[1] |
付林.自动化技术在电力企业IT运维中的应用 [J].电子技术与软件工程,2018(8):141-149.
|
|
Fu Lin.Application of automation technology in IT operation and maintenance of electric power enterprises[J].Electronic Technology&Software Engineering,2018(8):141-149.
|
[2] |
张雪坚,张榆,钏涛,等.基于大数据技术的 IT 运维数据管理系统构建方法 [J].电子科技,2018,31(4):84-86.
|
|
Zhang Xue-jian,Zhang Yu,Chuan Tao,et al.Research on the construction method of IT operation and maintenance data management system based on large data technology [J].Electronic Science and Technology,2018,31(4):84-86.
|
[3] |
赵文清,沈哲吉,李刚.基于深度学习的用户异常用电模式检测 [J].电力自动化设备,2018,38(9):34-38.
|
|
Zhao Wen-qing,Shen Zhe-ji,Li Gang.Anomaly detection for power consumption pattern based on deep learning[J].Electric Power Automation Equipment,2018,38(9):34-38.
|
[4] |
陈来军,梅生伟,陈颖.智能电网信息安全及其对电力系统生存性的影响 [J].控制理论与应用,2012,29 (2):240-244.
|
|
Chen Lai-jun,Mei Sheng-wei,Chen Ying.Smart grid information security and its influence on power system survivability[J].Control Theory & Applications,2012,29 (2):240-244.
|
[5] |
杨永娇,肖建毅,赵创业,等.基于Isolation Forest和Random Forest相结合的智能电网时间序列数据异常检测算法[J].计算机与现代化,2020(3):99-102.
|
|
Yang Yong-jiao,Xiao Jian-yi,Zhao Chuang-ye,et al.An anomaly detection algorithm for smart grid time series data based on combination of isolation forest and random forest [J].Computer and Modernization,2020(3):99-102.
|
[6] |
Breunig M M,Kriegel H P,Ng R T,et al.LOF:Identifying density-based local outliers[C]∥Proc of the 2000 ACM SIGMOD International Conference on Management of Data,2000:93-104.
|
[7] |
Bigdeli E,Raahemi B,Mohammadi M,et al.A fast noise resilient anomaly detection using GMM-based collective labelling[C]∥Proc of 2015 Science and Information Conference,2015:337-344.
|
[8] |
Li Z F,Fang H J,Huang M,et al.Data-driven bearing fault identification using improved hidden Markov model and self-organizing map[J].Computers & Industrial Engineering,2018,116:37-46.
|
[9] |
Bayati A,Nguyen K K,Cheriet M.Multiple-step-ahead traffic prediction in high-speed networks[J].IEEE Communications Letters,2018,22(12):2447-2450.
|
[10] |
Zhou P X,Li Z,Snowling S,et al.A random forest model for inflow prediction at wastewater treatment plants[J].Stochastic Environmental Research and Risk Assessment,2019,33:1781-1792.
|
[11] |
Xiang P,Zhou H,Li H,et al.Hyperspectral anomaly detection by local joint subspace process and support vector machine[J].International Journal of Remote Sensing,2020,41(10):3798-3819.
|
[12] |
Idé T,Papadimitriou S,Vlachos M.Computing correlation anomaly scores using stochastic nearest neighbors[C]∥Proc of the 7th IEEE International Conference on Data Mining,2007:523-528.
|
[13] |
Hautamaki V,Karkkainen I,Franti P.Outlier detection using k-nearest neighbour graph[C]∥Proc of the 17th International Conference on Pattern Recognition,2004:430-433.
|
[14] |
Li J B,Izakian H,Pedrycz W,et al.Clustering-based anomaly detection in multivariate time series data[J].Applied Soft Computing,2021,100:106919.
|
[15] |
Manevitz L M,Yousef M.One-class SVMs for document classification[J].Journal of Machine Learning Research,2001,2:139-154.
|
[16] |
Radoglou-Grammatikis P I,Sarigiannidis P G.An anomaly-based intrusion detection system for the smart grid based on cart decision tree[C]∥Proc of 2018 Global Information Infrastructure and Networking Symposium,2018:1-5.
|
[17] |
Hosseinzadeh M,Rahmani A M,Vo B,et al.Improving security using SVM-based anomaly detection:Issues and challenges[J].Soft Computing,2021,25(4):3195-3223.
|
[18] |
Qureshi A U H,Larijani H,Mtetwa N,et al.RNN-ABC:A new swarm optimization based technique for anomaly detection[J].Computers,2019,8(3):59.
|
[19] |
Park S H, Park H J,Choi Y J.RNN-based prediction for network intrusion detection[C]∥Proc of 2020 International Conference on Artificial Intelligence in Information and Communication,2020:572-574.
|
[20] |
Nguyen H D,Tran K P,Thomassey S,et al.Forecasting and anomaly detection approaches using LSTM and LSTM autoencoder techniques with the applications in supply chain management[J].International Journal of Information Management,2021,57:102282.
|
[21] |
Shaukat K,Alam T M,Luo S,et al.A review of time-series anomaly detection techniques:A step to future perspectives[C]∥Proc of Future of Information and Communication Conference,2021:865-877.
|
[22] |
Abdi L,Hashemi S.To combat multi-class imbalanced problems by means of over-sampling techniques[J].IEEE Transactions on Knowledge and Data Engineering,2015,28(1):238-251.
|
[23] |
Triguero I,Galar M,Bustince H,et al.A first attempt on global evolutionary undersampling for imbalanced big data[C]∥Proc of 2017 IEEE Congress on Evolutionary Computation,2017:2054-2061.
|
[24] |
Sabour S,Frosst N,Hinton G E.Dynamic routing between capsules[C]∥Proc of the 31st International Conference on Neural Information Processing Systems,2017:3859-3869.
|
[25] |
Son S,Gil M-S,Moon Y-S,et al.Anomaly detection of Hadoop log data using moving average and 3-sigma[J].KIPS Transactions on Software and Data Engineering,2016,5(6):283-288.
|
[26] |
Yu S S,Chu S W,Wang C M,et al.Two improved k-means algorithms[J].Applied Soft Computing,2018,68:747-755.
|
[27] |
Yamanishi K,Takeuchi J I,Williams G,et al.On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms[J].Data Mining and Knowledge Discovery,2004,8(3):275-300.
|
[28] |
Kosek A M,Gehrke O.Ensemble regression model-based anomaly detection for cyber-physical intrusion detection in smart grids[C]∥Proc of 2016 IEEE Electrical Power and Energy Conference,2016:1-7.
|
[29] |
Wu X,He R,Sun Z,et al.A light CNN for deep face representation with noisy labels[J].IEEE Transactions on Information Forensics and Security,2018,13(11):2884-2896.
|
[30] |
Krizhevsky A,Sutskever I,Hinton G E.ImageNet classification with deep convolutional neural networks[C]∥Proc of the 25th International Conference on Neural Information Processing Systems,2012:1097-1105.
|
[31] |
Canizo M,Triguero I,Conde A,et al.Multi-head CNN–RNN for multi-time series anomaly detection:An industrial case study[J].Neurocomputing,2019,363(C):246-260.
|