We study the network untangling problem introduced by Rozenshtein, Tatti, and Gionis [DMKD 2021], which is a variant of Vertex Cover on temporal graphs-graphs whose edge set changes over discrete time steps. They intr...
详细信息
As the Internet is developing rapidly and people are becoming increasingly dependent on e-commerce, whether the users can be provided with accurate recommendation information has become the key to attracting users. Un...
详细信息
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m...
详细信息
ISBN:
(数字)9798331506681
ISBN:
(纸本)9798331506698
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based methods are the base algorithms to detect anomalies in these scenarios for their simplicity and efficiency, which has been further exploited with multi-folk trees and learning mechanisms to realize the optimal isolation forest for high detection accuracy. However, the optimal isolation forest is time-consuming with the learning mechanisms, resulting in the task failing of time-constrained applications. Moreover, the original optimal isolation forest fails to construct the optimal tree structure restricted by the time complexity. To address the above challenges, we propose an efficient anomaly detection method called EEIF, which realizes the real e-folk structure of the optimal isolation forest in our practical algorithm design. Specifically, we design a distribution that perfectly matches the e-branch theory to construct the optimal isolation forest. Then, we design an FR clustering scheme to achieve fast training of the isolation forest with learning to hash and provide related proofs of accuracy and efficiency. Besides, a parallel algorithm is integrated into our method to reduce prediction time. Finally, extensive experiments are conducted on a large amount of real-world datasets and the results demonstrate that our method significantly improves efficiency while ensuring effectiveness, compared with the state-of-the-art methods.
Identification of a person gender as a man or woman based on the past experiences through features of face such as eyes, mouth, cheek can be obtained through an intelligent gender recognition system. Detection of a pe...
详细信息
The article is focused on the problem of named numeric characteristics extraction from the text data in Russian. This problem have a significant impact to the wide variety of natural language processing tasks such as ...
详细信息
Vertex Cover parameterized by the solution size k is the quintessential fixed-parameter tractable problem. FPT algorithms are most interesting when the parameter is small. Several lower bounds on k are well-known, suc...
详细信息
In recent years, face recognition technology has developed rapidly, and its application range has become more and more extensive. It is one of the most important application fields in computer vision technology. Howev...
详细信息
Evaluation of peripheral auditory nerve system health in patients with hearing loss by auditory brainstem response (ABR) testing. Audiologists record and evaluate ABRs by manually timing and evaluating the waveforms f...
详细信息
The assessment of the well-being of the peripheral auditory nerve system in individuals experiencing hearing impairment is conducted through auditory brainstem response (ABR) testing. Audiologists assess and document ...
详细信息
This theoretical paper continues a long line of research works about the stability of power systems represented by reduced order models. We provide a small-signal stability criterion for a dynamic model that uses time...
详细信息
暂无评论