Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &Amp; Data Mining 2019
DOI: 10.1145/3292500.3330748
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection for an E-commerce Pricing System

Abstract: Online retailers execute a very large number of price updates when compared to brick-and-mortar stores. Even a few mis-priced items can have a significant business impact and result in a loss of customer trust. Early detection of anomalies in an automated real-time fashion is an important part of such a pricing system. In this paper, we describe unsupervised and supervised anomaly detection approaches we developed and deployed for a large-scale online pricing system at Walmart. Our system detects anomalies bot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Since its debut, PyOD has been used in various academic and commercial projects. Some examples of the use of PyOD include the detection of anomalies in a large-scale online pricing system at Walmart [ 74 ] and the development of an unsupervised outlier detection framework called DCSO, which has been demonstrated and evaluated for dynamically selecting the most competent base detectors [ 46 ].…”
Section: Related Workmentioning
confidence: 99%
“…Since its debut, PyOD has been used in various academic and commercial projects. Some examples of the use of PyOD include the detection of anomalies in a large-scale online pricing system at Walmart [ 74 ] and the development of an unsupervised outlier detection framework called DCSO, which has been demonstrated and evaluated for dynamically selecting the most competent base detectors [ 46 ].…”
Section: Related Workmentioning
confidence: 99%
“…Te selection of abnormal threshold is the key to the detection performance [27]. Referring to the paper [28], we frst obtain a set of test samples with known abnormal labels and obtain all abnormal scores. By drawing the relationship curve between F1-score (including precision rate and recall rate) and the threshold, we fnd that the threshold corresponding to the maximum value of the F1-score is the best threshold ϵ.…”
Section: Mw-cave Anomaly Detectionmentioning
confidence: 99%
“…Yong Yang [18] introduced an approach to detect anomalies by analyzing the sequence of web access behaviors. In addition, Jagdish et al [19] designed an anomaly detection system in E-commerec systems based on features showing business characteristics such as price, goods, etc. Thes features are also adopted in this paper, but at a more general level and the extraction process of these features is implemented automatically.…”
Section: Related Work 21 Web Attack Detection Researchmentioning
confidence: 99%