Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 142 matches
- 2024
- Hongyang Chen, Pengfei Chen, Benran Wang, Xian Yu, Xiaofan Chen, Dandan Ma, Zibin Zheng:
Graph neural network based robust anomaly detection at service level in SDN driven microservice system. Comput. Networks 239: 110135 (2024) - Chenlei Liu, Yuhua Xu, Zhixin Sun:
Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain. Knowl. Inf. Syst. 66(2): 989-1010 (2024) - Hoon Ko, Isabel Praça, Seong Gon Choi:
Anomaly detection analysis based on correlation of features in graph neural network. Multim. Tools Appl. 83(9): 25487-25501 (2024) - Zhen Zhang, Zhiqiang Geng, Yongming Han:
Graph Structure Change-Based Anomaly Detection in Multivariate Time Series of Industrial Processes. IEEE Trans. Ind. Informatics 20(4): 6457-6466 (2024) - Xun Dong, Gaoge Hu, Bingbing Gao, Yongmin Zhong, Wei Ruan:
Windowing-Based Factor Graph Optimization With Anomaly Detection Using Mahalanobis Distance for Underwater INS/DVL/USBL Integration. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - Wei Zhang, Ping He, Chuntian Qin, Fan Yang, Ying Liu:
A graph attention network-based model for anomaly detection in multivariate time series. J. Supercomput. 80(6): 8529-8549 (2024) - Armin Danesh Pazho, Ghazal Alinezhad Noghre, Arnab A. Purkayastha, Jagannadh Vempati, Martin Otto, Hamed Tabkhi:
A Survey of Graph-Based Deep Learning for Anomaly Detection in Distributed Systems. IEEE Trans. Knowl. Data Eng. 36(1): 1-20 (2024) - Meng Yang, Yanghe Feng, Aravinda S. Rao, Sutharshan Rajasegarar, Shucong Tian, Zhengchun Zhou:
Evolving graph-based video crowd anomaly detection. Vis. Comput. 40(1): 303-318 (2024) - Shikang Pang, Chunjing Xiao, Wenxin Tai, Zhangtao Cheng, Fan Zhou:
Graph Anomaly Detection with Diffusion Model-Based Graph Enhancement (Student Abstract). AAAI 2024: 23610-23612 - Charlie Grimshaw, Brian Lachine, Taylor Perkins, Emilie Coote:
Link-based Anomaly Detection with Sysmon and Graph Neural Networks. ICAIC 2024: 1-6 - Yuki Ohkawa, Takafumi Nakanishi:
Anomaly Detection Through Graph Autoencoder-Based Learning of Screenshot Image Logs. ICSC 2024: 65-68 - Ziqi Yuan, Haoyi Zhou, Tianyu Chen, Jianxin Li:
PhoGAD: Graph-based Anomaly Behavior Detection with Persistent Homology Optimization. WSDM 2024: 920-929 - Ziqi Yuan, Haoyi Zhou, Tianyu Chen, Jianxin Li:
PhoGAD: Graph-based Anomaly Behavior Detection with Persistent Homology Optimization. CoRR abs/2401.10547 (2024) - Ali Karami, Thi Kieu Khanh Ho, Narges Armanfard:
Graph-Jigsaw Conditioned Diffusion Model for Skeleton-based Video Anomaly Detection. CoRR abs/2403.12172 (2024) - 2023
- Junchao Xiao, Lin Yang, Fuli Zhong, Hongbo Chen, Xiangxue Li:
Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework. Appl. Intell. 53(3): 3183-3206 (2023) - Jian Chen, Fagui Liu, Jun Jiang, Guoxiang Zhong, Dishi Xu, Zhuanglun Tan, Shangsong Shi:
TraceGra: A trace-based anomaly detection for microservice using graph deep learning. Comput. Commun. 204: 109-117 (2023) - Giacomo Gori, Lorenzo Rinieri, Amir Al Sadi, Andrea Melis, Franco Callegati, Marco Prandini:
GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs. Future Internet 15(11): 368 (2023) - Ling Chen, Yingchi Mao, Hongliang Zhou, Benteng Zhang, ZiCheng Wang, Jie Wu:
MTS-GAT: multivariate time series anomaly detection based on graph attention networks. Int. J. Sens. Networks 43(1): 38-49 (2023) - Lejing Yan, Chao Luo, Rui Shao:
Discrete log anomaly detection: A novel time-aware graph-based link prediction approach. Inf. Sci. 647: 119576 (2023) - Xiaoyu Chen, Shichao Kan, Fanghui Zhang, Yigang Cen, Linna Zhang, Damin Zhang:
Multiscale spatial temporal attention graph convolution network for skeleton-based anomaly behavior detection. J. Vis. Commun. Image Represent. 90: 103707 (2023) - Minglai Shao, Yujie Lin, Qiyao Peng, Jun Zhao, Zhan Pei, Yueheng Sun:
Learning graph deep autoencoder for anomaly detection in multi-attributed networks. Knowl. Based Syst. 260: 110084 (2023) - Huaiying Jiang, Chen Lyu, Yuexiu Gao, Yunliang Zhuang, Sanjun Du:
ADGSC: video anomaly detection algorithm based on graph structure change detection in public places. Multim. Tools Appl. 82(25): 38923-38945 (2023) - Fanghui Zhang, Shichao Kan, Damin Zhang, Yigang Cen, Linna Zhang, Vladimir Mladenovic:
A graph model-based multiscale feature fitting method for unsupervised anomaly detection. Pattern Recognit. 138: 109373 (2023) - Nan Wang, Yuetian Shi, Haiwei Li, Geng Zhang, Siyuan Li, Xuebin Liu:
Multi-Prior Graph Autoencoder with Ranking-Based Band Selection for Hyperspectral Anomaly Detection. Remote. Sens. 15(18): 4430 (2023) - Kanhong Xiao, Jiangzhong Cao, Zekai Zeng, Wing-Kuen Ling:
Graph-Based Active Learning With Uncertainty and Representativeness for Industrial Anomaly Detection. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - Junchao Xiao, Lin Yang, Fuli Zhong, Xiaolei Wang, Hongbo Chen, Dongyang Li:
Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network. IEEE Trans. Netw. Serv. Manag. 20(3): 3717-3733 (2023) - Xiaocan Li, Kun Xie, Xin Wang, Gaogang Xie, Kenli Li, Jiannong Cao, Dafang Zhang, Hongbo Jiang, Jigang Wen:
Neighbor Graph Based Tensor Recovery For Accurate Internet Anomaly Detection. IEEE Trans. Parallel Distributed Syst. 34(2): 655-674 (2023) - Lu Chen, Qian Dang, Mu Chen, Biying Sun, Chunhui Du, Ziang Lu:
BertHTLG: Graph-Based Microservice Anomaly Detection Through Sentence-Bert Enhancement. WISA 2023: 427-439 - Zhenyang Yu, Xinye Wang, Bingzhe Zhang, Zhaohang Luo, Lei Duan:
TUAF: Triple-Unit-Based Graph-Level Anomaly Detection with Adaptive Fusion Readout. DASFAA (4) 2023: 415-430 - Hewen Wang, Renchi Yang, Jieming Shi:
Anomaly Detection in Financial Transactions Via Graph-Based Feature Aggregations. DaWaK 2023: 64-79
skipping 112 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 01:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint