2020 2nd International Conference on Process Mining (ICPM) 2020
DOI: 10.1109/icpm49681.2020.00033
|View full text |Cite
|
Sign up to set email alerts
|

TOAD: Trace Ordering for Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…For crowded scenes, Wang Q [14] fuses acceleration information with optical flow characteristics, the mixed optical flow histogram is constructed as the feature descriptor, and the abnormal behavior detection is realized by the sparse representation method. [15] The feature extraction method based on motion trajectory to construct features by acquiring the position, length, speed, and other information of the object in the process of moving. In this regard, some scholars have proposed the dense trajectory algorithm, which intensively samples the feature points, extracts their trajectory features and encodes them, and classifies them by support vector machine.…”
Section: Feature Extraction Methods Based On Human Appearance and Mov...mentioning
confidence: 99%
“…For crowded scenes, Wang Q [14] fuses acceleration information with optical flow characteristics, the mixed optical flow histogram is constructed as the feature descriptor, and the abnormal behavior detection is realized by the sparse representation method. [15] The feature extraction method based on motion trajectory to construct features by acquiring the position, length, speed, and other information of the object in the process of moving. In this regard, some scholars have proposed the dense trajectory algorithm, which intensively samples the feature points, extracts their trajectory features and encodes them, and classifies them by support vector machine.…”
Section: Feature Extraction Methods Based On Human Appearance and Mov...mentioning
confidence: 99%
“…In [11], the authors identify such outliers of event pairs online by using hashing for event collecting and applying z-scoring to define an in-control area for unsuspicious event relations. In [10], this idea is leveraged on the trace level to detect collective trace anomalies using density-based clustering on temporal deviation signatures. We adapt the presented clustering technique for OTOSO.…”
Section: Related Workmentioning
confidence: 99%