Have a personal or library account? Click to login
Anomaly Pattern Detection in Streaming Data Based on the Transformation to Multiple Binary-Valued Data Streams Cover

Anomaly Pattern Detection in Streaming Data Based on the Transformation to Multiple Binary-Valued Data Streams

By: Taegong Kim and  Cheong Hee Park  
Open Access
|Oct 2021

References

  1. [1] D. Hawkins. Identification of outliers. Springer Netherlands, 1980.10.1007/978-94-015-3994-4
  2. [2] C.H. Park. Outlier and anomaly pattern detection on data streams. The Journal of Supercomputing, 75:6118–6128, 2019.10.1007/s11227-018-2674-1
  3. [3] T. Kim and C.H. Park. Anomaly pattern detection for streaming data. Expert Systems with Applications, 149, 2020.10.1016/j.eswa.2020.113252
  4. [4] F. Liu, K. Ting, and Z. Zhou. Isolation forest. In Proceedings of the 8th International Conference on Data Mining, 2008.10.1109/ICDM.2008.17
  5. [5] Q. Feng, Y. Zhang, C. Li, Z. Dou, and J. Wang. Anomaly detection of spectrum in wireless communication via deep auto-encoders. The Journal of Supercomputing, 73(7):3161–3178, 2017.10.1007/s11227-017-2017-7
  6. [6] P. Remy. Anomaly detection in time setries using auto encoders. bolg positng from http://philipperemy.github.io/anomaly-detection.
  7. [7] D. Pokrajac, A. Lazarevic, and L.J. Latecki. Incremental local outlier detection for data streams. In Proceedings of the CIDM, 2007.10.1109/CIDM.2007.368917
  8. [8] C. Aggarwal. Outlier analysis. Springer, 2017.10.1007/978-3-319-47578-3
  9. [9] D. Padilla, R. Brinkworth, and M. McDonnell. Performance of a hierarchical temporal memory network in noisy sequence learning. In Proceedings of IEEE international conference on computational intelligence and cybernetics, 2013.10.1109/CyberneticsCom.2013.6865779
  10. [10] S. Ahmad and S. Purdy. Real-time anomaly detection for streaming analytics, 2016. Retrieved from https://arxiv.org/pdf/1607.02480.pdf.
  11. [11] W. Wong, A. Moore, G. Cooper, and M. Wagner. Rule-based anomaly pattern detection for detecting disease outbreaks. In Proceedings of the 18th International Conference on Artificial Intelligence, 2002.
  12. [12] K. Das, J. Schneider, and D. Neil. Anomaly pattern detection in categorical datasets. In Proceedings of KDD, 2008.10.1145/1401890.1401915
  13. [13] F. et al. Pedregosa. Scikit-learn: Machine learning in python. Journal of Machine Learning Research, 12:2825–2830, 2011.
  14. [14] M.M. Breunig, H-P. Kriegel, R.T. Ng, and J. Sander. Lof: Identifying density-based local outliers. In Proceedings of the 2000 ACM Sigmod International Conference on Management of Data, 2000.10.1145/342009.335388
  15. [15] P. Tan, M. Steinbach, and V. Kumar. Introduction to data mining. Addison Wesley, Boston, 2006.
  16. [16] S. Hawkins, H. Hongxing, G. Williams, and R. Baxter. Outlier detection using replicator neural networks. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery, 2002.10.1007/3-540-46145-0_17
  17. [17] A. Bife, G. Holmes, R. Kirkby, and B. Pfahringer. Moa: Massive online analysis. Journal of Machine Learning Research, 11:1601–1604, 2010.
  18. [18] Y. Zhao, Z. Nasrullah, and Z. Li. Pyod: A python toolbox for scalable outlier detection. Journal of Machine Learning Research, 20(96):1–7, 2019.
Language: English
Page range: 19 - 27
Submitted on: Jul 10, 2020
|
Accepted on: Oct 6, 2020
|
Published on: Oct 8, 2021
Published by: SAN University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2021 Taegong Kim, Cheong Hee Park, published by SAN University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.