Xu et al., 2023 - Google Patents
Masked graph neural networks for unsupervised anomaly detection in multivariate time seriesXu et al., 2023
View HTML- Document ID
- 15568608329835178522
- Author
- Xu K
- Li Y
- Li Y
- Xu L
- Li R
- Dong Z
- Publication year
- Publication venue
- Sensors
External Links
Snippet
Anomaly detection has been widely used in grid operation and maintenance, machine fault detection, and so on. In these applications, the multivariate time-series data from multiple sensors with latent relationships are always high-dimensional, which makes multivariate …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/18—Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tan et al. | Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm | |
Perales Gómez et al. | Madics: A methodology for anomaly detection in industrial control systems | |
Belay et al. | Unsupervised anomaly detection for IoT-based multivariate time series: Existing solutions, performance analysis and future directions | |
Sykiotis et al. | Electricity: An efficient transformer for non-intrusive load monitoring | |
Qi et al. | Detecting cyber attacks in smart grids using semi-supervised anomaly detection and deep representation learning | |
Kang et al. | Anomaly detection of the brake operating unit on metro vehicles using a one-class LSTM autoencoder | |
Cui et al. | Out-of-distribution (OOD) detection based on deep learning: A review | |
Tushkanova et al. | Detection of cyberattacks and anomalies in cyber-physical systems: Approaches, data sources, evaluation | |
Guan et al. | GTAD: Graph and temporal neural network for multivariate time series anomaly detection | |
Pan et al. | High-dimensional energy consumption anomaly detection: a deep learning-based method for detecting anomalies | |
Siqueira et al. | Selection of temporal lags for predicting riverflow series from hydroelectric plants using variable selection methods | |
Xu et al. | TGAN-AD: transformer-based GAN for anomaly detection of time series data | |
Hegazy et al. | Real-time locational detection of stealthy false data injection attack in smart grid: Using multivariate-based multi-label classification approach | |
Mao et al. | A new deep dual temporal domain adaptation method for online detection of bearings early fault | |
Mahmoud et al. | A time-series self-supervised learning approach to detection of cyber-physical attacks in water distribution systems | |
Ding et al. | A deep learning-based classification scheme for false data injection attack detection in power system | |
Jin et al. | Detecting anomalies of satellite power subsystem via stage-training denoising autoencoders | |
Benazzouza et al. | A novel prediction model for malicious users detection and spectrum sensing based on stacking and deep learning | |
Zhang et al. | Three-branch random forest intrusion detection model | |
Zhang et al. | Multi-state household appliance identification based on convolutional neural networks and clustering | |
Du et al. | A systematic review of multi-scale spatio-temporal crime prediction methods | |
Kim et al. | Effect of irrelevant variables on faulty wafer detection in semiconductor manufacturing | |
Huang et al. | Improving Accuracy and Interpretability of CNN-Based Fault Diagnosis through an Attention Mechanism | |
Kampezidou et al. | Fundamental Components and Principles of Supervised Machine Learning Workflows with Numerical and Categorical Data | |
Alrayes et al. | Intrusion detection using chaotic poor and rich optimization with deep learning model for smart city environment |