1 |
Sun, B., P. B. Luh, Q. S. Jia, Z. O'Neill, and F. Song, "Building energy doctors: An spc and kalman filter-based method for system-level fault detection in hvac systems", IEEE Transactions on Automation Science and Engineering, Vol.11, No.1, (2014), 215-229.
DOI
|
2 |
Du, Z., B. Fan, X. Jin and J. Chi, "Fault detection and diagnosis for buildings and hvac systems using combined neural networks and subtractive clustering analysis", building and environment, Vol.73 (2014), 1-11
DOI
|
3 |
Koturwar, P., D. Mukhopadhyay and S. Griase, A survey of classification techniques in the area of big data, Department of Information Technology Maharashtra Instititute of Techonology, 2014, Available at https://arxiv.org/abs/1503.07477 (Downloaded 10 June, 2019)
|
4 |
Pimentel, A.F M., D. A. Clifton, L. Clifton and L. Tarassenko, "A review of novelty detection", Signal Processing, Vol.99, (2014), 215-249
DOI
|
5 |
Ye, N., S. Vilbert and Q. Chen, "Computer intrusion detection through ewma for autocorrelated and uncorrelated data", IEEE transactions on reliability, Vol.52, No.1, (2003).
|
6 |
He, X., Z. Wang, Y. Liu, and D. H. Zhou, "Least-squares fault detection and diagnosis for networked sensing systems using a direct state estimation approach", IEEE Transactions on Industrial Informatics, Vol.9, No.3, (2013), 1670-1679.
DOI
|
7 |
Ye, N. and Q. Chen, "An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems", Quality and Reliability Engineering International, Vol.17, No.2, (2001), 105-112.
DOI
|
8 |
Dai, X. and Z. Gao, "From model, signal to knowledge: A data-driven perspective of fault detection and diagnosis", IEEE Transactions on Industrial Informatics, Vol. 9, No. 4, (2013), 2226-2238.
DOI
|
9 |
Esteban, C., S. L. Hyland and G. Ratsch, Real-valued (medical) time series generation with recurrent conditional gans, Tri-Institutional Training Program in Computational Biology and Medicine Weill Cornell Medical, 2017. Available at https://arxiv.org/abs/1706.02633 (Downloaded 13 June, 2019)
|
10 |
Goh, J., S. Adepu, M. Tan and Z. S. Lee, Anomaly Deetection in cyber physical systems using recurrent neural networks, IEEE, Sigarpore, 2017.
|
11 |
Zenati, H., C. S. Foo, B. Lecouat, G. Manek and V.R Chandrasekhar, Efficient gan-based anomaly detection, ICDM, 2018. Available at https://arxiv.org/abs/1802.06222 (Downloaded 1 May 2019)
|
12 |
Goodfellow, I. J., J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville and Y. Bengio, "Generative adversarial nets", Advances in neural information processing systems, Vol. ACM, (2014)
|
13 |
Salimans, T., I. Goodfellow, W. Zaremba, V. Cheung, A. Radford, and X. Chen, "Improved techniques for training gans", In Advances in Neural Information Processing Systems, Vol.29, (2016), 2226-2234.
|
14 |
Hinton, G. E and R. R. salakhutdinov, "Reducing the dimensionality of Data with Neural Network", Science, Vol.313, No. 5786, (2006), 504-507.
DOI
|
15 |
Sakurada, M. and T. Yairi, Anomaly detection using autoencoders with nonlinear dimensionality reduction, Machine Learning for Sensory Data Analysis, Dunedin, 2014.
|
16 |
Fraink, J., Artificial intelligence and intrusion detection: Current and future directions, Division of Computer Science, University of California, 1994. Available at https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.5769&rank=1
|
17 |
Iwan, S., A. Prugel-Bennett and G. Wills, Networked digital Technologies, Springer, Dubai, 2012.
|
18 |
Deecke, L., R. Vandermeulen, L. Ruff, S. Mandt and M. Kloft, Anomaly Detection with Generative Adversarial Networks, 2018. Available at https://openreview.net/forum?id=S1EfylZ0Z (Downloaded 13 June 2019)
|
19 |
Li, D., D. Chen, J. Goh and S-K. Ng, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, DBLP, London, 2018.
|
20 |
Schlegl T., P. Seebock, S. M. Waldstein, U. Schmidt and G. Langs, Computer vision and pattern Recognition, IPMI, North Carolina, 2017.
|