0% found this document useful (0 votes)
2 views

References

The document is a compilation of various research papers and articles focused on anomaly detection techniques, clustering algorithms, and outlier detection methodologies across different domains. It includes surveys, comparisons, and evaluations of methods such as k-means clustering, DBSCAN, Isolation Forest, and others, highlighting their applications and effectiveness. The references span a range of years, showcasing the evolution and advancements in the field of data mining and anomaly detection.

Uploaded by

invaliduser163
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

References

The document is a compilation of various research papers and articles focused on anomaly detection techniques, clustering algorithms, and outlier detection methodologies across different domains. It includes surveys, comparisons, and evaluations of methods such as k-means clustering, DBSCAN, Isolation Forest, and others, highlighting their applications and effectiveness. The references span a range of years, showcasing the evolution and advancements in the field of data mining and anomaly detection.

Uploaded by

invaliduser163
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

[1] E.

Burgdorf, Predicting the impact of data corruption on the operation of cyber-physical


systems. 2017.
[2] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM
computing surveys (CSUR), vol. 41, no. 3, pp. 1–58, 2009.
[3] M. Pang-Ning and V. Steinbach, Introduction to data mining. Pearson Education India,
2016.
[4] H. M. Touny, A. S. Moussa, and A. S. Hadi, “Fuzzy multivariate outliers with application
on BACON algorithm,” in 2020 IEEE International Conference on Fuzzy Systems (FUZZ-
IEEE), 2020.
[5] S. Thudumu, P. Branch, J. Jin, and J. Singh, “A comprehensive survey of anomaly
detection techniques for high dimensional big data,” J. Big Data, vol. 7, no. 1, 2020, doi:
10.1186/s40537-020-00320-x.
[6] O. J. Oyelade, O. O. Oladipupo, and I. C. Obagbuwa, “Application of k Means Clustering
algorithm for prediction of Students Academic Performance,” arXiv [cs.LG], 2010.
[Online] Available: http://arxiv.org/abs/1002.2425
[7] H. L. Sari, D. Suranti Mrs, and L. N. Zulita, “Implementation of k-means clustering
method for electronic learning model,” J. Phys. Conf. Ser., vol. 930, p. 012021, 2017, doi:
10.1088/1742-6596/930/1/012021.
[8] M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, “A density-based algorithm for discovering
clusters in large spatial databases with noise,” In kdd, vol. 96, no. 34, pp. 226–231, 1996.
[9] D. Deng, “DBSCAN clustering algorithm based on density,” in 2020 7 th International
Forum on Electrical Engineering and Automation (IFEEA), 2020.
[10] F. T. Liu, K. M. Ting, and Z.-H. Zhou, “Isolation Forest,” in 2008 Eighth IEEE
International Conference on Data Mining, 2008.
[11] R. Gao, T. Zhang, S. Sun, and Z. Liu, “Research and improvement of Isolation Forest in
detection of local anomaly points,” J. Phys. Conf. Ser., vol. 1237, no. 5, p. 052023, 2019, doi:
10.1088/1742-6596/1237/5/052023.
[12] M. Ashrafuzzaman, S. Das, A. A. Jillepalli, Y. Chakhchoukh, and F. T. Sheldon, “Elliptic
envelope based detection of stealthy false data injection attacks in smart grid control
systems,” in 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 2020.
[13] C. McKinnon, J. Carroll, A. McDonald, S. Koukoura, D. Infield, and C. Soraghan,
“Comparison of new anomaly detection technique for wind turbine condition monitoring
using gearbox SCADA data,” Energies, vol. 13, no. 19, p. 5152, 2020, doi:
10.3390/en13195152.
[14] Goldstein, Markus, and Andreas Dengel. "Histogram-based outlier score (hbos): A fast
unsupervised anomaly detection algorithm." KI-2012: poster and demo track 9 (2012).
[15] N. Paulauskas and A. Baskys, “Application of histogram-based outlier scores to detect
computer network anomalies,” Electronics (Basel), vol. 8, no. 11, p. 1251, 2019, doi:
10.3390/electronics8111251.
[16] I. T. Jolliffe and J. Cadima, “Principal component analysis: a review and recent
developments,” Philos. Trans. A Math. Phys. Eng. Sci., vol. 374, no. 2065, p. 20150202,
2016, doi: 10.1098/rsta.2015.0202.
[17] S. Mishra et al., “Principal Component Analysis,” Int. J. Livest. Res., p. 1, 2017, doi:
10.5455/ijlr.20170415115235.
[18] A. Karimian, Z. Yang, and R. Tron, “Rotational outlier identification in pose graphs
using dual decomposition,” in Computer Vision – ECCV 2020, Cham: Springer International
Publishing, 2020, pp. 391–407.
[19] Y. Almardeny, N. Boujnah, and F. Cleary, “A novel outlier detection method for
multivariate data,” IEEE Trans. Knowl. Data Eng., vol. 34, no. 9, pp. 4052–4062, 2022, doi:
10.1109/tkde.2020.3036524.
[20] O. Alghushairy, R. Alsini, T. Soule, and X. Ma, “A review of Local Outlier Factor
algorithms for outlier detection in big data streams,” Big Data Cogn. Comput., vol. 5, no. 1,
p. 1, 2020, doi: 10.3390/bdcc5010001.
[21] M. M. Breunig, R. T. Kriegel, and J. Ng, “LOF: identifying density-based local outliers,”
in Proceedings of the 2000 ACM SIGMOD international conference on Management of data,
2000, pp. 93–104.
[22] L. Ruff et al., “Deep one-class classification,” in International conference on machine
learning, PMLR, 2018, pp. 4393–4402.
[23] Z. Zhang and X. Deng, “Anomaly detection using improved deep SVDD model with
data structure preservation,” Pattern Recognit. Lett., vol. 148, pp. 1–6, 2021, doi:
10.1016/j.patrec.2021.04.020.
[24] L. Adamic and E. Adar, “How to search a social network,” Soc. Networks, vol. 27, no. 3,
pp. 187–203, 2005, doi: 10.1016/j.socnet.2005.01.007.
[25] F. Gao, K. Musial, C. Cooper, and S. Tsoka, “Link prediction methods and their accuracy
for different social networks and network metrics,” Sci. Program., vol. 2015, pp. 1–13, 2015,
doi: 10.1155/2015/172879.
[26] I. Goodfellow et al., “Generative adversarial networks,” Commun. ACM, vol. 63, no. 11,
pp. 139–144, 2020, doi: 10.1145/3422622.
[27] L. Xu, M. Skoularidou, A. Cuesta-Infante, and K. Veeramachaneni, “Mod-eling Tabular
data using Conditional GAN,” arXiv [cs.LG], 2019.
[Online]: Available: http://arxiv.org/abs/1907.00503
[28] V. J. Hodge and J. Austin, “A survey of outlier detection methodologies,” Artif. Intell.
Rev., vol. 22, no. 2, pp. 85–126, 2004, doi: 10.1007/s10462-004-4304-y.
[29] A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing
solutions and latest technological trends,” Comput. Netw., vol. 51, no. 12, pp. 3448–3470,
2007, doi: 10.1016/j.comnet.2007.02.001.
[30] M. Jiang, P. Cui, and C. Faloutsos, “Suspicious behavior detection: Current trends and
future directions,” IEEE Intell. Syst., vol. 31, no. 1, pp. 31–39, 2016, doi:
10.1109/mis.2016.5.
[31] C. O. S. Sorzano, J. Vargas, and A. P. Montano, “A survey of dimension- ality reduction
techniques,” arXiv [stat.ML], 2014. [Online]. Available: http://arxiv.org/abs/1403.2877
[32] J. Gama, A. Ganguly, O. Omitaomu, R. Vatsavai, and M. Gaber, “Knowledge discovery
from data streams,” Intell. Data Anal., vol. 13, no. 3, pp.403–404, 2009, doi: 10.3233/ida-
2009-0372.
[33] M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, “Outlier Detection for Temporal Data: A
Survey,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2250–2267, 2014, doi:
10.1109/tkde.2013.184.
[34] A. Heydari, M. A. Tavakoli, N. Salim, and Z. Heydari, “Detection of review spam: A
survey,” Expert Syst. Appl., vol. 42, no. 7, pp. 3634–3642, 2015, doi:
10.1016/j.eswa.2014.12.029.
[35] N. Jindal and B. Liu, “Review spam detection,” in Proceedings of the 16 th international
conference on World Wide Web - WWW ’07, 2007.
[36] E. M. Knorr, R. T. Ng, and V. Tucakov, “Distance-based outliers: algorithms and
applications,” VLDB J., vol. 8, no. 3–4, pp. 237–253, 2000, doi: 10.1007/s007780050006.
[37] S. Ramaswamy, R. Rastogi, and S. Kyuseok, “Efficient algorithms for mining outliers
from large data sets”,” in Proc. of the ACM SIGMOD International Conference on
Management of Data, 2000, pp. 93–104.
[38] C. C. Aggarwal and P. S. Yu, “Outlier detection for high dimensional data,” in
Proceedings of the 2001 ACM SIGMOD international conference on Management of data -
SIGMOD ’01, 2001.
