default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 231 matches
- 2024
- Marco Rudolph:
Industrial anomaly detection with normalizing flows. Gottfried Wilhelm Leibniz Universität, Hannover, Germany, 2024 - Batyr Charyyev, Mehmet Hadi Gunes:
Identifying Anomaly in IoT Traffic Flow With Locality Sensitive Hashes. IEEE Access 12: 89467-89478 (2024) - Seungmi Oh, Jeongtae Kim:
Anomaly Detection Using Normalizing Flow-Based Density Estimation and Synthetic Defect Classification. IEEE Access 12: 75873-75887 (2024) - Fran Milkovic, Luka Posilovic, Duje Medak, Marko Subasic, Sven Loncaric, Marko Budimir:
FRAnomaly: flow-based rapid anomaly detection from images. Appl. Intell. 54(4): 3502-3515 (2024) - Zhenlian Miao, Guangzhu Chen, Xiaojuan Liao, Jiu Dai, Yumeng He:
Self-supervised dual-layer 2D normalizing flow method for industrial anomaly detection. Appl. Soft Comput. 163: 111928 (2024) - Miguel Campos-Romero, Manuel Carranza-García, José C. Riquelme:
Advancing unsupervised anomaly detection with normalizing flow and multi-scale ensemble learning. Eng. Appl. Artif. Intell. 137: 109088 (2024) - Xingzhen Wu, Guojun Mao, Shuli Xing:
Unsupervised anomaly detection in images using attentional normalizing flows. Eng. Appl. Artif. Intell. 127(Part B): 107369 (2024) - Wei Ma, Yao Li, Shiyong Lan, Wenwu Wang, Weikang Huang, Wujiang Zhu:
Semantic-aware normalizing flow with feature fusion for image anomaly detection. Neurocomputing 590: 127728 (2024) - Hao Liu, Wang Luo, Lixin Han, Peng Gao, Weiyong Yang, Guangjie Han:
Anomaly Detection via Graph Attention Networks-Augmented Mask Autoregressive Flow for Multivariate Time Series. IEEE Internet Things J. 11(11): 19368-19379 (2024) - Matías Tailanián, Álvaro Pardo, Pablo Musé:
U-Flow: A U-Shaped Normalizing Flow for Anomaly Detection with Unsupervised Threshold. J. Math. Imaging Vis. 66(4): 678-696 (2024) - Daoyu Kan, Xianwen Fang:
Event log anomaly detection method based on auto-encoder and control flow. Multim. Syst. 30(1): 29 (2024) - Jin Fan, Yuxiang Ji, Huifeng Wu, Yan Ge, Danfeng Sun, Jia Wu:
An unsupervised video anomaly detection method via Optical Flow decomposition and Spatio-Temporal feature learning. Pattern Recognit. Lett. 185: 239-246 (2024) - Iman Taheri Sarteshnizi, Saeed Asadi Bagloee, Majid Sarvi, Neema Nassir:
Traffic Anomaly Detection: Exploiting Temporal Positioning of Flow-Density Samples. IEEE Trans. Intell. Transp. Syst. 25(5): 4166-4180 (2024) - Yupeng Wang, Xiling Luo, Zequan Zhou:
Contrasting Estimation of Pattern Prototypes for Anomaly Detection in Urban Crowd Flow. IEEE Trans. Intell. Transp. Syst. 25(8): 10231-10245 (2024) - Chihiro Yukawa, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Leonard Barolli:
An Imaging Camera Anomaly Detection System Based on Optical Flow. AINA (6) 2024: 422-431 - Yangjie Wu, Yuhan Zhu, Genggeng Liu, Xing Huang:
Anomaly Detection Method based on Discrete Particle Swarm Optimization for Continuous-Flow Microfluidic Biochips. ACM Great Lakes Symposium on VLSI 2024: 507-510 - Haodong Ru, Menghao Zhang, Cheng Zhou, Pengfei Ren, Haifeng Sun, Qi Qi, Lejian Zhang, Jingyu Wang:
Enhanced Anomaly Detection in Dashcam Videos: Dual GAN Approach with Swin-Unet for Optical Flow and Region of Interest Analysis. IJCNN 2024: 1-8 - Bodo Rosenhahn, Christoph Hirche:
Quantum Normalizing Flows for Anomaly Detection. CoRR abs/2402.02866 (2024) - Zhangxuan Dang, Yu Zheng, Xinglin Lin, Chunlei Peng, Qiuyu Chen, Xinbo Gao:
Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows. CoRR abs/2403.10550 (2024) - Xincheng Yao, Ruoqi Li, Zefeng Qian, Lu Wang, Chongyang Zhang:
Hierarchical Gaussian Mixture Normalizing Flow Modeling for Unified Anomaly Detection. CoRR abs/2403.13349 (2024) - Shun Maeda, Chunzhi Gu, Jun Yu, Shogo Tokai, Shangce Gao, Chao Zhang:
Frequency-Guided Multi-Level Human Action Anomaly Detection with Normalizing Flows. CoRR abs/2404.17381 (2024) - Ruituo Wu, Yang Chen, Jian Xiao, Bing Li, Jicong Fan, Frédéric Dufaux, Ce Zhu, Yipeng Liu:
DA-Flow: Dual Attention Normalizing Flow for Skeleton-based Video Anomaly Detection. CoRR abs/2406.02976 (2024) - Rui Cao, Shijie Xue, Jindong Li, Qi Wang, Yi Chang:
FANFOLD: Graph Normalizing Flows-driven Asymmetric Network for Unsupervised Graph-Level Anomaly Detection. CoRR abs/2407.00383 (2024) - Adrián Pekár, Richard Jozsa:
Early-Stage Anomaly Detection: A Study of Model Performance on Complete vs. Partial Flows. CoRR abs/2407.02856 (2024) - 2023
- Fan Zhang, Ruiqing Yan, Jinfeng Li, Jiasheng He, Chun Fang:
GAMFlow: Global Attention-Based Flow Model for Anomaly Detection and Localization. IEEE Access 11: 116608-116621 (2023) - Wan Yeon Lee, Yun-Seok Choi, Tong Min Kim:
Quantitative Estimation of Video Forgery with Anomaly Analysis of Optical Flow. IEICE Trans. Inf. Syst. 106(10): 1757-1760 (2023) - Yaohua Guo, Lijuan Song, Zirui Ma:
Self-Supervised Texture Image Anomaly Detection by Fusing Normalizing Flow and Dictionary Learning. Int. J. Pattern Recognit. Artif. Intell. 37(4): 2351007:1-2351007:19 (2023) - Sultan Zavrak, Murat Iskefiyeli:
Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach. Neural Comput. Appl. 35(16): 12175-12193 (2023) - Sultan Zavrak, Murat Iskefiyeli:
Correction: Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach. Neural Comput. Appl. 35(24): 18091 (2023) - Muhammad Junaid Nazar, Adi Alhudhaif, Kashif Naseer Qureshi, Saleem Iqbal, Gwanggil Jeon:
Signature and flow statistics based anomaly detection system in software-defined networking for 6G internet of things network. Int. J. Syst. Assur. Eng. Manag. 14(1): 87-97 (2023)
skipping 201 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-20 20:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint