The document is a compilation of various research papers and articles focused on anomaly detection techniques, clustering algorithms, and outlier detection methodologies across different domains. It includes surveys, comparisons, and evaluations of methods such as k-means clustering, DBSCAN, Isolation Forest, and others, highlighting their applications and effectiveness. The references span a range of years, showcasing the evolution and advancements in the field of data mining and anomaly detection.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
2 views
References
The document is a compilation of various research papers and articles focused on anomaly detection techniques, clustering algorithms, and outlier detection methodologies across different domains. It includes surveys, comparisons, and evaluations of methods such as k-means clustering, DBSCAN, Isolation Forest, and others, highlighting their applications and effectiveness. The references span a range of years, showcasing the evolution and advancements in the field of data mining and anomaly detection.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6
[1] E.
Burgdorf, Predicting the impact of data corruption on the operation of cyber-physical
systems. 2017. [2] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM computing surveys (CSUR), vol. 41, no. 3, pp. 1–58, 2009. [3] M. Pang-Ning and V. Steinbach, Introduction to data mining. Pearson Education India, 2016. [4] H. M. Touny, A. S. Moussa, and A. S. Hadi, “Fuzzy multivariate outliers with application on BACON algorithm,” in 2020 IEEE International Conference on Fuzzy Systems (FUZZ- IEEE), 2020. [5] S. Thudumu, P. Branch, J. Jin, and J. Singh, “A comprehensive survey of anomaly detection techniques for high dimensional big data,” J. Big Data, vol. 7, no. 1, 2020, doi: 10.1186/s40537-020-00320-x. [6] O. J. Oyelade, O. O. Oladipupo, and I. C. Obagbuwa, “Application of k Means Clustering algorithm for prediction of Students Academic Performance,” arXiv [cs.LG], 2010. [Online] Available: http://arxiv.org/abs/1002.2425 [7] H. L. Sari, D. Suranti Mrs, and L. N. Zulita, “Implementation of k-means clustering method for electronic learning model,” J. Phys. Conf. Ser., vol. 930, p. 012021, 2017, doi: 10.1088/1742-6596/930/1/012021. [8] M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, “A density-based algorithm for discovering clusters in large spatial databases with noise,” In kdd, vol. 96, no. 34, pp. 226–231, 1996. [9] D. Deng, “DBSCAN clustering algorithm based on density,” in 2020 7 th International Forum on Electrical Engineering and Automation (IFEEA), 2020. [10] F. T. Liu, K. M. Ting, and Z.-H. Zhou, “Isolation Forest,” in 2008 Eighth IEEE International Conference on Data Mining, 2008. [11] R. Gao, T. Zhang, S. Sun, and Z. Liu, “Research and improvement of Isolation Forest in detection of local anomaly points,” J. Phys. Conf. Ser., vol. 1237, no. 5, p. 052023, 2019, doi: 10.1088/1742-6596/1237/5/052023. [12] M. Ashrafuzzaman, S. Das, A. A. Jillepalli, Y. Chakhchoukh, and F. T. Sheldon, “Elliptic envelope based detection of stealthy false data injection attacks in smart grid control systems,” in 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 2020. [13] C. McKinnon, J. Carroll, A. McDonald, S. Koukoura, D. Infield, and C. Soraghan, “Comparison of new anomaly detection technique for wind turbine condition monitoring using gearbox SCADA data,” Energies, vol. 13, no. 19, p. 5152, 2020, doi: 10.3390/en13195152. [14] Goldstein, Markus, and Andreas Dengel. "Histogram-based outlier score (hbos): A fast unsupervised anomaly detection algorithm." KI-2012: poster and demo track 9 (2012). [15] N. Paulauskas and A. Baskys, “Application of histogram-based outlier scores to detect computer network anomalies,” Electronics (Basel), vol. 8, no. 11, p. 1251, 2019, doi: 10.3390/electronics8111251. [16] I. T. Jolliffe and J. Cadima, “Principal component analysis: a review and recent developments,” Philos. Trans. A Math. Phys. Eng. Sci., vol. 374, no. 2065, p. 20150202, 2016, doi: 