enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Anomaly detection - Wikipedia

    en.wikipedia.org/wiki/Anomaly_detection

    ELKI is an open-source Java data mining toolkit that contains several anomaly detection algorithms, as well as index acceleration for them. PyOD is an open-source Python library developed specifically for anomaly detection. [52] scikit-learn is an open-source Python library that contains some algorithms for unsupervised anomaly detection.

  3. Graph neural network - Wikipedia

    en.wikipedia.org/wiki/Graph_neural_network

    When viewed as a graph, a network of computers can be analyzed with GNNs for anomaly detection. Anomalies within provenance graphs often correlate to malicious activity within the network. GNNs have been used to identify these anomalies on individual nodes [ 47 ] and within paths [ 48 ] to detect malicious processes, or on the edge level [ 49 ...

  4. List of datasets for machine-learning research - Wikipedia

    en.wikipedia.org/wiki/List_of_datasets_for...

    On the Evaluation of Unsupervised Outlier Detection: Measures, Datasets, and an Empirical Study Most data files are adapted from UCI Machine Learning Repository data, some are collected from the literature. treated for missing values, numerical attributes only, different percentages of anomalies, labels 1000+ files ARFF: Anomaly detection

  5. List of datasets in computer vision and image processing

    en.wikipedia.org/wiki/List_of_datasets_in...

    Multi-modal dataset for obstacle detection in agriculture including stereo camera, thermal camera, web camera, 360-degree camera, lidar, radar, and precise localization. Classes labelled geographically. >400 GB of data Images and 3D point clouds Classification, object detection, object localization 2017 [52] M. Kragh et al.

  6. Unsupervised learning - Wikipedia

    en.wikipedia.org/wiki/Unsupervised_learning

    Some of the most common algorithms used in unsupervised learning include: (1) Clustering, (2) Anomaly detection, (3) Approaches for learning latent variable models. Each approach uses several methods as follows: Clustering methods include: hierarchical clustering, [13] k-means, [14] mixture models, model-based clustering, DBSCAN, and OPTICS ...

  7. Isolation forest - Wikipedia

    en.wikipedia.org/wiki/Isolation_forest

    Isolation Forest is an algorithm for data anomaly detection using binary trees.It was developed by Fei Tony Liu in 2008. [1] It has a linear time complexity and a low memory use, which works well for high-volume data.

  8. U-Net - Wikipedia

    en.wikipedia.org/wiki/U-Net

    U-Net is a convolutional neural network that was developed for image segmentation. [1] The network is based on a fully convolutional neural network [2] whose architecture was modified and extended to work with fewer training images and to yield more precise segmentation.

  9. One-class classification - Wikipedia

    en.wikipedia.org/wiki/One-class_classification

    The term one-class classification (OCC) was coined by Moya & Hush (1996) [8] and many applications can be found in scientific literature, for example outlier detection, anomaly detection, novelty detection. A feature of OCC is that it uses only sample points from the assigned class, so that a representative sampling is not strictly required for ...