What Makes a Good Data Augmentation for Few-Shot Unsupervised Image Anomaly Detection?
Lingrui ZhangShuheng ZhangGuoyang XieJiaqi LiuHua YanJinbao WangFeng ZhengYaochu JinPublished in: CVPR Workshops (2023)
Keyphrases
- anomaly detection
- data sets
- training data
- data sources
- input data
- network traffic
- data points
- data mining techniques
- detect anomalies
- computer security
- anomalous behavior
- intrusion detection system
- unsupervised learning
- data processing
- pattern recognition
- data mining methods
- network intrusion detection
- computer systems