10.1098/rsta.2015.0202. [17] S. Mishra et al., “Principal Component Analysis,” Int. J. Livest. Res., p. 1, 2017, doi: 10.5455/ijlr.20170415115235. [18] A. Karimian, Z. Yang, and R. Tron, “Rotational outlier identification in pose graphs using dual decomposition,” in Computer Vision – ECCV 2020, Cham: Springer International Publishing, 2020, pp. 391–407. [19] Y. Almardeny, N. Boujnah, and F. Cleary, “A novel outlier detection method for multivariate data,” IEEE Trans. Knowl. Data Eng., vol. 34, no. 9, pp. 4052–4062, 2022, doi: 10.1109/tkde.2020.3036524. [20] O. Alghushairy, R. Alsini, T. Soule, and X. Ma, “A review of Local Outlier Factor algorithms for outlier detection in big data streams,” Big Data Cogn. Comput., vol. 5, no. 1, p. 1, 2020, doi: 10.3390/bdcc5010001. [21] M. M. Breunig, R. T. Kriegel, and J. Ng, “LOF: identifying density-based local outliers,” in Proceedings of the 2000 ACM SIGMOD international conference on Management of data, 2000, pp. 93–104. [22] L. Ruff et al., “Deep one-class classification,” in International conference on machine learning, PMLR, 2018, pp. 4393–4402. [23] Z. Zhang and X. Deng, “Anomaly detection using improved deep SVDD model with data structure preservation,” Pattern Recognit. Lett., vol. 148, pp. 1–6, 2021, doi: 10.1016/j.patrec.2021.04.020. [24] L. Adamic and E. Adar, “How to search a social network,” Soc. Networks, vol. 27, no. 3, pp. 187–203, 2005, doi: 10.1016/j.socnet.2005.01.007. [25] F. Gao, K. Musial, C. Cooper, and S. Tsoka, “Link prediction methods and their accuracy for different social networks and network metrics,” Sci. Program., vol. 2015, pp. 1–13, 2015, doi: 10.1155/2015/172879. [26] I. Goodfellow et al., “Generative adversarial networks,” Commun. ACM, vol. 63, no. 11, pp. 139–144, 2020, doi: 10.1145/3422622. [27] L. Xu, M. Skoularidou, A. Cuesta-Infante, and K. Veeramachaneni, “Mod-eling Tabular data using Conditional GAN,” arXiv [cs.LG], 2019. [Online]: Available: http://arxiv.org/abs/1907.00503 [28] V. J. Hodge and J. Austin, “A survey of outlier detection methodologies,” Artif. Intell. Rev., vol. 22, no. 2, pp. 85–126, 2004, doi: 10.1007/s10462-004-4304-y. [29] A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Comput. Netw., vol. 51, no. 12, pp. 3448–3470, 2007, doi: 10.1016/j.comnet.2007.02.001. [30] M. Jiang, P. Cui, and C. Faloutsos, “Suspicious behavior detection: Current trends and future directions,” IEEE Intell. Syst., vol. 31, no. 1, pp. 31–39, 2016, doi: 10.1109/mis.2016.5. [31] C. O. S. Sorzano, J. Vargas, and A. P. Montano, “A survey of dimension- ality reduction techniques,” arXiv [stat.ML], 2014. [Online]. Available: http://arxiv.org/abs/1403.2877 [32] J. Gama, A. Ganguly, O. Omitaomu, R. Vatsavai, and M. Gaber, “Knowledge discovery from data streams,” Intell. Data Anal., vol. 13, no. 3, pp.403–404, 2009, doi: 10.3233/ida- 2009-0372. [33] M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, “Outlier Detection for Temporal Data: A Survey,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2250–2267, 2014, doi: 10.1109/tkde.2013.184. [34] A. Heydari, M. A. Tavakoli, N. Salim, and Z. Heydari, “Detection of review spam: A survey,” Expert Syst. Appl., vol. 42, no. 7, pp. 3634–3642, 2015, doi: 10.1016/j.eswa.2014.12.029. [35] N. Jindal and B. Liu, “Review spam detection,” in Proceedings of the 16 th international conference on World Wide Web - WWW ’07, 2007. [36] E. M. Knorr, R. T. Ng, and V. Tucakov, “Distance-based outliers: algorithms and applications,” VLDB J., vol. 8, no. 3–4, pp. 237–253, 2000, doi: 10.1007/s007780050006. [37] S. Ramaswamy, R. Rastogi, and S. Kyuseok, “Efficient algorithms for mining outliers from large data sets”,” in Proc. of the ACM SIGMOD International Conference on Management of Data, 2000, pp. 93–104. [38] C. C. Aggarwal and P. S. Yu, “Outlier detection for high dimensional data,” in Proceedings of the 2001 ACM SIGMOD international conference on Management of data - SIGMOD ’01, 2001. [39] J. Han and M. Kamber, Data Mining Concepts and Techniques. USA: Morgan Kaufmann, 2001. [40] D. Yu and G. Sheikholeslami, “A