Login / Signup
Understanding and Mitigating Data Contamination in Deep Anomaly Detection: A Kernel-based Approach.
Shuang Wu
Jingyu Zhao
Guangjian Tian
Published in:
IJCAI (2022)
Keyphrases
</>
anomaly detection
data sets
data analysis
streaming data
data sources
data processing
training data
intrusion detection
knowledge discovery
probabilistic model
network traffic
high dimensional
network intrusion detection
detecting anomalies
detect anomalies
network anomaly detection
detecting anomalous