• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 253
  • 17
  • 17
  • 15
  • 13
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 396
  • 396
  • 176
  • 170
  • 133
  • 116
  • 86
  • 74
  • 71
  • 63
  • 59
  • 58
  • 51
  • 48
  • 47
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems

Al Rawashdeh, Khaled 02 October 2018 (has links)
No description available.
122

Hierarchical Anomaly Detection for Time Series Data

Sperl, Ryan E. 07 June 2020 (has links)
No description available.
123

Application of Autoencoder Ensembles in Anomaly and Intrusion Detection using Time-Based Analysis

Mathur, Nitin O. January 2020 (has links)
No description available.
124

Causal AI for Outlier Detection : Using causality to single out suspicious transactionsand identifying anomalies

Virding, Olle, Leoson, Love January 2023 (has links)
AbstractThe purpose of this thesis was to construct a program capable of detecting outliers, that is datapoints that do not follow trends that can be found within a dataset, by using Causal AI. Detectionof outliers has a very wide range of use since the term outliers can be adjusted to fit differenttypes of problems. This specific program can therefore be used in different manors to achievediverse beneficial results. In this specific thesis the program were used to detect suspicioustransactions which can eliminate unnecessary or wrongful purchases which can contribute toeconomic growth. The implementation of Causal AI was performed by using python and theDoWhy package. The Causal AI was used to determine and evaluate causal relationshipbetween input parameters in the dataset where outliers were to be detected. The identificationof outliers was then performed by letting the values of the data points be compared to theestablished causal relations. Data points that did not follow the causal flow was then labeled asoutliers. The result was a causal thinking machine learning model capable of detecting outliersas well as explaining the reason behind why the data point was labeled as an outlier. Theperformance was deemed to be satisfactory since the results seemed to follow reasonablecausal thinking as well as achieving similar results with different training data. The model turnedout to be very flexible with a wide range of uses. This flexibility was greater than what wasoriginally anticipated. Being able to replicate causal thinking using a machine learning model incombination with the models’ flexibility results in a program with such a wide area of use manydifferent problems can be automated. One example of this is the implementation of the programto make sure a sustainability policy is being followed resulting in contributing to a sustainabledevelopment in the world.
125

W2R: an ensemble Anomaly detection model inspired by language models for web application firewalls security

Wang, Zelong, AnilKumar, Athira January 2023 (has links)
Nowadays, web application attacks have increased tremendously due to the large number of users and applications. Thus, industries are paying more attention to using Web application Firewalls and improving their security which acts as a shield between the app and the internet by filtering and monitoring the HTTP traffic. Most works focus on either traditional feature extraction or deep methods that require no feature extraction method. We noticed that a combination of an unsupervised language model and a classic dimension reduction method is less explored for this problem. Inspired by this gap, we propose a new unsupervised anomaly detection model with better results than the existing state-of-the-art model for anomaly detection in WAF security. This paper focuses on this structure to explore WAF security: 1) feature extraction from HTTP traffic packets by using NLP (natural language processing) methods such as word2vec and Bert, and 2) Dimension reduction by PCA and Autoencoder, 3) Using different types of anomaly detection techniques including OCSVM, isolation forest, LOF and combination of these algorithms to explore how these methods affect results.  We used the datasets CSIC 2010 and ECML/PKDD 2007 in this paper, and the model has better results.
126

Low Rank and Sparse Representation for Hyperspectral Imagery Analysis

Sumarsono, Alex Hendro 11 December 2015 (has links)
This dissertation develops new techniques employing the Low-rank and Sparse Representation approaches to improve the performance of state-of-the-art algorithms in hyperspectral image analysis. The contributions of this dissertation are outlined as follows. 1) Low-rank and sparse representation approaches, i.e., low-rank representation (LRR) and low-rank subspace representation (LRSR), are proposed for hyperspectral image analysis, including target and anomaly detection, estimation of the number of signal subspaces, supervised and unsupervised classification. 2) In supervised target and unsupervised anomaly detection, the performance can be improved by using the LRR sparse matrix. To further increase detection accuracy, data is partitioned into several highly-correlated groups. Target detection is performed in each group, and the final result is generated from the fusion of the output of each detector. 3) In the estimation of the number of signal subspaces, the LRSR low-rank matrix is used in conjunction with direct rank calculation and soft-thresholding. Compared to the state-of-the-art algorithms, the LRSR approach delivers the most accurate and consistent results across different datasets. 4) In supervised and unsupervised classification, the use of LRR and LRSR low-rank matrices can improve classification accuracy where the improvement of the latter is more significant. The investigation on state-of-the-art classifiers demonstrate that, as a pre-preprocessing step, the LRR and LRSR produce low-rank matrices with fewer outliers or trivial spectral variations, thereby enhancing class separability.
127

