Basic Search / Search Result

  • Search Result: 11results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="anomaly detection"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    A Video Condensation Surveillance System Headed by Abnormal Behavior Clustering Based on Real-time Moving Object Trajectory Detection
    • Department of Computer Science and Information Engineering /106/ Master
    • Author: Li-Wei Ho Advisor: Chin-Shyurng Fahn
    • Abnormal moving objects detection is an essential issue for video surveillance. In order to judge w…
    • Clicks: 222Downloads: 0
    • Full text public date 2023/07/25 (Intranet public)
    • Full text public date 2028/07/25 (Internet public)
    • Full text public date 2023/07/25 (National library)

    2

    Federated Split Learning for Anomaly Detection
    • Department of Computer Science and Information Engineering /110/ Master
    • Author: Chin-Chen Liao Advisor: Wei-Chung Teng
    • We proposed an anomaly detection method that can integrate data information from several edge log c…
    • Clicks: 343Downloads: 0
    • Full text public date 2024/09/29 (Intranet public)
    • Full text public date 2024/09/29 (Internet public)
    • Full text public date 2024/09/29 (National library)

    3

    Detection of Query-based Adversarial Attacks Using Intrinsic Dimension Changes

    4

    Analysis-by-synthesis for solving visual tasks under data constraints

    5

    Anomaly Detection Based On User Profiling Analysis

    6

    Abnormal Moving Object Detection under Various Enviroments Using Self-Organizing Incremental Neural Networks

    7

    Virtual Machine Usage Monitoring via Process Log and Text Mining
    • Department of Computer Science and Information Engineering /101/ Master
    • Author: Chi-tien Yeh Advisor: Yuh-Jye Lee
    • In recent years, cloud computing has become a popular technique in the IT industry, and virtualizat…
    • Clicks: 368Downloads: 0
    • Full text public date 2018/07/26 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Web Application Security:An Anomaly Detection Approach via On-line PCA

    9

    Continuous Monitoring and Distributed Anomaly Detection for Ambient Factors

    10

    Frequent Pattern based Continuous Account Identification