共 32 条
- [1] HE D J, DU X, QIAO Y R, Et al., A survey on cyber security of unmanned aerial vehicles, Chinese Journal of Computers, 42, 5, pp. 150-168, (2019)
- [2] JAWHAR I, MOHAMED N, AL-JAROODI J, Et al., Communication and networking of UAV-based systems: Classification and associated architectures, Journal of Network and Computer Applications, 84, pp. 93-108, (2017)
- [3] KUMAR N, KUMAR U., Anomaly-based network intrusion detection: An outlier detection techniques, International Conference on Soft Computing and Pattern Recognition, pp. 262-269, (2016)
- [4] ZIMEK A, FILZMOSER P., There and back again: Outlier detection between statistical reasoning and data mining algorithms, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 8, 6, (2018)
- [5] DIVYA K, KUMARAN N S., Survey on outlier detection techniques using categorical data, International Research Journal of Engineering and Technology, 3, 12, pp. 899-904, (2016)
- [6] DESHMUKH M M K, KAPSE A., A survey on outlier detection technique in streaming data using data clustering approach, International Journal of Engineering and Computer Science, 5, 1, pp. 15453-15456, (2016)
- [7] JIANG F, LIU G, DU J, Et al., Initialization of K-modes clustering using outlier detection techniques, Information Sciences, 332, pp. 167-183, (2016)
- [8] CHEN J, SATHE S, AGGARWAL C, Et al., Outlier detection with autoencoder ensembles, Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 90-98, (2017)
- [9] KWON D, KIM H, KIM J, Et al., A survey of deep learning-based network anomaly detection, Cluster Computing, 22, pp. 949-961, (2019)
- [10] ZONG B, SONG Q, MIN M R, Et al., Deep autoencoding Gaussian mixture model for unsupervised anomaly detection, ICLR, pp. 1-19, (2018)