Files
mt/thesis/bib/bibliography.bib
2025-04-03 13:53:45 +02:00

292 lines
14 KiB
BibTeX
Executable File
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
@article{anomaly_detection_survey,
author = {Chandola, Varun and Banerjee, Arindam and Kumar, Vipin},
title = {Anomaly detection: A survey},
year = {2009},
issue_date = {July 2009},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {41},
number = {3},
issn = {0360-0300},
url = {https://doi.org/10.1145/1541880.1541882},
doi = {10.1145/1541880.1541882},
abstract = {Anomaly detection is an important problem that has been researched
within diverse research areas and application domains. Many anomaly
detection techniques have been specifically developed for certain
application domains, while others are more generic. This survey
tries to provide a structured and comprehensive overview of the
research on anomaly detection. We have grouped existing techniques
into different categories based on the underlying approach adopted
by each technique. For each category we have identified key
assumptions, which are used by the techniques to differentiate
between normal and anomalous behavior. When applying a given
technique to a particular domain, these assumptions can be used as
guidelines to assess the effectiveness of the technique in that
domain. For each category, we provide a basic anomaly detection
technique, and then show how the different existing techniques in
that category are variants of the basic technique. This template
provides an easier and more succinct understanding of the
techniques belonging to each category. Further, for each category,
we identify the advantages and disadvantages of the techniques in
that category. We also provide a discussion on the computational
complexity of the techniques since it is an important issue in real
application domains. We hope that this survey will provide a better
understanding of the different directions in which research has
been done on this topic, and how techniques developed in one area
can be applied in domains for which they were not intended to begin
with.},
journal = {ACM Comput. Surv.},
month = jul,
articleno = {15},
numpages = {58},
keywords = {outlier detection, Anomaly detection},
},
@dataset{alexander_kyuroson_2023_7913307,
author = {Alexander Kyuroson and Niklas Dahlquist and Nikolaos Stathoulopoulos
and Vignesh Kottayam Viswanathan and Anton Koval and George
Nikolakopoulos},
title = {Multimodal Dataset from Harsh Sub-Terranean Environment with Aerosol
Particles for Frontier Exploration },
month = may,
year = 2023,
publisher = {Zenodo},
version = {v1},
doi = {10.5281/zenodo.7913307},
url = {https://doi.org/10.5281/zenodo.7913307},
},
@article{deepsad,
author = {Lukas Ruff and Robert A. Vandermeulen and Nico G{\"{o}}rnitz and
Alexander Binder and Emmanuel M{\"{u}}ller and Klaus{-}Robert M{\"{u}
}ller and Marius Kloft},
title = {Deep Semi-Supervised Anomaly Detection},
journal = {CoRR},
volume = {abs/1906.02694},
year = {2019},
url = {http://arxiv.org/abs/1906.02694},
eprinttype = {arXiv},
eprint = {1906.02694},
timestamp = {Thu, 13 Jun 2019 13:36:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1906-02694.bib},
bibsource = {dblp computer science bibliography, https://dblp.org},
},
@inproceedings{subter,
title = {Multimodal Dataset from Harsh Sub-Terranean Environment with Aerosol
Particles for Frontier Exploration},
url = {http://dx.doi.org/10.1109/MED59994.2023.10185906},
DOI = {10.1109/med59994.2023.10185906},
booktitle = {2023 31st Mediterranean Conference on Control and Automation
(MED)},
publisher = {IEEE},
author = {Kyuroson, Alexander and Dahlquist, Niklas and Stathoulopoulos,
Nikolaos and Viswanathan, Vignesh Kottayam and Koval, Anton and
Nikolakopoulos, George},
year = {2023},
month = jun,
pages = {716721},
}
,
@inproceedings{deepsvdd,
title = {Deep One-Class Classification},
author = {Ruff, Lukas and Vandermeulen, Robert and Goernitz, Nico and Deecke,
Lucas and Siddiqui, Shoaib Ahmed and Binder, Alexander and M{\"u}ller
, Emmanuel and Kloft, Marius},
booktitle = {Proceedings of the 35th International Conference on Machine
Learning},
pages = {4393--4402},
year = {2018},
editor = {Dy, Jennifer and Krause, Andreas},
volume = {80},
series = {Proceedings of Machine Learning Research},
month = {10--15 Jul},
publisher = {PMLR},