Dimension Reduction for Hyperspectral Imagery

Ly, Nam H (Nam Hoai) 14 December 2013 (has links)
In this dissertation, the general problem of the dimensionality reduction of hyperspectral imagery is considered. Data dimension can be reduced through compression, in which an original image is encoded into bitstream of greatly reduced size; through application of a transformation, in which a high-dimensional space is mapped into a low-dimensional space; and through a simple process of subsampling, wherein the number of pixels is reduced spatially during image acquisition. All three techniques are investigated in the course of the dissertation. For data compression, an approach to calculate an operational bitrate for JPEG2000 in conjunction with principal component analysis is proposed. It is shown that an optimal bitrate for such a lossy compression method can be estimated while maintaining both class separability as well as anomalous pixels in the original data. On the other hand, the transformation paradigm is studied for spectral dimensionality reduction; specifically, dataindependent random spectral projections are considered, while the compressive projection principal component analysis algorithm is adopted for data reconstruction. It is shown that, by incorporating both spectral and spatial partitioning of the original data, reconstruction accuracy can be improved. Additionally, a new supervised spectral dimensionality reduction approach using a sparsity-preserving graph is developed. The resulting sparse graph-based discriminant analysis is seen to yield superior classification performance at low dimensionality. Finally, for spatial dimensionality reduction, a simple spatial subsampling scheme is considered for a multitemporal hyperspectral image sequence, such that the original image is reconstructed using a sparse dictionary learned from a prior image in the sequence.
128

Improvement and Implementation of Gumbel-Softmax VAE

Fangshi, Zhou 10 August 2022 (has links)
No description available.
129

Anomaly detection in electricity demand time series data

Bakhtawar Shah, Mahmood January 2019 (has links)
The digitalization of the energy industry has made tremendous energy data available. This data is utilized across the entire energy value chain to provide value for customers and energy providers. One area that has gained recent attention in the energy industry is the electricity load forecasting for better scheduling and bidding on the electricity market. However, the electricity data that is used for forecasting is prone to have anomalies, which can affect the accuracy of forecasts. In this thesis we propose two anomaly detection methods to tackle the issue of anomalies in electricity demand data. We propose Long short-term memory (LSTM) and Feed-forward neural network (FFNN) based methods, and compare their anomaly detection performance on two real-world electricity demand datasets. Our results indicate that the LSTM model tends to produce a more robust behavior than the FFNN model on the dataset with regular daily and weekly patterns. However, there was no significant difference between the performance of the two models when the data was noisy and showed no regular patterns. While our results suggest that the LSTM model is effective when a regular pattern in data is present, the results were not found to be statistically significant to claim superiority of LSTM over FFNN. / Digitaliseringen inom energibranschen har tillgängliggjort enorma mängder energidata. Dessa data används över hela värdekedjan för energisystem i syfte att skapa värde för kunder och energileverantörer. Ett område som nyligen uppmärksammats inom energibranschen är att skapa prognoser för elbelastning för bättre schemaläggning och budgivning på elmarknaden. Data som används för sådana prognoser är dock benägna att ha avvikelser, vilket kan påverka prognosernas noggrannhet. I det här examensarbetet föreslår vi två metoder för detektering av avvikelser för att ta itu med frågan om avvikelser i data för elektricitetsbehov. Vi föreslår metoder baserade på Long short-term memory (LSTM) och Feedforward neural network (FFNN) och jämför dess prestanda att upptäcka avvikelser på två verkliga databanker över elbehovsdata. Våra resultat indikerar att LSTM-modellen tenderar att producera ett mer robust beteende än FFNN-modellen på data med upprepande dagliga samt veckovisa mönster. Det fanns dock ingen signifikant skillnad mellan prestanda för de två modellerna när data inte uppvisade regelbunda mönster. Även om våra resultat antyder att LSTM-modellen är effektiv när ett regelbundet datamönster finns närvarande, var resultaten inte statistiskt signifikanta för att påstå överlägsenhet av LSTM jämfört med FFNN.
130

Automated Foreign Object Detection on Conveyor Belts

Sundelius, Kim January 2023 (has links)
Ore is transported using belt conveyor systems. The transported ore has various anomalous objects that must be removed to prevent damage to the system. Currently anomalies are detected manually using humans. This leads to increased costs of wages and damage to the system overmissed anomalies. The thesis aims to solve this problem via the use of trained neural networks which can run on relatively cheap systems with a greater accuracy than humans. A set of neural networks were trained on both the BCS dataset consisting of data collected from the belt conveyor system and on the MVTec dataset. The latter dataset was used as a way of checking the correctness of the implementation of the models. As training neural networks usually requires large datasets, this thesis also focuses on the effect of the portion of labelled versus unlabelled data on the models. Labelling data can be time consuming and expensive so investigating if or how much data can be unlabelled without any or minimal loss to accuracy could lead to further cost reductions. The convolutional autoencoder (CAE) performed best on the classification based task on the BCS dataset where it managed to classify most of the dataset correctly, with an F1-score of 0.94 on data without anomalies and an F1-score of 0.86 on data with anomalies, as long as suitable thresholds were set. ResNet performed somewhat well with a 0.91 F1-score in detecting anomaly free data and a 0.50 F1-score in detecting anomaly containing data. The SimCLR and SimCLRv2 models were unable to learn from the data and defaulted to always assuming the data contained anomalies. The CAE model trained using the L1 loss function performed best with an IoU of 0.272 and performed worst with the SSIM based loss function with an IoU of 0.160. The effect of labelled versus unlabelled data using the MVTec dataset was tested using the SimCLR and SimCLRv2 models and the models performed best with the fully labelled dataset which was expected. The SimCLR model was able to identify all categories with an F1-score greater than 0.67 whereas the other splits performed worse overall with two or more categories completely misclassified. The SimCLRv2 was able to classify six categories with an F1-score greater than 0.0 which was significantly better than all other labelled and unlabelled splits.

Page generated in 0.389 seconds