Neural Transformation Learning for Deep Anomaly Detection Beyond Images.
Chen QiuTimo PfrommerMarius KloftStephan MandtMaja RudolphPublished in: ICML (2021)
Keyphrases
- anomaly detection
- intrusion detection
- learning algorithm
- reinforcement learning
- learning process
- anomalous behavior
- supervised learning
- network intrusion detection
- object recognition
- network traffic
- connectionist systems
- neural network
- computer security
- input image
- pattern recognition
- network security
- intrusion detection system
- network anomaly detection
- negative selection algorithm
- data mining