Emerging Research on Neural Networks and Anomaly Detection

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Artificial Intelligence".

Deadline for manuscript submissions: 30 June 2025 | Viewed by 8507

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Interests: network and system security; artificial intelligence; software engineering

E-Mail Website
Guest Editor
School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Interests: network and system security

Special Issue Information

Dear Colleagues,

In this Special Issue, we aim to present the latest research trends in neural networks and anomaly detection. Particularly, we encourage the innovative application of neural networks to anomaly detection in the real world, which has been an active research area over the past few decades. Traditional machine learning-based or statistical solutions have been designed to achieve anomaly detection. However, it is challenging to apply traditional solutions to solve complex problems in various scenarios since these solutions require explicit feature extraction that typically fails to learn implicit relationships among features in the latent space. This issue has become a bottleneck to the improvement of the performance of traditional solutions when applied to anomaly detection.

Neural networks, also known as artificial neural networks or simulated neural networks, have been proposed as a promising solution for the detection of anomalies. In many cases, thanks to the capability of modeling and learning of the latent feature space, neural networks achieve a significantly better performance than that of the aforementioned traditional solutions. More specifically, solutions based on neural networks such as convolutional neural network, recurrent neural network, and autoencoder neural network have been leveraged to detect anomalies among various types of inputs, such as image, audio, and video. Large language model-based solutions are one of the emerging directions that combine advanced techniques (e.g., embedding representations, attention mechanism) to address practically challenging problems that remain in the real world.

Through this Special Issue, we hope to provide a collection of emerging research into neural networks that inspires researchers in both academia and industry to address challenges in anomaly detection. We welcome research studies on relevant topics including (but not limited to) network security, system security, mobile platforms, explainable AI, and privacy, among others.

Dr. Jiaping Gui
Dr. Futai Zou
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • neural networks
  • supervised learning
  • unsupervised learning
  • anomaly detection
  • outlier detection
  • machine learning

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 1873 KiB  
Article
Beyond Supervised: The Rise of Self-Supervised Learning in Autonomous Systems
by Hamed Taherdoost
Information 2024, 15(8), 491; https://doi.org/10.3390/info15080491 - 16 Aug 2024
Viewed by 1693
Abstract
Supervised learning has been the cornerstone of many successful medical imaging applications. However, its reliance on large labeled datasets poses significant challenges, especially in the medical domain, where data annotation is time-consuming and expensive. In response, self-supervised learning (SSL) has emerged as a [...] Read more.
Supervised learning has been the cornerstone of many successful medical imaging applications. However, its reliance on large labeled datasets poses significant challenges, especially in the medical domain, where data annotation is time-consuming and expensive. In response, self-supervised learning (SSL) has emerged as a promising alternative, leveraging unlabeled data to learn meaningful representations without explicit supervision. This paper provides a detailed overview of supervised learning and its limitations in medical imaging, underscoring the need for more efficient and scalable approaches. The study emphasizes the importance of the area under the curve (AUC) as a key evaluation metric in assessing SSL performance. The AUC offers a comprehensive measure of model performance across different operating points, which is crucial in medical applications, where false positives and negatives have significant consequences. Evaluating SSL methods based on the AUC allows for robust comparisons and ensures that models generalize well to real-world scenarios. This paper reviews recent advances in SSL for medical imaging, demonstrating their potential to revolutionize the field by mitigating challenges associated with supervised learning. Key results show that SSL techniques, by leveraging unlabeled data and optimizing performance metrics like the AUC, can significantly improve the diagnostic accuracy, scalability, and efficiency in medical image analysis. The findings highlight SSL’s capability to reduce the dependency on labeled datasets and present a path forward for more scalable and effective medical imaging solutions. Full article
(This article belongs to the Special Issue Emerging Research on Neural Networks and Anomaly Detection)
Show Figures

