16th IEEE International Conference on Tools With Artificial Intelligence
DOI: 10.1109/ictai.2004.22
|View full text |Cite
|
Sign up to set email alerts
|

A vertical outlier detection algorithm with clusters as by-product

Abstract: Outlier detection can lead to discovering unexpected and interesting knowledge, which is critically important to some areas such as monitoring of criminal activities in electronic commerce, credit card fraud, and the like. In this paper, we propose an efficient outlier detection method with clusters as by-product, which works efficiently for large datasets. Our contributions are: a) We introduce a Local Connective Factor (LCF); b) Based on LCF, we propose an outlier detection method which can efficiently detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…There are a great many proximity‐based approaches. From the proximity viewpoint, an object is considered an outlier if it is not close to the other objects (Kollios, Gunopulos, Koudas, & Berchtold, ; Ren, Rahal, & Perrizo, ).…”
Section: Related Workmentioning
confidence: 99%
“…There are a great many proximity‐based approaches. From the proximity viewpoint, an object is considered an outlier if it is not close to the other objects (Kollios, Gunopulos, Koudas, & Berchtold, ; Ren, Rahal, & Perrizo, ).…”
Section: Related Workmentioning
confidence: 99%
“…This requires previous fraudulent use before any future fraud can be detected. Unsupervised detections does not rely on previous fraud cases but focuses on unusual transaction behaviour (Angiulli, F, 2006) ( Ren, D, 2004).…”
Section: Outlier Detectionmentioning
confidence: 99%
“…Better fraud detection has become an essential requirement for banks in order to maintain a viability payment system. At present, fraud detection is conducted using data mining, statistics, and artificial intelligence (Ghosh, S, 1994) ( Joris C, 2002) ( Ren, D, 2004). Such methods still lack sufficiently secure payment mechanisms to identify internal fraud and trace fraudulent transactions.…”
Section: Introductionmentioning
confidence: 99%
“…introduce a new definition of a cluster-based local outlier, which takes size of a point's cluster and distance between the point and its closest cluster into account. Ren et al (2004) propose a more efficient clustering-based local outlier detection approach, which combines detection of outliers with grouping data into clusters in a one-time process. Bohm et al (2008) propose a robust clustering-based approach, which can be applied to a data set with non-Gaussian distribution to efficiently filter out the outliers.…”
Section: 14mentioning
confidence: 99%