咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 7 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 2 篇 交通运输工程
    • 1 篇 控制科学与工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 11 篇 anomaly detectio...
  • 3 篇 anomaly detectio...
  • 2 篇 intrusion detect...
  • 2 篇 machine learning
  • 1 篇 internet of thin...
  • 1 篇 connected and au...
  • 1 篇 industry 5
  • 1 篇 reliability
  • 1 篇 tissue
  • 1 篇 object detection
  • 1 篇 user notificatio...
  • 1 篇 resource intensi...
  • 1 篇 world wide web
  • 1 篇 anomalous pressu...
  • 1 篇 localized abnorm...
  • 1 篇 intelligent conn...
  • 1 篇 false positive p...
  • 1 篇 high-speed netwo...
  • 1 篇 sensitivity anal...
  • 1 篇 generative adver...

机构

  • 1 篇 laboratoire de v...
  • 1 篇 school of comput...
  • 1 篇 chungbuk natl un...
  • 1 篇 dalian polytech ...
  • 1 篇 cse department s...
  • 1 篇 karabuk univ kas...
  • 1 篇 galgotias univer...
  • 1 篇 istanbul tech un...
  • 1 篇 guangdong weiche...
  • 1 篇 school of inform...
  • 1 篇 univ michigan de...
  • 1 篇 institute of sta...
  • 1 篇 department of in...
  • 1 篇 univ innsbruck i...
  • 1 篇 sandip institute...
  • 1 篇 research center ...
  • 1 篇 faculty of infor...
  • 1 篇 barracuda networ...
  • 1 篇 school of comput...
  • 1 篇 jiangsu acad saf...

作者

  • 1 篇 kanani naitik
  • 1 篇 girdhar mansi
  • 1 篇 potgantwar amol
  • 1 篇 bidollahkhani mi...
  • 1 篇 baek sunhye
  • 1 篇 xiao kun
  • 1 篇 li yun
  • 1 篇 chen lirong
  • 1 篇 chen ming
  • 1 篇 li zhanying
  • 1 篇 hjelm johan
  • 1 篇 djeddi chawki
  • 1 篇 morikawa hiroyuk...
  • 1 篇 hendri sutrisno
  • 1 篇 oda toshikane
  • 1 篇 dressler falko
  • 1 篇 sommer christoph
  • 1 篇 zuhair mohd
  • 1 篇 zhou danhua
  • 1 篇 chun-fu chen

