“…Numerous applications require filtering or detecting abnormal observations in data. For instance, in security, intruders are abnormalities (Ribeiro et al, 2016;Pimentel et al, 2014;Luca et al, 2016;Phua et al, 2010;Yeung and Ding, 2001); in traffic data, road accidents (Theofilatos et al, 2016); in geology, the eruption of volcanoes (Dzierma and Wehrmann, 2010); in food control, foreign objects inside food wrappers (Einarsdóttir et al, 2016); in economics, bankruptcy of a company (Fan et al, 2017); or in neuroscience, an unexperienced stimulus is considered an abnormality (Kafkas and Montaldi, 2018). In some situations, the abnormalities are called rare events, anomalies, novelties, outliers, exceptions, aberrations, surprises, peculiarities, noise or contaminants among others.…”