[39] J. Han and M. Kamber, Data Mining Concepts and Techniques. USA: Morgan
Kaufmann, 2001.
[40] D. Yu and G. Sheikholeslami, “A find out: finding outliers in very large datasets”,” in
Knowledge and Information Systems, 2002, pp. 387–412.
[41] M.F. Jiang, S.s. Tseng, C. M. Su., ”Two-phase clustering process for outlier detection.
pattern recognition letters”, 2001, vol. 22(6-7), pp. 691–700.
[42] C. C. Aggarwal and P. S. Yu, “An effective and efficient algorithm for high-dimensional
outlier detection,” VLDB J., vol. 14, no. 2, pp. 211–221, 2005, doi: 10.1007/s00778-004-
0125-5.
[43] Z. Li, Y. Zhao, X. Hu, N. Botta, C. Ionescu, and G. Chen, “ECOD: Unsupervised outlier
detection using empirical cumulative distribution functions,” IEEE Trans. Knowl. Data Eng.,
pp. 1–1, 2022, doi:10.1109/tkde.2022.3159580.
[44] G. Dudek and J. Szkutnik, “Daily load curves in distribution networks- Analysis of
diversity and outlier detection,” in 2017 18th International Scientific Conference on Electric
Power Engineering (EPE), 2017.
[45] E. Andersen, M. Chiarandini, M. Hassani, S. Janicke, P. Tampakis, and A. Zimek,
“Evaluation of probability distribution distance metrics in traffic flow outlier detection,” in
2022 23rd IEEE International Conference on Mobile Data Management (MDM), 2022.
[46] Y. Chen, X. Dang, H. Peng, H. L. Bart, and H. L. Bart, “Outlier detection with the
kernelized spatial depth function,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 2, pp.
288–305, 2009, doi: 10.1109/tpami.2008.72.
[47] S. Lu, L. Liu, J. Li, and T. D. Le, “Effective Outlier Detection based on Bayesian
Network and Proximity,” in 2018 IEEE International Conference on Big Data (Big Data),
2018.
[48] M. Kim, S. Jung, and S. Kim, “Fault detection method using inverse distance weight-
based local outlier factor,” in 2021 International Conference on Fuzzy Theory and Its
Applications (iFUZZY), 2021.
[49] X. Wang, Y. Chen, and X. L. Wang, “A Centroid-Based Outlier Detection Method,” in
2017 International Conference on Computational Science and Computational Intelligence
(CSCI), 2017.
[50] M. A. Haque and H. Mineno, “Proposal of online outlier detection in sensor data using
kernel density estimation,” in 2017 6th IIAI International Congress on Advanced Applied
Informatics (IIAI-AAI), 2017.
[51] Y. Tao and D. Pi, “Unifying density-based clustering and outlier detection,” in 2009
Second International Workshop on Knowledge Discovery and Data Mining, 2009.
[52] G. Liu, J. Pang, X. Piao, and S. Huang, “The discovery of attribute feature cluster for
any clustering result based on outlier detection technique,” in 2008 International Conference
on Internet Computing in Science and Engineering, 2008.
[53] R. Pamula, J. K. Deka, and S. Nandi, “An outlier detection method based on clustering,”
in 2011 Second International Conference on Emerging Applications of Information
Technology, 2011.
[54] B. Angelin and A. Geetha, “Outlier detection using clustering techniques – K-means and
K-median,” in 2020 4th International Conference on Intelligent Computing and Control
Systems (ICICCS), 2020.
[55] Y. Wang, B. Dai, G. Hua, J. Aston, and D. Wipf, “Recurrent variational autoencoders for
learning nonlinear generative models in the presence of outliers,” IEEE J. Sel. Top. Signal
Process., vol. 12, no. 6, pp. 1615–1627, 2018, doi: 10.1109/jstsp.2018.2876995.
[56] Y. Li and H. Wu, “A clustering method based on K-means algorithm,” Phys. Procedia,
vol. 25, pp. 1104–1109, 2012, doi: 10.1016/j.phpro.2012.03.206.
[57] Z. Li, Y. Zhao, N. Botta, C. Ionescu, and X. Hu, “COPOD: Copula-Based Outlier
Detection,” in 2020 IEEE International Conference on Data Mining (ICDM), 2020.
[58] K. J. Paul and R. Harilal, “Implementation of MAD and Mean Absolute Deviation based
Smoothing Algorithm for Displacement Data in Digital Image Correlation Technique,” pp. 1–
6, 2014.
[59] Z. Li, Y. Zhao, X. Hu, N. Botta, C. Ionescu, and G. Chen, “ECOD: Unsupervised outlier
detection using empirical cumulative distribution functions,” IEEE Trans. Knowl. Data Eng.,
pp. 1–1, 2022, doi: 10.1109/tkde.2022.3159580.
