2019
DOI: 10.1109/tvcg.2018.2864825
|View full text |Cite
|
Sign up to set email alerts
|

EnsembleLens: Ensemble-based Visual Exploration of Anomaly Detection Algorithms with Multidimensional Data

Abstract: The results of anomaly detection are sensitive to the choice of detection algorithms as they are specialized for different properties of data, especially for multidimensional data. Thus, it is vital to select the algorithm appropriately. To systematically select the algorithms, ensemble analysis techniques have been developed to support the assembly and comparison of heterogeneous algorithms. However, challenges remain due to the absence of the ground truth, interpretation, or evaluation of these anomaly detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(36 citation statements)
references
References 68 publications
0
36
0
Order By: Relevance
“…While papers describe interactions at varying levels of detail, a few common interaction types emerged in our analysis, including selection (e.g., [KBJ∗20; WBL∗20]), filtering (e.g., [LGM∗20; PNKC20]), zooming (e.g., [LPH∗20; LSC∗18]), tuning weights/hyperparameters (e.g., [DSKE20; SLC∗20]), and annotation/labeling (e.g., [SSKE19; XXM∗19]). Multiple of these interaction types tend to be combined in a single system, for example when users first select a set of data instances before labeling them (e.g., [BHZ∗18; ZWLC19]).…”
Section: Dimensions Of Analysismentioning
confidence: 99%
“…While papers describe interactions at varying levels of detail, a few common interaction types emerged in our analysis, including selection (e.g., [KBJ∗20; WBL∗20]), filtering (e.g., [LGM∗20; PNKC20]), zooming (e.g., [LPH∗20; LSC∗18]), tuning weights/hyperparameters (e.g., [DSKE20; SLC∗20]), and annotation/labeling (e.g., [SSKE19; XXM∗19]). Multiple of these interaction types tend to be combined in a single system, for example when users first select a set of data instances before labeling them (e.g., [BHZ∗18; ZWLC19]).…”
Section: Dimensions Of Analysismentioning
confidence: 99%
“…There are several works using visual interfaces and interactions to explore and validate the outlying data. To name a few, En-sembLens [40] applies ensemble analysis; Viola [10] is based on Canonical Polyadic (CP) decomposition methods with tensor-based anomaly analysis algorithm; TargetVue [11] uses TLOF [8]; Rclens adopts active learning algorithm to identify rare category; CVExplorer [33], MTDES [35], and TimeMatrix [14] use visual overview with supported interactions for discovery and exploratory of data patterns. Zhang et al [42] also provided a good survey of visualization for network anomalies.…”
Section: Other Outlier Detection Methodsmentioning
confidence: 99%
“…As a result, many papers are published in this area [AEM11, BLBC12, JHB*17, WLS19], making this topic class with 30 papers one of the most prominent in our analysis. Topic 8 – models’ predictions & design prototyping. Another generic topic class with 18 related papers contains, among others, the subject of ML models’ predictions [SJS*17, XXM*19] that has already been seen in Topic 5. The difference between this class and Topic 5 is the focus of its related papers, which is on the instantiation of visualization prototypes with different design choices that should be carefully considered based on previous InfoVis research.…”
Section: Survey Data Analysismentioning
confidence: 99%