References
- Adam-Bourdarios et al., The Higgs boson machine learning challenge, NIPS 2014 Workshop on Highenergy Physics and Machine Learning, 2015.
- Aggarwal, C., Outlier analysis, Springer, Switzerlnd, 2017.
- Babajide Mustapha, I. and Saeed, F., Bioactive molecule prediction using extreme gradient boosting, Molecules, 2016, Vol. 21, No. 8, p. 983. https://doi.org/10.3390/molecules21080983
- Chandola, V., Banerjee, A., and Kumar, V., Anomaly detection : A survey, ACM Computing Surveys(CSUR), 2009, Vol. 41, No. 3.
- Domingues, R., Filippone, M., Michiardi, P., and Zouaoui, J., A comparative evaluation of outlier detection algorithms : Experiments and analyses, Pattern Recognition, 2018, Vol. 74, pp. 406-421. https://doi.org/10.1016/j.patcog.2017.09.037
- Fan et al., Comparison of Support Vector Machine and Extreme Gradient Boosting for predicting daily global solar radiation using temperature and precipitation in humid subtropical climates : A case study in China, Energy Conversion and Management, 2018, Vol. 164, pp. 102-111. https://doi.org/10.1016/j.enconman.2018.02.087
- Hadi, A.S., Identifying multiple outliers in multivariate data, Journal of the Royal Statistical Society : Series B (Methodological), 1992, Vol. 54, No. 3, pp. 761-771. https://doi.org/10.1111/j.2517-6161.1992.tb01449.x
- In to the data, http://intothedata.com/02.scholar_category/anomaly_detection/.
- Jianliang, M., Haikun, S., and Ling, B., The application on intrusion detection based on k-Means cluster algorithm, 2009 International Forum on Information Technology and Applications, 2009, Vol. 1, pp. 150-152.
- Joseph, M.P., A PD Validation Framework for Basel II Internal Ratings-Based Systems, Credit Scoring and Credit Control IV, 2005.
- Knorr, E.M. and Ng, R.T., Finding intensional knowledge of distance-based outliers, in Proceedings of 25th International Conference on Very Large Databases, 1999.
- Laskov, P., Dussel, P., Schafer, C., and Rieck, K., Learning intrusion detection : supervised or unsupervised?, In International Conference on Image Analysis and Processing, 2005, pp. 50-57.
- Liu, F.T., Ting, K.M., and Zhou, Z.-H., Isolation-based anomaly detection, ACM Transactions on Knowledge Discovery from Data, 2012, Vol. 6, No. 1, pp. 1-39.
- Markou, M. and Singh, A., Novelty detection : a reviewpart 1: statistical approaches, Signal Processing, 2003, Vol. 83, No. 12, pp. 2481-2497. https://doi.org/10.1016/j.sigpro.2003.07.018
- Markou, M. and Singh, A., Novelty detection : a reviewpart 2 : neural network based approaches, Signal Processing, 2003, Vol. 83, No. 12, pp. 2499-2521. https://doi.org/10.1016/j.sigpro.2003.07.019
- Origins of the NIST/SEMATECH e-Handbook of Statistical Methods in the Work of Mary Natrella, http://www.itl.nist.gov/div898/handbook/, 2003.
- Phoboo, A.E., Machine learning wins the Higgs challenge, 2014, No. BULNA-2014-265.
- Punnoose, R. and Ajit, P., Prediction of employee turnover in organizations using machine learning algorithms, International Journal of Advanced Research in Artificial Intelligence, 2016, Vol. 5, No. 9, pp. 22-26.
- Robert et al., STL : A Seasonal-Trend Decomposition Procedure Based on Loess, Journal of Official Statistics, 1990, Vol. 6, No. 1, pp. 3-73.