anomaly detection
Recently Published Documents


TOTAL DOCUMENTS

10457
(FIVE YEARS 4975)

H-INDEX

87
(FIVE YEARS 22)

2022 ◽  
Vol 169 ◽  
pp. 108752
Author(s):  
Kilian Vos ◽  
Zhongxiao Peng ◽  
Christopher Jenkins ◽  
Md Rifat Shahriar ◽  
Pietro Borghesani ◽  
...  
Keyword(s):  

Author(s):  
Zhaoyang Jin ◽  
Junbo Zhao ◽  
Lei Ding ◽  
Saikat Chakrabarti ◽  
Elena Gryazina ◽  
...  

2022 ◽  
Vol 3 (1) ◽  
pp. 1-23
Author(s):  
Mao V. Ngo ◽  
Tie Luo ◽  
Tony Q. S. Quek

The advances in deep neural networks (DNN) have significantly enhanced real-time detection of anomalous data in IoT applications. However, the complexity-accuracy-delay dilemma persists: Complex DNN models offer higher accuracy, but typical IoT devices can barely afford the computation load, and the remedy of offloading the load to the cloud incurs long delay. In this article, we address this challenge by proposing an adaptive anomaly detection scheme with hierarchical edge computing (HEC). Specifically, we first construct multiple anomaly detection DNN models with increasing complexity and associate each of them to a corresponding HEC layer. Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network . We also incorporate a parallelism policy training method to accelerate the training process by taking advantage of distributed models. We build an HEC testbed using real IoT devices and implement and evaluate our contextual-bandit approach with both univariate and multivariate IoT datasets. In comparison with both baseline and state-of-the-art schemes, our adaptive approach strikes the best accuracy-delay tradeoff on the univariate dataset and achieves the best accuracy and F1-score on the multivariate dataset with only negligibly longer delay than the best (but inflexible) scheme.


2022 ◽  
Vol 15 (04) ◽  
Author(s):  
Shaoqi Yu ◽  
Xiaorun Li ◽  
Shuhan Chen ◽  
Liaoying Zhao

Author(s):  
Weiqiang Rao ◽  
Ying Qu ◽  
Lianru Gao ◽  
Xu Sun ◽  
Yuanfeng Wu ◽  
...  

2022 ◽  
Vol 10 (1) ◽  
pp. 112
Author(s):  
Konrad Wolsing ◽  
Linus Roepert ◽  
Jan Bauer ◽  
Klaus Wehrle

The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, speed, and course of the sending vessels. AIS can thus serve as a tool to avoid collisions and increase onboard situational awareness. In recent years, AIS has been utilized in more and more applications since it enables worldwide surveillance of virtually any larger vessel and has the potential to greatly support vessel traffic services and collision risk assessment. Anomalies in AIS tracks can indicate events that are relevant in terms of safety and also security. With a plethora of accessible AIS data nowadays, there is a growing need for the automatic detection of anomalous AIS data. In this paper, we survey 44 research articles on anomaly detection of maritime AIS tracks. We identify the tackled AIS anomaly types, assess their potential use cases, and closely examine the landscape of recent AIS anomaly research as well as their limitations.


Sign in / Sign up

Export Citation Format

Share Document