find out: finding outliers in very large datasets”,” in Knowledge and Information Systems, 2002, pp. 387–412. [41] M.F. Jiang, S.s. Tseng, C. M. Su., ”Two-phase clustering process for outlier detection. pattern recognition letters”, 2001, vol. 22(6-7), pp. 691–700. [42] C. C. Aggarwal and P. S. Yu, “An effective and efficient algorithm for high-dimensional outlier detection,” VLDB J., vol. 14, no. 2, pp. 211–221, 2005, doi: 10.1007/s00778-004- 0125-5. [43] Z. Li, Y. Zhao, X. Hu, N. Botta, C. Ionescu, and G. Chen, “ECOD: Unsupervised outlier detection using empirical cumulative distribution functions,” IEEE Trans. Knowl. Data Eng., pp. 1–1, 2022, doi:10.1109/tkde.2022.3159580. [44] G. Dudek and J. Szkutnik, “Daily load curves in distribution networks- Analysis of diversity and outlier detection,” in 2017 18th International Scientific Conference on Electric Power Engineering (EPE), 2017. [45] E. Andersen, M. Chiarandini, M. Hassani, S. Janicke, P. Tampakis, and A. Zimek, “Evaluation of probability distribution distance metrics in traffic flow outlier detection,” in 2022 23rd IEEE International Conference on Mobile Data Management (MDM), 2022. [46] Y. Chen, X. Dang, H. Peng, H. L. Bart, and H. L. Bart, “Outlier detection with the kernelized spatial depth function,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 2, pp. 288–305, 2009, doi: 10.1109/tpami.2008.72. [47] S. Lu, L. Liu, J. Li, and T. D. Le, “Effective Outlier Detection based on Bayesian Network and Proximity,” in 2018 IEEE International Conference on Big Data (Big Data), 2018. [48] M. Kim, S. Jung, and S. Kim, “Fault detection method using inverse distance weight- based local outlier factor,” in 2021 International Conference on Fuzzy Theory and Its Applications (iFUZZY), 2021. [49] X. Wang, Y. Chen, and X. L. Wang, “A Centroid-Based Outlier Detection Method,” in 2017 International Conference on Computational Science and Computational Intelligence (CSCI), 2017. [50] M. A. Haque and H. Mineno, “Proposal of online outlier detection in sensor data using kernel density estimation,” in 2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI), 2017. [51] Y. Tao and D. Pi, “Unifying density-based clustering and outlier detection,” in 2009 Second International Workshop on Knowledge Discovery and Data Mining, 2009. [52] G. Liu, J. Pang, X. Piao, and S. Huang, “The discovery of attribute feature cluster for any clustering result based on outlier detection technique,” in 2008 International Conference on Internet Computing in Science and Engineering, 2008. [53] R. Pamula, J. K. Deka, and S. Nandi, “An outlier detection method based on clustering,” in 2011 Second International Conference on Emerging Applications of Information Technology, 2011. [54] B. Angelin and A. Geetha, “Outlier detection using clustering techniques – K-means and K-median,” in 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), 2020. [55] Y. Wang, B. Dai, G. Hua, J. Aston, and D. Wipf, “Recurrent variational autoencoders for learning nonlinear generative models in the presence of outliers,” IEEE J. Sel. Top. Signal Process., vol. 12, no. 6, pp. 1615–1627, 2018, doi: 10.1109/jstsp.2018.2876995. [56] Y. Li and H. Wu, “A clustering method based on K-means algorithm,” Phys. Procedia, vol. 25, pp. 1104–1109, 2012, doi: 10.1016/j.phpro.2012.03.206. [57] Z. Li, Y. Zhao, N. Botta, C. Ionescu, and X. Hu, “COPOD: Copula-Based Outlier Detection,” in 2020 IEEE International Conference on Data Mining (ICDM), 2020. [58] K. J. Paul and R. Harilal, “Implementation of MAD and Mean Absolute Deviation based Smoothing Algorithm for Displacement Data in Digital Image Correlation Technique,” pp. 1– 6, 2014. [59] Z. Li, Y. Zhao, X. Hu, N. Botta, C. Ionescu, and G. Chen, “ECOD: Unsupervised outlier detection using empirical cumulative distribution functions,” IEEE Trans. Knowl. Data Eng., pp. 1–1, 2022, doi: 10.1109/tkde.2022.3159580. [60] A. Goodge, B. Hooi, S. K. Ng, and W. S. Ng, “LUNAR: Unifying local outlier detection methods via graph neural networks,” arXiv [cs.LG], 2021. [Online]. Available: