[图书][B] An introduction to outlier analysis

CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …

The (black) art of runtime evaluation: Are we comparing algorithms or implementations?

HP Kriegel, E Schubert, A Zimek - Knowledge and Information Systems, 2017 - Springer
Any paper proposing a new algorithm should come with an evaluation of efficiency and
scalability (particularly when we are designing methods for “big data”). However, there are …

On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study

GO Campos, A Zimek, J Sander… - Data mining and …, 2016 - Springer
The evaluation of unsupervised outlier detection algorithms is a constant challenge in data
mining research. Little is known regarding the strengths and weaknesses of different …

Spectral–spatial anomaly detection of hyperspectral data based on improved isolation forest

X Song, S Aryal, KM Ting, Z Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Anomaly detection in hyperspectral image (HSI) is affected by redundant bands and the
limited utilization capacity of spectral–spatial information. In this article, we propose a novel …

Ensemble-based information retrieval with mass estimation for hyperspectral target detection

X Sun, Y Qu, L Gao, X Sun, H Qi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Given the prior information of the target, hyperspectral target detection focuses on exploiting
spectral differences to separate objects of interest from the background, which can be …

In-vehicle CAN bus tampering attacks detection for connected and autonomous vehicles using an improved isolation forest method

X Duan, H Yan, D Tian, J Zhou, J Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The development and applications of mobile communication technologies in intelligent
autonomous transportation systems have led to an extraordinary rise in the mount of …

A review of tree-based approaches for anomaly detection

T Barbariol, FD Chiara, D Marcato, GA Susto - Control Charts and Machine …, 2022 - Springer
Abstract Data-driven Anomaly Detection approaches have received increasing attention in
many application areas in the past few years as a tool to monitor complex systems in …

Overcoming key weaknesses of distance-based neighbourhood methods using a data dependent dissimilarity measure

KM Ting, Y Zhu, M Carman, Y Zhu… - Proceedings of the 22nd …, 2016 - dl.acm.org
This paper introduces the first generic version of data dependent dissimilarity and shows
that it provides a better closest match than distance measures for three existing algorithms in …

Layered isolation forest: A multi-level subspace algorithm for improving isolation forest

T Liu, Z Zhou, L Yang - Neurocomputing, 2024 - Elsevier
Anomaly detection is an important field in data science that has been widely researched and
applied, generating many methods. Among these methods, the isolation forest algorithm is …

Improving iforest with relative mass

S Aryal, KM Ting, JR Wells, T Washio - … and Data Mining: 18th Pacific-Asia …, 2014 - Springer
Abstract iForest uses a collection of isolation trees to detect anomalies. While it is effective in
detecting global anomalies, it fails to detect local anomalies in data sets having multiple …