pdf = {http://proceedings.mlr.press/v80/ruff18a/ruff18a.pdf},
url = {https://proceedings.mlr.press/v80/ruff18a.html},
abstract = {Despite the great advances made by deep learning in many machine
learning problems, there is a relative dearth of deep learning
approaches for anomaly detection. Those approaches which do exist
involve networks trained to perform a task other than anomaly
detection, namely generative models or compression, which are in
turn adapted for use in anomaly detection; they are not trained on
an anomaly detection based objective. In this paper we introduce a
new anomaly detection method—Deep Support Vector Data Description—,
which is trained on an anomaly detection based objective. The
adaptation to the deep regime necessitates that our neural network
and training procedure satisfy certain properties, which we
demonstrate theoretically. We show the effectiveness of our method
on MNIST and CIFAR-10 image benchmark datasets as well as on the
detection of adversarial examples of GTSRB stop signs.},
},
@inproceedings{pmlr-v80-ruff18a,
title = {Deep One-Class Classification},
author = {Ruff, Lukas and Vandermeulen, Robert and Goernitz, Nico and Deecke,
Lucas and Siddiqui, Shoaib Ahmed and Binder, Alexander and M{\"u}ller
, Emmanuel and Kloft, Marius},
booktitle = {Proceedings of the 35th International Conference on Machine
Learning},
pages = {4393--4402},
year = {2018},
editor = {Dy, Jennifer and Krause, Andreas},
volume = {80},
series = {Proceedings of Machine Learning Research},
month = {10--15 Jul},
publisher = {PMLR},
pdf = {http://proceedings.mlr.press/v80/ruff18a/ruff18a.pdf},
url = {https://proceedings.mlr.press/v80/ruff18a.html},
abstract = {Despite the great advances made by deep learning in many machine
learning problems, there is a relative dearth of deep learning
approaches for anomaly detection. Those approaches which do exist
involve networks trained to perform a task other than anomaly
detection, namely generative models or compression, which are in
turn adapted for use in anomaly detection; they are not trained on
an anomaly detection based objective. In this paper we introduce a
new anomaly detection method—Deep Support Vector Data Description—,
which is trained on an anomaly detection based objective. The
adaptation to the deep regime necessitates that our neural network
and training procedure satisfy certain properties, which we
demonstrate theoretically. We show the effectiveness of our method
on MNIST and CIFAR-10 image benchmark datasets as well as on the
detection of adversarial examples of GTSRB stop signs.},
},
@inproceedings{anomaly_detection_medical,
author = {{Wei}, Qi and {Ren}, Yinhao and {Hou}, Rui and {Shi}, Bibo and {Lo},
Joseph Y. and {Carin}, Lawrence},
title = "{Anomaly detection for medical images based on a one-class
classification}",
booktitle = {Medical Imaging 2018: Computer-Aided Diagnosis},
year = 2018,
editor = {{Petrick}, Nicholas and {Mori}, Kensaku},
series = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference
Series},
volume = {10575},
month = feb,
eid = {105751M},
pages = {105751M},
doi = {10.1117/12.2293408},
adsurl = {https://ui.adsabs.harvard.edu/abs/2018SPIE10575E..1MW},
adsnote = {Provided by the SAO/NASA Astrophysics Data System},
},
@article{anomaly_detection_defi,
author = {Ul Hassan, Muneeb and Rehmani, Mubashir Husain and Chen, Jinjun},
journal = {IEEE Communications Surveys & Tutorials},
title = {Anomaly Detection in Blockchain Networks: A Comprehensive Survey},
year = {2023},
volume = {25},
number = {1},
pages = {289-318},
keywords = {Blockchains;Anomaly detection;Security;Smart
contracts;Privacy;Bitcoin;Tutorials;Blockchain;anomaly
detection;fraud detection},
doi = {10.1109/COMST.2022.3205643},
}
,
@article{anomaly_detection_manufacturing,
AUTHOR = {Oh, Dong Yul and Yun, Il Dong},
TITLE = {Residual Error Based Anomaly Detection Using Auto-Encoder in SMD
Machine Sound},
JOURNAL = {Sensors},
VOLUME = {18},
YEAR = {2018},
NUMBER = {5},
ARTICLE-NUMBER = {1308},
URL = {https://www.mdpi.com/1424-8220/18/5/1308},
PubMedID = {29695084},
ISSN = {1424-8220},
ABSTRACT = {Detecting an anomaly or an abnormal situation from given noise is
highly useful in an environment where constantly verifying and
monitoring a machine is required. As deep learning algorithms are
further developed, current studies have focused on this problem.
