Difference between revisions of "Anomaly Detection"
m |
m |
||
| Line 31: | Line 31: | ||
<youtube>5vrY4RbeWkM</youtube> | <youtube>5vrY4RbeWkM</youtube> | ||
<youtube>3swnsoydKTI</youtube> | <youtube>3swnsoydKTI</youtube> | ||
| + | <youtube>B5mPqFOx09U</youtube> | ||
== [[Principal Component Analysis (PCA)]] Anomaly Detection == | == [[Principal Component Analysis (PCA)]] Anomaly Detection == | ||
Revision as of 20:02, 7 September 2020
Youtube search... ...Google search
- Case Studies
- ...find outliers
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Defenses Against Adversarial Attacks
- Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang
______________________________________________________
Principal Component Analysis (PCA) Anomaly Detection
PCA-based anomaly detection - the vast majority of the data falls into a stereotypical distribution; points deviating dramatically from that distribution are suspect Keep it Simple : Machine Learning & Algorithms for Big Boys | Dinesh Chandrasekar