Figure 1

16 pages, 5487 KiB  
Article
Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features
by Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
Information 2024, 15(1), 36; https://doi.org/10.3390/info15010036 - 11 Jan 2024
Cited by 3 | Viewed by 3527
Abstract
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating potential risks from cyber [...] Read more.
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating potential risks from cyber attacks and network resilience. With the rapid increase of digital data and the increasing complexity of cyber attacks, big data has become a crucial tool for intrusion detection and forecasting. By leveraging the capabilities of unstructured big data, intrusion detection and forecasting systems can become more effective in detecting and preventing cyber attacks and anomalies. While some progress has been made on attack prediction, little attention has been given to forecasting cyber events based on time series and unstructured big data. In this research, we used the CSE-CIC-IDS2018 dataset, a comprehensive dataset containing several attacks on a realistic network. Then we used time-series forecasting techniques to construct time-series models with tuned parameters to assess the effectiveness of these techniques, which include Sequential Minimal Optimisation for regression (SMOreg), linear regression and Long Short-Term Memory (LSTM) to forecast the cyber events. We used machine learning algorithms such as Naive Bayes and random forest to evaluate the performance of the models. The best performance results of 90.4% were achieved with Support Vector Machine (SVM) and random forest. Additionally, Mean Absolute Error (MAE) and Root Mean Square Error (RMSE) metrics were used to evaluate forecasted event performance. SMOreg’s forecasted events yielded the lowest MAE, while those from linear regression exhibited the lowest RMSE. This work is anticipated to contribute to effective cyber threat detection, aiming to reduce security breaches within critical infrastructure. Full article
(This article belongs to the Special Issue Emerging Research on Neural Networks and Anomaly Detection)
Show Figures

Figure 1

17 pages, 1497 KiB  
Article
Decentralized Federated Learning-Enabled Relation Aggregation for Anomaly Detection
by Siyue Shuai, Zehao Hu, Bin Zhang, Hannan Bin Liaqat and Xiangjie Kong
Information 2023, 14(12), 647; https://doi.org/10.3390/info14120647 - 3 Dec 2023
Cited by 3 | Viewed by 2362
Abstract
Anomaly detection plays a crucial role in data security and risk management across various domains, such as financial insurance security, medical image recognition, and Internet of Things (IoT) device management. Researchers rely on machine learning to address potential threats in order to enhance [...] Read more.
Anomaly detection plays a crucial role in data security and risk management across various domains, such as financial insurance security, medical image recognition, and Internet of Things (IoT) device management. Researchers rely on machine learning to address potential threats in order to enhance data security. In the financial insurance industry, enterprises tend to leverage the relation mining capabilities of knowledge graph embedding (KGE) for anomaly detection. However, auto insurance fraud labeling strongly relies on manual labeling by experts. The efficiency and cost issues of labeling make auto insurance fraud detection still a small-sample detection challenge. Existing schemes, such as migration learning and data augmentation methods, are susceptible to local characteristics, leading to their poor generalization performance. To improve its generalization, the recently emerging Decentralized Federated Learning (DFL) framework provides new ideas for mining more frauds through the joint cooperation of companies. Based on DFL, we propose a federated framework named DFLR for relation embedding aggregation. This framework trains the private KGE of auto insurance companies on the client locally and dynamically selects servers for relation aggregation with the aim of privacy protection. Finally, we validate the effectiveness of our proposed DFLR on a real auto insurance dataset. And the results show that the cooperative approach provided by DFLR improves the client’s ability to detect auto insurance fraud compared to single client training. Full article
(This article belongs to the Special Issue Emerging Research on Neural Networks and Anomaly Detection)
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: Optimize Face Detection by Incorporating Classification Networks to Minimize False Positive Rates
Authors: Hui Cui
Affiliation: Monash University, Melbourne, Australia
Abstract: The rise of convolutional neural networks (CNNs) has significantly progressed face detection, notably improving accuracy and recall metrics. Precision and recall are crucial in assessing CNN-based detection models, yet a common tendency is to prioritize true positive rates while over looking false positives. A key factor contributing to this imbalance is the absence of pseudo-face images in training and evaluation datasets. This shortfall undermines the regression capabilities of detection models, resulting in numerous incorrect detections and subpar localization. To address this gap, we introduce the WIDERFACE dataset, which incorporates a substantial proportion of pseudo-face images synthesized by merging human and animal facial features. This dataset is specifically designed to enhance false positive detection in training scenarios. Additionally, we present a novel face detection framework that integrates a classification model into the existing face detection model to reduce the false positive rate and improve detection accuracy. Comparative evaluations on the WIDERFACE and other popular datasets demonstrate that our framework achieves a reduced false positive rate while maintaining the true positive rate relative to existing leading face detection models.

