From Detection to Action: a Human-in-the-loop Toolkit for Anomaly Reasoning and Management
Abstract
Supplementary Material
- Download
- 1.08 MB
References
Index Terms
- From Detection to Action: a Human-in-the-loop Toolkit for Anomaly Reasoning and Management
Recommendations
Visual Analytics Approach for Crane Anomaly Detection Based on Digital Twin
Cooperative Design, Visualization, and EngineeringAbstractAnomaly detection of crane operating status is the basis for ensuring its stable operation. The current detection method based on anomaly detection algorithms cannot clearly distinguish normal data from abnormal data. And the high dimensions of ...
Graph based anomaly detection and description: a survey
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as security, finance, health care, and law enforcement. While numerous techniques have been developed in past years for spotting outliers and anomalies in ...
Human-machine interactive streaming anomaly detection by online self-adaptive forest
AbstractAnomaly detectors are used to distinguish differences between normal and abnormal data, which are usually implemented by evaluating and ranking the anomaly scores of each instance. A static unsupervised streaming anomaly detector is difficult to ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/a2306451-0c76-4ad5-91f0-6aa4e0b9db7a/3604237.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 320Total Downloads
- Downloads (Last 12 months)320
- Downloads (Last 6 weeks)36
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in