Latent Outlier Exposure for Anomaly Detection with Contaminated Data.
Chen QiuAodong LiMarius KloftMaja RudolphStephan MandtPublished in: ICML (2022)
Keyphrases
- anomaly detection
- data sets
- data sources
- data analysis
- streaming data
- detect anomalies
- data processing
- network traffic
- machine learning
- anomalous behavior
- detecting anomalies
- computer security
- intrusion detection
- data mining techniques
- data points
- bayesian networks
- training data
- network anomaly detection
- unsupervised anomaly detection