However, there are too many variables to define anomalies, and the
human annotation for a large collection of abnormal data labeled at
the class-level is very labor-intensive. In this paper, we propose
to detect abnormal operation sounds or outliers in a very complex
machine along with reducing the data-driven annotation cost. The
architecture of the proposed model is based on an auto-encoder, and
it uses the residual error, which stands for its reconstruction
quality, to identify the anomaly. We assess our model using
Surface-Mounted Device (SMD) machine sound, which is very complex,
as experimental data, and state-of-the-art performance is
successfully achieved for anomaly detection.},
DOI = {10.3390/s18051308},
},
@article{anomaly_detection_history,
author = {F.Y. Edgeworth and},
title = {XLI. On discordant observations },
journal = {The London, Edinburgh, and Dublin Philosophical Magazine and
Journal of Science},
volume = {23},
number = {143},
pages = {364--375},
year = {1887},
publisher = {Taylor \& Francis},
doi = {10.1080/14786448708628471},
URL = { https://doi.org/10.1080/14786448708628471 },
eprint = { https://doi.org/10.1080/14786448708628471 },
},
@inproceedings{degradation_quantification_rain,
author = {Zhang, Chen and Huang, Zefan and Ang, Marcelo H. and Rus, Daniela},
booktitle = {2021 IEEE/RSJ International Conference on Intelligent Robots and
Systems (IROS)},
title = {LiDAR Degradation Quantification for Autonomous Driving in Rain},
year = {2021},
volume = {},
number = {},
pages = {3458-3464},
keywords = {Degradation;Location awareness;Laser radar;Rain;Codes;System
performance;Current measurement},
doi = {10.1109/IROS51168.2021.9636694},
},
@article{deep_learning_overview,
title = {Deep learning in neural networks: An overview},
journal = {Neural Networks},
volume = {61},
pages = {85-117},
year = {2015},
issn = {0893-6080},
doi = {https://doi.org/10.1016/j.neunet.2014.09.003},
url = {https://www.sciencedirect.com/science/article/pii/S0893608014002135},
author = {Jürgen Schmidhuber},
keywords = {Deep learning, Supervised learning, Unsupervised learning,
Reinforcement learning, Evolutionary computation},
abstract = {In recent years, deep artificial neural networks (including
recurrent ones) have won numerous contests in pattern recognition
and machine learning. This historical survey compactly summarizes
relevant work, much of it from the previous millennium. Shallow and
Deep Learners are distinguished by the depth of their credit
assignment paths, which are chains of possibly learnable, causal
links between actions and effects. I review deep supervised
learning (also recapitulating the history of backpropagation),
unsupervised learning, reinforcement learning & evolutionary
computation, and indirect search for short programs encoding deep
and large networks.},
},
@article{autoencoder_survey,
title = {A comprehensive survey on design and application of autoencoder in
deep learning},
journal = {Applied Soft Computing},
volume = {138},
pages = {110176},
year = {2023},
issn = {1568-4946},
doi = {https://doi.org/10.1016/j.asoc.2023.110176},
url = {https://www.sciencedirect.com/science/article/pii/S1568494623001941},
author = {Pengzhi Li and Yan Pei and Jianqiang Li},
keywords = {Deep learning, Autoencoder, Unsupervised learning, Feature
extraction, Autoencoder application},
abstract = {Autoencoder is an unsupervised learning model, which can
automatically learn data features from a large number of samples
and can act as a dimensionality reduction method. With the
development of deep learning technology, autoencoder has attracted
the attention of many scholars. Researchers have proposed several
improved versions of autoencoder based on different application
fields. First, this paper explains the principle of a conventional
autoencoder and investigates the primary development process of an
autoencoder. Second, We proposed a taxonomy of autoencoders
according to their structures and principles. The related
autoencoder models are comprehensively analyzed and discussed. This
paper introduces the application progress of autoencoders in
different fields, such as image classification and natural language
processing, etc. Finally, the shortcomings of the current
autoencoder algorithm are summarized, and prospected for its future
development directions are addressed.},
}