|
|
|
|
LEADER |
04224nam a2200493 4500 |
001 |
978-1-4842-5177-5 |
003 |
DE-He213 |
005 |
20191012031754.0 |
007 |
cr nn 008mamaa |
008 |
191010s2019 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484251775
|9 978-1-4842-5177-5
|
024 |
7 |
|
|a 10.1007/978-1-4842-5177-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q334-342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 thema
|
082 |
0 |
4 |
|a 006.3
|2 23
|
100 |
1 |
|
|a Alla, Sridhar.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Beginning Anomaly Detection Using Python-Based Deep Learning
|h [electronic resource] :
|b With Keras and PyTorch /
|c by Sridhar Alla, Suman Kalyan Adari.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2019.
|
300 |
|
|
|a XVI, 416 p. 530 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter 1: What is Anomaly Detection? -- Chapter 2: Traditional Methods of Anomaly Detection -- Chapter 3: Introduction to Deep Learning -- Chapter 4: Autoencoders -- Chapter 5: Boltzmann Machines -- Chapter 6: Long Short-Term Memory Models -- Chapter 7: Temporal Convolutional Network -- Chapter 8: Practical Use Cases of Anomaly Detection -- Appendix A: Introduction to Keras -- Appendix B: Introduction to PyTorch.
|
520 |
|
|
|a Utilize this easy-to-follow beginner's guide to understand how deep learning can be applied to the task of anomaly detection. Using Keras and PyTorch in Python, the book focuses on how various deep learning models can be applied to semi-supervised and unsupervised anomaly detection tasks. This book begins with an explanation of what anomaly detection is, what it is used for, and its importance. After covering statistical and traditional machine learning methods for anomaly detection using Scikit-Learn in Python, the book then provides an introduction to deep learning with details on how to build and train a deep learning model in both Keras and PyTorch before shifting the focus to applications of the following deep learning models to anomaly detection: various types of Autoencoders, Restricted Boltzmann Machines, RNNs & LSTMs, and Temporal Convolutional Networks. The book explores unsupervised and semi-supervised anomaly detection along with the basics of time series-based anomaly detection. By the end of the book you will have a thorough understanding of the basic task of anomaly detection as well as an assortment of methods to approach anomaly detection, ranging from traditional methods to deep learning. Additionally, you are introduced to Scikit-Learn and are able to create deep learning models in Keras and PyTorch. What You'll Learn: Understand what anomaly detection is and why it is important in today's world Become familiar with statistical and traditional machine learning approaches to anomaly detection using Scikit-Learn Know the basics of deep learning in Python using Keras and PyTorch Be aware of basic data science concepts for measuring a model's performance: understand what AUC is, what precision and recall mean, and more Apply deep learning to semi-supervised and unsupervised anomaly detection.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Python (Computer program language).
|
650 |
|
0 |
|a Open source software.
|
650 |
|
0 |
|a Computer programming.
|
650 |
1 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Python.
|0 http://scigraph.springernature.com/things/product-market-codes/I29080
|
650 |
2 |
4 |
|a Open Source.
|0 http://scigraph.springernature.com/things/product-market-codes/I29090
|
700 |
1 |
|
|a Adari, Suman Kalyan.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484251768
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484251782
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4842-5177-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|