2020
DOI: 10.1145/3381028
|View full text |Cite
|
Sign up to set email alerts
|

Outlier Detection

Abstract: Over the past decade, we have witnessed an enormous amount of research effort dedicated to the design of efficient outlier detection techniques while taking into consideration efficiency, accuracy, high-dimensional data, and distributed environments, among other factors. In this article, we present and examine these characteristics, current solutions, as well as open challenges and future research directions in identifying new outlier detection strategies. We propose a taxonomy of the recently designed outlier… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
59
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 198 publications
(61 citation statements)
references
References 88 publications
0
59
0
2
Order By: Relevance
“…For Offline NS-NMF, we set α � 0.8 and c � 0.2; for Online NS-NMF, we set α � 0.8 and z � 20. In GNMF, we set the neighborhood graph construction Input: Origin data X and the number of anomaly samples N Factorization matrices W i 􏼈 􏼉 and {H i }, i � 1, ..., l Output: e selected N anomaly samples (1) parameter k in kNN as 5. Besides, we use 0-1 weighting as the weighting method.…”
Section: Comparison With the State-of-the-art Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For Offline NS-NMF, we set α � 0.8 and c � 0.2; for Online NS-NMF, we set α � 0.8 and z � 20. In GNMF, we set the neighborhood graph construction Input: Origin data X and the number of anomaly samples N Factorization matrices W i 􏼈 􏼉 and {H i }, i � 1, ..., l Output: e selected N anomaly samples (1) parameter k in kNN as 5. Besides, we use 0-1 weighting as the weighting method.…”
Section: Comparison With the State-of-the-art Methodsmentioning
confidence: 99%
“…Anomaly detection (AD) aims at finding the part of data that do not conform with the expected behavior [ 1 ]. These data are usually called outliers, anomalies, and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Estevez-Tapiador et al presented a wired-based network intrusion detection based on anomaly detection [41]. Boukerche et al presented an outlier-based classified detection approach using the unsupervised and supervised models [42]. Under the supervised category, a proximity-based technique has been used recently [43].…”
Section: Related Workmentioning
confidence: 99%
“…en, a neighborhood procedure based on rough sets is applied to detect prototype outliers. Interested readers may refer to [17] for more in-depth understanding of outlier detection. Moreover, ANN has been applied to solve real-world problems in various application domains such as medical diagnosis [18], pattern recognition [19], and other related applications.…”
Section: Introductionmentioning
confidence: 99%