anomaly detection

The Pixel Anomaly Detection Tool: a user-friendly GUI for classifying detector frames using machine-learning approaches

Data collection at X-ray free electron lasers has particular experimental challenges, such as continuous sample delivery or the use of novel ultrafast high-dynamic-range gain-switching X-ray detectors. This can result in a multitude of data artefacts, which can be detrimental to accurately determining structure-factor amplitudes for serial crystallography or single-particle imaging experiments. Here, a new data-classification tool is reported that offers a variety of machine-learning algorithms to sort data trained either on manual data sorting by the user or by profile fitting the intensity distribution on the detector based on the experiment. This is integrated into an easy-to-use graphical user interface, specifically designed to support the detectors, file formats and software available at most X-ray free electron laser facilities. The highly modular design makes the tool easily expandable to comply with other X-ray sources and detectors, and the supervised learning approach enables even the novice user to sort data containing unwanted artefacts or perform routine data-analysis tasks such as hit finding during an experiment, without needing to write code.




anomaly detection

Traffic anomaly detection

Location: Engineering Library- TK5102.985.C83 2015




anomaly detection

Biometric attribute anomaly detection system with adjusting notifications

A system, methods and server for monitoring health and safety of individuals in a population and sending alert notifications when exceptions are detected include comparing biometric data obtained from the individuals to a biometric model generated for the individual through computer-learning methods. Biometric data may be gathered by wireless biometric sensor devices which transmit biometric data to receiver devices, which relay the biometric data to a server. The biometric model may be maintained in the server and include nominal and threshold biometric parameters for each individual based on biometric sensor data gathered or analyzed over a period of time. An alert may be issued by the server when an individual's biometric data is outside a threshold in the biometric model. The transmitted alert may depend upon the nature of the exception, user settings and past notification experience. Alerts may be escalated when not answered within defined durations.




anomaly detection

(1 + epsilon)-class Classification: an Anomaly Detection Method for Highly Imbalanced or Incomplete Data Sets

Anomaly detection is not an easy problem since distribution of anomalous samples is unknown a priori. We explore a novel method that gives a trade-off possibility between one-class and two-class approaches, and leads to a better performance on anomaly detection problems with small or non-representative anomalous samples. The method is evaluated using several data sets and compared to a set of conventional one-class and two-class approaches.




anomaly detection

Interpreting Rate-Distortion of Variational Autoencoder and Using Model Uncertainty for Anomaly Detection. (arXiv:2005.01889v2 [cs.LG] UPDATED)

Building a scalable machine learning system for unsupervised anomaly detection via representation learning is highly desirable. One of the prevalent methods is using a reconstruction error from variational autoencoder (VAE) via maximizing the evidence lower bound. We revisit VAE from the perspective of information theory to provide some theoretical foundations on using the reconstruction error, and finally arrive at a simpler and more effective model for anomaly detection. In addition, to enhance the effectiveness of detecting anomalies, we incorporate a practical model uncertainty measure into the metric. We show empirically the competitive performance of our approach on benchmark datasets.




anomaly detection

On Bayesian new edge prediction and anomaly detection in computer networks

Silvia Metelli, Nicholas Heard.

Source: The Annals of Applied Statistics, Volume 13, Number 4, 2586--2610.

Abstract:
Monitoring computer network traffic for anomalous behaviour presents an important security challenge. Arrivals of new edges in a network graph represent connections between a client and server pair not previously observed, and in rare cases these might suggest the presence of intruders or malicious implants. We propose a Bayesian model and anomaly detection method for simultaneously characterising existing network structure and modelling likely new edge formation. The method is demonstrated on real computer network authentication data and successfully identifies some machines which are known to be compromised.




anomaly detection

Anomaly Detection and Imaging with X-Rays (ADIX): 19-20 April 2016, Baltimore, Maryland, United States / Amit Ashok, Mark A. Neifeld, Michael E. Gehm, editors ; sponsored and published by SPIE

Online Resource