http://arxiv.org/abs/2112.05355 [61] A. Bounsiar and M. G. Madden, “One-class support vector machines revisited,” in 2014 International Conference on Information Science and Applications (ICISA), 2014. [62] L. A. Adamic and E. Adar, “Friends and neighbors on the web,” Soc. Networks, vol. 25, no. 3, pp. 211–230, 2003, doi: 10.1016/s0378-8733(03)00009-1 [63] X. Zhao, Y. Zhang, S. Xie, Q. Qin, S. Wu, and B. Luo, “Outlier detection based on residual histogram preference for geometric multi-model fitting,” Sensors (Basel), vol. 20, no. 11, p. 3037, 2020, doi: 10.3390/s20113037 [64] M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, “LOF: Identifying density-based local outliers,” in Proceedings of the 2000 ACM SIGMOD international conference on Management of data - SIGMOD ’00, 2000. [65] Z. Cheng, C. Zou, and J. Dong, “Outlier detection using isolation forest and local outlier factor,” in Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019. [66] H.-P. Kriegel, P. Kröger, E. Schubert, and A. Zimek, “LoOP: local outlier probabilities,” in Proceedings of the 18th ACM conference on Information and knowledge management, 2009, pp. 1649–1652. [67] R. Gupta and K. Pandey, “Density based outlier detection technique,” in Advances in Intelligent Systems and Computing, New Delhi: Springer India, 2016, pp. 51–58. [68] O. Alghushairy, R. Alsini, T. Soule, and X. Ma, “A review of Local Outlier Factor algorithms for outlier detection in big data streams,” Big Data Cogn. Comput., vol. 5, no. 1, p. 1, 2020, doi: 10.3390/bdcc5010001. [69] H. Xu, L. Zhang, P. Li, and F. Zhu, “Outlier detection algorithm based on k-nearest neighbors-local outlier factor,” Journal of Algorithms and Computational Technology, vol. 16, 2022. [70] A. Liu and J. Zhang, “An outlier mining algorithm based on local weighted k-density,” in 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2011. [71] J. Lee and R. Tukhvatov, “Evaluations of similarity measures on VK for link prediction,” Data Sci. Eng., vol. 3, no. 3, pp. 277–289, 2018, doi: 10.1007/s41019-018-0073-5. [72] “Robust outlier detection using SVM regression,” in 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat No 04CH37541) IJCNN-04, 2004. [73] X.-Y. Yang, J. Liu, M.-Q. Zhang, and K. Niu, “A new multi-class SVM algorithm based on one-class SVM,” in Computational Science – ICCS 2007, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 677–684. [74] E. H. Budiarto, A. Erna Permanasari, and S. Fauziati, “Unsupervised anomaly detection using K-means, local outlier factor and one class SVM,” in 2019 5th International Conference on Science and Technology (ICST), 2019. [75] M. Amer, M. Goldstein, and S. Abdennadher, “Enhancing one-class support vector machines for unsupervised anomaly detection,” in Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description - ODD ’13, 2013. [76] H. Lukashevich, S. Nowak, and P. Dunker, “Using one-class SVM outliers detection for verification of collaboratively tagged image training sets,” in 2009 IEEE International Conference on Multimedia and Expo, 2009. [77] J. A. Hartigan and M. A. Wong, “Algorithm AS 136: A K-means clustering algorithm,” J. R. Stat. Soc. Ser. C. Appl. Stat., vol. 28, no. 1, p. 100, 1979, doi: 10.2307/2346830. [78] D. Marutho, S. Hendra Handaka, E. Wijaya, and Muljono, “The determination of cluster number at k-mean using elbow method and purity evaluation on headline news,” in 2018 International Seminar on Application for Technology of Information and Communication, 2018. [79] T. M. Kodinariya and P. R. Makwana, “Review on determining number of Cluster in K- Means Clustering,” International Journal, vol. 1, no. 6, pp.90–95, 2013. [80] C. Xiong, Z. Hua, K. Lv, and X. Li, “An improved K-means text clustering algorithm by optimizing initial cluster centers,” in 2016 7th International Conference on Cloud Computing and Big Data (CCBD), 2016.
(Terrorism, Security, and Computation) Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang (Auth.) - Anomaly Detection Principles and Algorithms-Springer International Publishing (2017)