How to Allocate your Label Budget? Choosing between Active Learning and Learning to Reject in Anomaly Detection.
Lorenzo PeriniDaniele GiannuzziJesse DavisPublished in: CoRR (2023)
Keyphrases
- anomaly detection
- active learning
- learning process
- intrusion detection
- learning algorithm
- anomalous behavior
- network traffic
- intrusion detection system
- unsupervised learning
- behavior analysis
- active learner
- connectionist systems
- supervised learning
- training set
- object recognition
- feature extraction
- computer security
- genetic algorithm
- one class support vector machines
- detecting anomalous