[60] A. Goodge, B. Hooi, S. K. Ng, and W. S. Ng, “LUNAR: Unifying local outlier detection
methods via graph neural networks,” arXiv [cs.LG], 2021.
[Online]. Available: http://arxiv.org/abs/2112.05355
[61] A. Bounsiar and M. G. Madden, “One-class support vector machines revisited,” in 2014
International Conference on Information Science and Applications (ICISA), 2014.
[62] L. A. Adamic and E. Adar, “Friends and neighbors on the web,” Soc. Networks, vol. 25,
no. 3, pp. 211–230, 2003, doi: 10.1016/s0378-8733(03)00009-1
[63] X. Zhao, Y. Zhang, S. Xie, Q. Qin, S. Wu, and B. Luo, “Outlier detection based on
residual histogram preference for geometric multi-model fitting,” Sensors (Basel), vol. 20, no.
11, p. 3037, 2020, doi: 10.3390/s20113037
[64] M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, “LOF: Identifying density-based
local outliers,” in Proceedings of the 2000 ACM SIGMOD international conference on
Management of data - SIGMOD ’00, 2000.
[65] Z. Cheng, C. Zou, and J. Dong, “Outlier detection using isolation forest and local outlier
factor,” in Proceedings of the Conference on Research in Adaptive and Convergent Systems,
2019.
[66] H.-P. Kriegel, P. Kröger, E. Schubert, and A. Zimek, “LoOP: local outlier probabilities,”
in Proceedings of the 18th ACM conference on Information and knowledge management,
2009, pp. 1649–1652.
[67] R. Gupta and K. Pandey, “Density based outlier detection technique,” in Advances in
Intelligent Systems and Computing, New Delhi: Springer India, 2016, pp. 51–58.
[68] O. Alghushairy, R. Alsini, T. Soule, and X. Ma, “A review of Local Outlier Factor
algorithms for outlier detection in big data streams,” Big Data Cogn. Comput., vol. 5, no. 1,
p. 1, 2020, doi: 10.3390/bdcc5010001.
[69] H. Xu, L. Zhang, P. Li, and F. Zhu, “Outlier detection algorithm based on k-nearest
neighbors-local outlier factor,” Journal of Algorithms and Computational Technology, vol.
16, 2022.
[70] A. Liu and J. Zhang, “An outlier mining algorithm based on local weighted k-density,”
in 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery
(FSKD), 2011.
[71] J. Lee and R. Tukhvatov, “Evaluations of similarity measures on VK for link prediction,”
Data Sci. Eng., vol. 3, no. 3, pp. 277–289, 2018, doi: 10.1007/s41019-018-0073-5.
[72] “Robust outlier detection using SVM regression,” in 2004 IEEE International Joint
Conference on Neural Networks (IEEE Cat No 04CH37541) IJCNN-04, 2004.
[73] X.-Y. Yang, J. Liu, M.-Q. Zhang, and K. Niu, “A new multi-class SVM algorithm based
on one-class SVM,” in Computational Science – ICCS 2007, Berlin, Heidelberg: Springer
Berlin Heidelberg, 2007, pp. 677–684.
[74] E. H. Budiarto, A. Erna Permanasari, and S. Fauziati, “Unsupervised anomaly detection
using K-means, local outlier factor and one class SVM,” in 2019 5th International
Conference on Science and Technology (ICST), 2019.
[75] M. Amer, M. Goldstein, and S. Abdennadher, “Enhancing one-class support vector
machines for unsupervised anomaly detection,” in Proceedings of the ACM SIGKDD
Workshop on Outlier Detection and Description - ODD ’13, 2013.
[76] H. Lukashevich, S. Nowak, and P. Dunker, “Using one-class SVM outliers detection for
verification of collaboratively tagged image training sets,” in 2009 IEEE International
Conference on Multimedia and Expo, 2009.
[77] J. A. Hartigan and M. A. Wong, “Algorithm AS 136: A K-means clustering algorithm,” J.
R. Stat. Soc. Ser. C. Appl. Stat., vol. 28, no. 1, p. 100, 1979, doi: 10.2307/2346830.
[78] D. Marutho, S. Hendra Handaka, E. Wijaya, and Muljono, “The determination of cluster
number at k-mean using elbow method and purity evaluation on headline news,” in 2018
International Seminar on Application for Technology of Information and Communication,
2018.
[79] T. M. Kodinariya and P. R. Makwana, “Review on determining number of Cluster in K-
Means Clustering,” International Journal, vol. 1, no. 6, pp.90–95, 2013.
[80] C. Xiong, Z. Hua, K. Lv, and X. Li, “An improved K-means text clustering algorithm by
optimizing initial cluster centers,” in 2016 7th International Conference on Cloud Computing
and Big Data (CCBD), 2016.

You might also like