语言

  • 10 篇 英文
  • 1 篇 其他
检索条件"主题词=anomaly detection algorithm"
11 条 记 录,以下是1-10 订阅
排序:
anomaly detection algorithm for localized abnormal weather using low-cost wireless sensor nodes  7
Anomaly detection algorithm for localized abnormal weather u...
收藏 引用
IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA)
作者: Otsuka, Takanobu Torii, Yoshitaka Ito, Takayuki Nagoya Inst Technol Gokiso Showa 4668555 Japan
In recent years, we have witnessed an unpresented increase localized heavy weather phenomena such as tornadoes and localized heavy rain which can not be expected by the conventional weather forecast system. However, t... 详细信息
来源: 评论
anomaly detection algorithm with Blockchain to Detect Potential Security Attacks in the IIoT Model of Industry 5.0  2nd
Anomaly Detection Algorithm with Blockchain to Detect Potent...
收藏 引用
2nd International Conference on Advanced Engineering, Technology and Applications, ICAETA 2023
作者: Pant, Piyush Goyal, S.B. Rajawat, Anand Singh Potgantwar, Amol Bedi, Pradeep Djeddi, Chawki School of Computer Sciences and Engineering Sandip University Nashik India Faculty of Information Technology City University Petaling Jaya46100 Malaysia Sandip Institute of Technology and Research Center Nashik India Galgotias University Greater Noida India Laboratoire de Vison et d’intelligence Artificielle Université Larbi Tebessi Tébessa Algeria
The research presents a model for detecting potential security attacks in the Industry 5.0’s Internet of Things (IIoT) model using an anomaly detection algorithm, with Blockchain technology to further enhance securit... 详细信息
来源: 评论
Real-Time Building Management System Visual anomaly detection Using Heat Points Motion Analysis Machine Learning algorithm
收藏 引用
TEHNICKI VJESNIK-TECHNICAL GAZETTE 2023年 第1期30卷 318-323页
作者: Avci, Isa Bidollahkhani, Michael Karabuk Univ Kastamonu Yolu Demir Celik Kampusu TR-78050 Kilavuzlar Karabuk Turkiye
The multiplicity of design, construction, and use of IoT devices in homes has made it crucial to provide secure and manageable building management systems and platforms. Increasing security requires increasing the com... 详细信息
来源: 评论
Ubiquitous Computing of Low-Cost Pollutant Sensors for Monitoring Pollutant Gases in the Construction Sector
Ubiquitous Computing of Low-Cost Pollutant Sensors for Monit...
收藏 引用
3rd International Conference on Advancements in Smart Computing and Information Security, ASCIS 2024
作者: Geddam, Rebakah Zuhair, Mohd Shah, Kush Vyas, Karm Kanani, Naitik CSE Department School of Technology Nirma University Ahmedabad India
The growing urbanization in India has been closely associated with the expansion of the cement industry. Acknowledging the significant impact of air pollution from the cement industry on the environment, human health,... 详细信息
来源: 评论
anomaly detection for Connected and Automated Vehicles: Accident Analysis
Anomaly Detection for Connected and Automated Vehicles: Acci...
收藏 引用
IEEE Transportation Electrification Conference and Expo (ITEC)
作者: Girdhar, Mansi Hong, Junho You, Yongsik Song, Tai-Jin Univ Michigan Dearborn Dept Elect & Comp Engn Dearborn MI 48128 USA Chungbuk Natl Univ Dept Urban Engn Cheongju South Korea
Smart mobility is a key component of smart cities, and the switch from traditional automotive systems to connected and automated vehicles (CAVs) is recognized as one of the evolving technologies on urban roads. Althou... 详细信息
来源: 评论
anomaly detection from the operation history of DLNA devices
Anomaly detection from the operation history of DLNA devices
收藏 引用
2nd International Conference on Ubiquitous and Future Networks, ICUFN 2010
作者: Baek, Sunhye Si, Hua Saruwatari, Shunsuke Morikawa, Hiroyuki Hjelm, Johan Oda, Toshikane Research Center for Advanced Science and Technology University of Tokyo Tokyo 153-8904 Japan Ericsson Research Japan Tokyo 112-0004 Japan
With the development of DLNA technology, more and more DLNA devices appear in our lives. We can extract users' activity events from the operation history of DLNA devices, and provide various services based on them... 详细信息
来源: 评论
An approach for chest tube detection in chest radiographs
收藏 引用
IET IMAGE PROCESSING 2014年 第2期8卷 122-129页
作者: Mercan, Cem Ahmet Celebi, Mustafa Serdar Istanbul Tech Univ Inst Informat TR-34469 Istanbul Turkey
It is known that overlapping tissues cause highly complex projections in chest radiographs. In addition, artificial objects, such as catheters, chest tubes and pacemakers can appear on these radiographs. It is importa... 详细信息
来源: 评论
State-of-Charge Estimation for Lead-Acid Battery Using Isolation Forest algorithm and Long Short Term Memory Network With Attention Mechanism
收藏 引用
IEEE ACCESS 2023年 11卷 49193-49204页
作者: Zhang, Xinwei Li, Zhanying Zhou, Danhua Chen, Ming Dalian Polytech Univ Sch Informat Sci & Engn Dalian 116000 Peoples R China Jiangsu Acad Safety Sci & Technol Nanjing 210000 Peoples R China Shenzhen DACEEN Technol Co Ltd Shenzhen 518004 Peoples R China
State of charge (SOC) is the most direct embodiment of the state of a lead-acid battery, and accurate estimation of SOC is helpful to ensure the safe use of the battery. However, the traditional estimation model has l... 详细信息
来源: 评论
Adaptive Load Allocation for Combining anomaly Detectors Using Controlled Skips
Adaptive Load Allocation for Combining Anomaly Detectors Usi...
收藏 引用
International Conference on Computing, Networking and Communications (ICNC)
作者: Berger, Mario Erlacher, Felix Sommer, Christoph Dressler, Falko Barracuda Networks Innsbruck Austria Univ Innsbruck Inst Comp Sci Comp & Commun Syst A-6020 Innsbruck Austria
Traditional Intrusion detection Systems (IDS) can be complemented by an anomaly detection algorithm (ADA) to also identify unknown attacks. We argue that, as each ADA has its own strengths and weaknesses, it might be ... 详细信息
来源: 评论
GAN-IVDS: An Intrusion detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks  8
GAN-IVDS: An Intrusion Detection System for Intelligent Conn...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Chen, Xiansen Xiao, Kun Luo, Lei Li, Yun Chen, Lirong School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Guangdong Weichen Information Technology Co. Ltd Dongguan China
This paper proposes an anomaly detection algorithm based on Generative Adversarial Networks (GANs) for intrusion detection in Intelligent Connected Vehicles (ICVs). To address the imbalance between normal network traf... 详细信息
来源: 评论