SOTAVerified

Outlier Detection

Outlier Detection is a task of identifying a subset of a given data set which are considered anomalous in that they are unusual from other instances. It is one of the core data mining tasks and is central to many applications. In the security field, it can be used to identify potentially threatening users, in the manufacturing field it can be used to identify parts that are likely to fail.

Source: Coverage-based Outlier Explanation

Papers

Showing 551600 of 703 papers

TitleStatusHype
A specifically designed machine learning algorithm for GNSS position time series prediction and its applications in outlier and anomaly detection and earthquake prediction0
A Study of Deep Learning for Network Traffic Data Forecasting0
A system for exploring big data: an iterative k-means searchlight for outlier detection on open health data0
Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning0
A Unified Framework for Center-based Clustering of Distributed Data0
Autoencoder Watchdog Outlier Detection for Classifiers0
Automated detection of business-relevant outliers in e-commerce conversion rate0
Automatically Identifying Pseudepigraphic Texts0
Automatic Outlier Rectification via Optimal Transport0
Automatic Unsupervised Outlier Model Selection0
AutoOD: Automated Outlier Detection via Curiosity-guided Search and Self-imitation Learning0
AWT -- Clustering Meteorological Time Series Using an Aggregated Wavelet Tree0
Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection0
Backdooring Outlier Detection Methods: A Novel Attack Approach0
BAHP: Benchmark of Assessing Word Embeddings in Historical Portuguese0
Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data0
Blind Image Deblurring With Outlier Handling0
Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing0
BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning0
Boundary Peeling: Outlier Detection Method Using One-Class Peeling0
Brain Ageing Prediction using Isolation Forest Technique and Residual Neural Network (ResNet)0
Breakdown Point of Robust Support Vector Machine0
Byzantine-Resilient Secure Federated Learning0
ByzSecAgg: A Byzantine-Resistant Secure Aggregation Scheme for Federated Learning Based on Coded Computing and Vector Commitment0
C-AllOut: Catching & Calling Outliers by Type0
Can Dense Connectivity Benefit Outlier Detection? An Odyssey with NAS0
Can we predict QPP? An approach based on multivariate outliers0
Cascade Subspace Clustering for Outlier Detection0
Cascade Watchdog: A Multi-tiered Adversarial Guard for Outlier Detection0
Centering the Margins: Outlier-Based Identification of Harmed Populations in Toxicity Detection0
Implications of Distance over Redistricting Maps: Central and Outlier Maps0
Characterizing Malicious Edges targeting on Graph Neural Networks0
Choquet-Based Fuzzy Rough Sets0
Class Imbalance in Anomaly Detection: Learning from an Exactly Solvable Model0
Closed-Form, Provable, and Robust PCA via Leverage Statistics and Innovation Search0
Clustering with Outlier Removal0
Cluster Purging: Efficient Outlier Detection based on Rate-Distortion Theory0
Cognitive Deep Machine Can Train Itself0
Combining Structured and Unstructured Randomness in Large Scale PCA0
Community-based anomaly detection using spectral graph filtering0
Comparative Study of Neighbor-based Methods for Local Outlier Detection0
Comparison of Outlier Detection Techniques for Structured Data0
Comparison of Visual Trackers for Biomechanical Analysis of Running0
Capturing the Denoising Effect of PCA via Compression Ratio0
Concept-based Anomaly Detection in Retail Stores for Automatic Correction using Mobile Robots0
Concept Learning through Deep Reinforcement Learning with Memory-Augmented Neural Networks0
Conditional Selective Inference for Robust Regression and Outlier Detection using Piecewise-Linear Homotopy Continuation0
Conditional Testing based on Localized Conformal p-values0
Conformal Prediction with Cellwise Outliers: A Detect-then-Impute Approach0
Defending Object Detectors against Patch Attacks with Out-of-Distribution Smoothing0
Show:102550
← PrevPage 12 of 15Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1VRAE+SVMAccuracy0.98Unverified
2F-t ALSTM-FCNAccuracy0.95Unverified
3GENDISAccuracy0.94Unverified
#ModelMetricClaimedVerifiedStatus
1ASVDDAverage Accuracy99.03Unverified
#ModelMetricClaimedVerifiedStatus
1ASVDDAverage Accuracy37.62Unverified
#ModelMetricClaimedVerifiedStatus
1ASVDDAverage Accuracy65.6Unverified
#ModelMetricClaimedVerifiedStatus
1PAEAUROC1Unverified
#ModelMetricClaimedVerifiedStatus
1ASVDDAverage Accuracy99.05Unverified
#ModelMetricClaimedVerifiedStatus
1MIXAUC0.86Unverified
#ModelMetricClaimedVerifiedStatus
1MIXAUC-ROC0.85Unverified
#ModelMetricClaimedVerifiedStatus
1MIXAUC-ROC0.93Unverified
#ModelMetricClaimedVerifiedStatus
1ASVDDAverage Accuracy86.33Unverified
#ModelMetricClaimedVerifiedStatus
1LSTMCapsAverage F10.74Unverified