2019
DOI: 10.1109/tase.2018.2848198
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Anomaly Detection Based on Minimum Spanning Tree Approximated Distance Measures and its Application to Hydropower Turbines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 38 publications
(24 citation statements)
references
References 41 publications
0
24
0
Order By: Relevance
“…The number of the nearest neighbors ( k ) is required to be set in non-NMF-based methods. According to the guideline of [ 62 ], this paper tunes the values of k from 1 to 100 and the best value will be chosen. In our experiment, we only report the true positive detection number of all of the test methods.…”
Section: Experiments Results and Analysismentioning
confidence: 99%
“…The number of the nearest neighbors ( k ) is required to be set in non-NMF-based methods. According to the guideline of [ 62 ], this paper tunes the values of k from 1 to 100 and the best value will be chosen. In our experiment, we only report the true positive detection number of all of the test methods.…”
Section: Experiments Results and Analysismentioning
confidence: 99%
“…Using this option, we in this work make use of two existing anomaly detection approaches. One is the local minimum spanning tree (LoMST) [30] and another is the connectivity outlier factor (COF) [31].…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…Kim et al [ 41 ] applied a combination of four outlier detection methods, namely (a) Gaussian density estimation, (b) Parzen window density estimation, (c) Principal component analysis, and (d) K-means clustering to identify malicious activities in an institution using user log database. The outlier identification methods can be broadly categorized into statistical-based [ 42 ], distance-based [ 43 ], graph-based [ 44 ], clustering-based [ 45 ], density-based [ 46 ], and ensemble-based [ 47 ]. Once the outliers are detected, it is crucial to delete, consider, or modify the outlier.…”
Section: Related Workmentioning
confidence: 99%