no code implementations • 1 Apr 2020 • Mohammad Braei, Sebastian Wagner
By analyzing the accuracy of each method as well as the computation time of the algorithms, we provide a thorough insight about the performance of these anomaly detection approaches, alongside some general notion of which method is suited for a certain type of data.