What makes a good data augmentation for few-shot unsupervised image anomaly detection?
Shuheng ZhangLingrui ZhangGuoyang XieJiaqi LiuHua YanJinbao WangFeng ZhengYaochu JinPublished in: CoRR (2023)
Keyphrases
- anomaly detection
- data sets
- data sources
- data processing
- detect anomalies
- data analysis
- network intrusion detection
- intrusion detection
- video sequences
- data points
- data mining techniques
- data mining applications
- input data
- network anomaly detection
- network intrusion
- computer systems
- knowledge discovery
- object recognition
- image sequences