2016
DOI: 10.1109/tsp.2015.2481866
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Anomalous Activity on Networks With the Graph Fourier Scan Statistic

Abstract: We consider the problem of deciding, based on a single noisy measurement at each vertex of a given graph, whether the underlying unknown signal is constant over the graph or there exists a cluster of vertices with anomalous activation. This problem is relevant to several applications such as surveillance, disease outbreak detection, biomedical imaging, environmental monitoring, etc. Since the activations in these problems often tend to be localized to small groups of vertices in the graphs, we model such activ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(39 citation statements)
references
References 37 publications
0
39
0
Order By: Relevance
“…More generally, the Normally Distributed Altered Subnetwork Problem is related to a larger class of network anomaly problems, which have been studied extensively in the machine learning and statistics literature [6,4,1,3,83,82,81,80,5]. To be er understand the relationships between these problems and the algorithms developed to solve them, we will describe a generalization of the Altered Subnetwork Problem.…”
Section: Altered Subnetwork Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…More generally, the Normally Distributed Altered Subnetwork Problem is related to a larger class of network anomaly problems, which have been studied extensively in the machine learning and statistics literature [6,4,1,3,83,82,81,80,5]. To be er understand the relationships between these problems and the algorithms developed to solve them, we will describe a generalization of the Altered Subnetwork Problem.…”
Section: Altered Subnetwork Problemmentioning
confidence: 99%
“…Separately, many publications in the statistics and machine learning literature investigate the problem of detecting whether or not a network contains an anomalous subnetwork, or a network anomaly, e.g., [6,4,1,3,83,82,81,80,5]. ese papers describe speci c generative models of network anomalies and use a rigorous hypothesis-testing framework to prove asymptotic results regarding the conditions under which it is possible to detect a network anomaly.…”
Section: Introductionmentioning
confidence: 99%
“…where δ is non-zero only on C * with a constant value over this cluster. These assumptions differ from [8] in that (1) depends on time t and m is not necessarily constant over all vertices.…”
Section: Online Change-point Detectionmentioning
confidence: 98%
“…where g(y) is the graph-filtered signal in (3), and h * (µ) is the frequency response of the filter defined as [8]:…”
Section: A Gfss Algorithmmentioning
confidence: 99%
“…This method was applied to scan statistics [2,26,27], using elements of spectral graph theory [9] to find a relaxed form of the connectivity constraint. Similar ideas were also used in a slightly different context [29][30][31], where the class Λ consists of subgraphs with low cut size rather than connected ones. Algorithmic Approaches.…”
Section: Related Work -Scan Statistics and Beyondmentioning
confidence: 99%