Difference between revisions of "Anomaly Detection"
| Line 14: | Line 14: | ||
* [[Government Services]] | * [[Government Services]] | ||
* [[Capabilities]] | * [[Capabilities]] | ||
| − | * [[Defenses Against Adversarial | + | * [[Defenses Against Adversarial Attacks]] |
* [http://arxiv.org/abs/1906.03821 Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang] | * [http://arxiv.org/abs/1906.03821 Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang] | ||
______________________________________________________ | ______________________________________________________ | ||
Revision as of 21:28, 1 October 2019
Youtube search... ...Google search
- Cybersecurity
- ...find outliers
- Government Services
- Capabilities
- Defenses Against Adversarial Attacks
- Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang
______________________________________________________
Principal Component Analysis (PCA) Anomaly Detection
PCA-based anomaly detection - the vast majority of the data falls into a stereotypical distribution; points deviating dramatically from that distribution are suspect Keep it Simple : Machine Learning & Algorithms for Big Boys | Dinesh Chandrasekar