Title: Multi-identity Recognition of Darknet Vendors Based on Metric Learning
Authors: Yilei WANG; Xin SUN; Jiajia HAN; Yuelin Hu; Wenliang Xu; Futai Zou
Affiliation: School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China
Abstract: Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transactions. Existing open-source datasets for dark web marketplaces are outdated and cannot simulate real-world situations, while data labeling methods are difficult and suffer from issues such as inaccurate labeling and limited cross-market research. The problem of identifying vendors’ multiple identities on the dark web involves a large number of categories and a limited number of samples, making it difficult to use traditional multiclass classification models. To address these issues, this paper proposes a metric learning-based method for dark web vendor identification, collecting product data from 21 currently active English dark web marketplaces and using a multi-dimensional feature extraction method based on product titles, descriptions, and images. Using pseudo-labeling technology combined with manual labeling improves data labeling accuracy compared to previous labeling methods. The proposed method uses a Siamese neural network with metric learning to learn the similarity between vendors and achieve the recognition of vendors’ multiple identities. This method achieved better performance with an average F1-Score of 0.889 and an accuracy rate of 97.54% on the constructed dataset. The contributions of this paper lie in the proposed method for collecting and labeling data for dark web marketplaces and overcoming the limitations of traditional multiclass classifiers to achieve effective recognition of vendors’ multiple identities.

Title: Painting Surface Defect Inspection Using Deeph Learning Model with Ship Painting Quality Evaluation Dataset
Authors: Haneol Seo; Chan-Su Lee
Affiliation: Yeungnam Univesity
Abstract: This paper p resents a painting surface defect detection model using anchor-free detection deep learning models. The dataset for ship painting quality evaluation, which provides the defect type and location, is used for the training and evaluation of the model. We used YOLOX-S and YOLOX-L models for surface defect detection from the selected defects of the dataset. The experiment results show that our proposed model achieves mAP@50:95: 0.678 using the YOLOX-L model, which outperformed the baseline model. We also compare inference time in YOLOX-S and YOLOX-L models. The proposed deep learning model shows a potential solution for paint defect detection in automotive industries.

Title: Fuzzy-based Routing Protocol to Reduce Overhead in Vehicular Opportunistic Networks
Authors: Ermioni Qafzezi; Kevin Bylykbashi; Shunya Higashi; Phudit Ampririt; Keita Matsuo; Leonard Barolli
Affiliation: Department of Information and Communication Engineering, Fukuoka Institute of Technology (FIT)
Abstract: Opportunistic Networks, characterized by intermittent connectivity and dynamic topologies, pose significant challenges for efficient message delivery, resource management, and routing decision-making. This paper introduces the Fuzzy Control Routing Protocol (FCRP), a novel approach designed to address these challenges by leveraging fuzzy logic to enhance routing decisions and improve overall network performance. FCRP evaluates key parameters, including buffer occupancy, angle to the destination, and the number of unique connections, to make context aware routing decisions. The protocol was implemented and evaluated using the FuzzyC simulator for theoretical validation and The ONE Simulator for realistic network scenarios. Simulation results demonstrate that FCRP achieves competitive delivery probability, efficient resource utilization, and low overhead compared to Epidemic and MaxProp protocols. Notably, FCRP consistently outperformed the Epidemic protocol across all metrics and exhibited comparable delivery probability to MaxProp while maintaining significantly lower overhead, particularly in high-density scenarios. These results underscore FCRP’s ability to adapt to varying network conditions, effectively balance forwarding and resource management, and maintain robust performance in dynamic vehicular environments. This study highlights FCRP’s potential as an efficient routing solution for Opportunistic Networks, particularly in applications requiring reliable communication and resource efficiency. Future work will explore further optimization to reduce latency and extend FCRP’s applicability to more complex networking environments.

Back to TopTop