detectionmentioning
confidence: 99%
“…Mostly of this applications used sensors as an input device. These devices generated a huge volume of data that are transmitted to the cloud servers for analysis, decision making and storage [131].…”
Section: Tinyml and Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In previous research, individual ML algorithms have been examined, but their false alarm rates and detection rates are not more effective. Many ML algorithms have been considered for building IDS, such as decision tree (DT) [11], dimensionality reduction algorithms [12], random forest (RF) [13], swarm intelligence techniques [14], support vector machine (SVM) [15], K-nearest neighbor (KNN) [16], logistic regression (LR) [16], and naive Bayes (NB) [17]. However, designing a robust anomaly detection model using a single ML algorithm is a challenging endeavor.…”
Section: Introductionmentioning
confidence: 99%