$\text{A}^3$: Activation Anomaly Analysis
- URL: http://arxiv.org/abs/2003.01801v3
- Date: Tue, 7 Apr 2020 11:45:14 GMT
- Title: $\text{A}^3$: Activation Anomaly Analysis
- Authors: Philip Sperl, Jan-Philipp Schulze, Konstantin B\"ottinger
- Abstract summary: We show that the hidden activation values contain information useful to distinguish between normal and anomalous samples.
Our approach combines three neural networks in a purely data-driven end-to-end model.
Thanks to the anomaly network, our method even works in strict semi-supervised settings.
- Score: 0.7734726150561088
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Inspired by recent advances in coverage-guided analysis of neural networks,
we propose a novel anomaly detection method. We show that the hidden activation
values contain information useful to distinguish between normal and anomalous
samples. Our approach combines three neural networks in a purely data-driven
end-to-end model. Based on the activation values in the target network, the
alarm network decides if the given sample is normal. Thanks to the anomaly
network, our method even works in strict semi-supervised settings. Strong
anomaly detection results are achieved on common data sets surpassing current
baseline methods. Our semi-supervised anomaly detection method allows to
inspect large amounts of data for anomalies across various applications.
Related papers
- Anomaly Detection by Context Contrasting [57.695202846009714]
Anomaly detection focuses on identifying samples that deviate from the norm.
Recent advances in self-supervised learning have shown great promise in this regard.
We propose Con$$, which learns through context augmentations.
arXiv Detail & Related papers (2024-05-29T07:59:06Z) - Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows [47.4772981101262]
We consider the problem of anomaly network traffic detection and propose a three-stage anomaly detection framework using only normal traffic.
Our framework can generate pseudo anomaly samples without prior knowledge of anomalies to achieve the detection of anomaly data.
arXiv Detail & Related papers (2024-03-13T02:10:32Z) - TracInAD: Measuring Influence for Anomaly Detection [0.0]
This paper proposes a novel methodology to flag anomalies based on TracIn.
We test our approach using Variational Autoencoders and show that the average influence of a subsample of training points on a test point can serve as a proxy for abnormality.
arXiv Detail & Related papers (2022-05-03T08:20:15Z) - Explainable Deep Few-shot Anomaly Detection with Deviation Networks [123.46611927225963]
We introduce a novel weakly-supervised anomaly detection framework to train detection models.
The proposed approach learns discriminative normality by leveraging the labeled anomalies and a prior probability.
Our model is substantially more sample-efficient and robust, and performs significantly better than state-of-the-art competing methods in both closed-set and open-set settings.
arXiv Detail & Related papers (2021-08-01T14:33:17Z) - DASVDD: Deep Autoencoding Support Vector Data Descriptor for Anomaly
Detection [9.19194451963411]
Semi-supervised anomaly detection aims to detect anomalies from normal samples using a model that is trained on normal data.
We propose a method, DASVDD, that jointly learns the parameters of an autoencoder while minimizing the volume of an enclosing hyper-sphere on its latent representation.
arXiv Detail & Related papers (2021-06-09T21:57:41Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Anomaly Detection in Image Datasets Using Convolutional Neural Networks,
Center Loss, and Mahalanobis Distance [0.0]
User activities generate a significant number of poor-quality or irrelevant images and data vectors.
For neural networks, the anomalous is usually defined as out-of-distribution samples.
This work proposes methods for supervised and semi-supervised detection of out-of-distribution samples in image datasets.
arXiv Detail & Related papers (2021-04-13T13:44:03Z) - Using a Neural Network to Detect Anomalies given an N-gram Profile [0.0]
Anomaly detection is designed to profile the normal runtime behavior of computer programs.
Normal but unobserved behavior can trigger false positives.
This paper presents our study on how to explain the presence of anomalies using a neural network.
arXiv Detail & Related papers (2021-04-12T15:40:43Z) - Meta-learning One-class Classifiers with Eigenvalue Solvers for
Supervised Anomaly Detection [55.888835686183995]
We propose a neural network-based meta-learning method for supervised anomaly detection.
We experimentally demonstrate that the proposed method achieves better performance than existing anomaly detection and few-shot learning methods.
arXiv Detail & Related papers (2021-03-01T01:43:04Z) - Double-Adversarial Activation Anomaly Detection: Adversarial
Autoencoders are Anomaly Generators [0.0]
Anomaly detection is a challenging task for machine learning algorithms due to the inherent class imbalance.
Inspired by generative models and the analysis of the hidden activations of neural networks, we introduce a novel unsupervised anomaly detection method called DA3D.
arXiv Detail & Related papers (2021-01-12T18:07:34Z) - TadGAN: Time Series Anomaly Detection Using Generative Adversarial
Networks [73.01104041298031]
TadGAN is an unsupervised anomaly detection approach built on Generative Adversarial Networks (GANs)
To capture the temporal correlations of time series, we use LSTM Recurrent Neural Networks as base models for Generators and Critics.
To demonstrate the performance and generalizability of our approach, we test several anomaly scoring techniques and report the best-suited one.
arXiv Detail & Related papers (2020-09-16T15:52:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.