Searched for: +
(1 - 16 of 16)
document
Ghorbani, R. (author), Reinders, M.J.T. (author), Tax, D.M.J. (author)
Photoplethysmography (PPG) signals, typically acquired from wearable devices, hold significant potential for continuous fitness-health monitoring. In particular, heart conditions that manifest in rare and subtle deviating heart patterns may be interesting. However, robust and reliable anomaly detection within these data remains a challenge...
journal article 2024
document
Zhao, Z. (author), Huang, J. (author), Chen, Lydia Y. (author), Roos, S. (author)
Generative Adversarial Networks (GANs) are increasingly adopted by the industry to synthesize realistic images using competing generator and discriminator neural networks. Due to data not being centrally available, Multi-Discriminator (MD)-GANs training frameworks employ multiple discriminators that have direct access to the real data....
conference paper 2024
document
Wen, Minzhen (author), Ibrahim, Mesfin Seid (author), Meda, Abdulmelik Husen (author), Zhang, Kouchi (author), Fan, J. (author)
High-power white light-emitting diodes (LEDs) have demonstrated superior efficiency and reliability compared to traditional white light sources. However, ensuring maximum performance for a prolonged lifetime use presents a significant challenge for manufacturers and end users, especially in safety–critical applications. Thus, identifying...
journal article 2024
document
Dong, Y. (author), Chen, Kejia (author), Ma, Zhiyuan (author)
Condition-based maintenance is becoming increasingly important in hydraulic systems. However, anomaly detection for these systems remains challenging, especially since that anomalous data is scarce and labeling such data is tedious and even dangerous. Therefore, it is advisable to make use of unsupervised or semi-supervised methods, especially...
conference paper 2023
document
Liu, Minne (author), Ibrahim, Mesfin S. (author), Wen, Minzhen (author), Li, Sheng (author), Wang, An (author), Zhang, Kouchi (author), Fan, J. (author)
Spectral power distribution (SPD) is the radiation power intensity at different wavelengths, containing the most basic photometric and colorimetric performance of the illuminant, which is able to predict the lifetime of LEDs. This paper proposes an SPD model assisted by machine learning algorithms to detect the early failure of white LEDs. The...
conference paper 2023
document
Pan, K. (author), Palensky, P. (author), Mohajerin Esfahani, P. (author)
The main objective of this article is to develop scalable dynamic anomaly detectors with high-fidelity simulators of power systems. On the one hand, models in high-fidelity simulators are typically 'intractable' if one opts to describe them in a mathematical formulation in order to apply existing model-based approaches from the anomaly...
journal article 2022
document
Hu, F. (author), van Leijen, F.J. (author), Chang, L. (author), Wu, Jicang (author), Hanssen, R.F. (author)
Synthetic aperture radar (SAR) missions with short repeat times enable opportunities for near real-time deformation monitoring. Traditional multitemporal interferometric SAR (MT-InSAR) is able to monitor long-term and periodic deformation with high precision by time-series analysis. However, as time series lengthen, it is time-consuming to...
journal article 2022
document
Herrera Semenets, V. (author), Hernández-León, Raudel (author), Bustio-Martínez, Lázaro (author), van den Berg, Jan (author)
Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling...
conference paper 2022
document
Zhang, Qinglong (author), Han, Rui (author), Xin, Gaofeng (author), Liu, Chi Harold (author), Wang, Guoren (author), Chen, Lydia Y. (author)
Deep neural networks (DNNs) have been showing significant success in various anomaly detection applications such as smart surveillance and industrial quality control. It is increasingly important to detect anomalies directly on edge devices, because of high responsiveness requirements and tight latency constraints. The accuracy of DNN-based...
journal article 2022
document
Zhao, Weizun (author), Li, L. (author), Alam, Sameer (author), Wang, Yanjun (author)
Safety is a top priority for civil aviation. Data mining in digital Flight Data Recorder (FDR) or Quick Access Recorder (QAR) data, commonly referred to as black box data on aircraft, has gained interest for proactive safety management. New anomaly detection methods, primarily clustering methods, have been developed to monitor pilot...
journal article 2021
document
Rostampour, Vahab (author), Ferrari, Riccardo M.G. (author), Teixeira, Andre M.H. (author), Keviczky, T. (author)
In this article two limitations in current distributed model based approaches for anomaly detection in large-scale uncertain nonlinear systems are addressed. The first limitation regards the high conservativeness of deterministic detection thresholds, against which a novel family of set-based thresholds is proposed. Such set-based thresholds...
journal article 2020
document
Doğru, Anil (author), Bouarfa, Soufiane (author), Arizar, Ridwan (author), Aydoğan, Reyhan (author)
Convolutional Neural Networks combined with autonomous drones are increasingly seen as enablers of partially automating the aircraft maintenance visual inspection process. Such an innovative concept can have a significant impact on aircraft operations. Though supporting aircraft maintenance engineers detect and classify a wide range of...
journal article 2020
document
Lin, Q. (author), Verwer, S.E. (author), Kooij, Robert (author), Mathur, Aditya (author)
The availability of high-quality benchmark datasets is an important prerequisite for research and education in the cyber security domain. Datasets from realistic systems offer a platform for researchers to develop and test novel models and algorithms. Such datasets also offer students opportunities for active and project-centric learning. In...
conference paper 2020
document
Bortolameotti, Riccardo (author), Van Ede, Thijs (author), Continella, Andrea (author), Hupperich, Thomas (author), Everts, Maarten H. (author), Rafati, Reza (author), Jonker, Willem (author), Hartel, P.H. (author), Peter, Andreas (author)
Passive application fingerprinting is a technique to detect anomalous outgoing connections. By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of new applications (e.g., malware infection). In this work, we...
conference paper 2020
document
Wang, C. (author), Pan, K. (author), Tindemans, Simon H. (author), Palensky, P. (author)
The security of energy supply in a power grid critically depends on the ability to accurately estimate the state of the system. However, manipulated power flow measurements can potentially hide overloads and bypass the bad data detection scheme to interfere the validity of estimated states. In this paper, we use an autoencoder neural network to...
conference paper 2020
document
Gallos, Lazaros K. (author), Korczynski, M.T. (author), Fefferman, Nina H. (author)
Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detection are subject to inherent constraints: (1) they create a communication burden on the system, (2) they impose a delay in detection while...
journal article 2017
Searched for: +
(1 - 16 of 16)