Computer Science ›› 2020, Vol. 47 ›› Issue (9): 99-104.doi: 10.11896/jsjkx.200600170

• Database & Big Data & Data Science • Previous Articles     Next Articles

High-order Multi-view Outlier Detection

ZHONG Ying-yu, CHEN Song-can   

  1. College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
  • Received:2020-06-28 Published:2020-09-10
  • About author:ZHONG Ying-yu,born in 1995,postgraduate.His main research interests include multi-view learning and anomaly detection.
    CHEN Song-can,born in 1962,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include pattern recognition,machine learning and neural computing.
  • Supported by:
    Key Program of National Natural Science Foundation of China (61732006).

Abstract: Due to the complex distribution of data between different views,the traditional single-view outlier detection method is no longer applicable to the detection of multi-view outliers,making multi-view outlier detection a challenging research topic.Multi-view outliers can be divided into three types:attribute outliers,class outliers,and class-attribute outliers.Existing methods use pairwise constraints across views to learn new feature representations and define outlier scoring metrics based on these features,which do not take full advantage of the interactive information between views and results in higher computational complexity when facing three or more views.Therefore,this paper considers to reshape multi-view data into tensor set form,defines high-order multi-view outliers,and proves that all of the existing three types of multi-view outliers meet the definition of high-order multi-view outliers,so as to propose a new multi-view outliers detection algorithm called high-order multi-view outliers detection algorithm (HOMVOD).Specifically,the algorithm firstly reshapes multi-view data into tensor set form,then learns its low-rank representation,and finally designs outlier function under tensor representation to realize detection.Experiments on UCI datasets show that this method is superior to existing methods in detecting multi-view outliers.

Key words: Anomaly detection, Low-rank representation, Multi-view learning, Multi-view outlier detection, Tensor representation

CLC Number: 

  • TP181
[1] WEST J,BHATTACHARYA M.Intelligent financial fraud detection:a comprehensive review [J].Computers & Security,2016,57:47-66.
[2] BAHNSEN A C,AOUADA D,STOJANOVIC A,et al.Feature engineering strategies for credit card fraud detection [J].Expert Systems with Applications,2016,51:134-142.
[3] HUANG S Y,LIN C C,CHIU A A,et al.Fraud detection usingfraud triangle risk factors[J].Information Systems Frontiers,2017,19(6):1343-1356.
[4] SHUAIB M,OSHO O,ISMAILA I,et al.Comparative analysis of classification algorithms for email spam detection [J].International Journal of Computer Network and Information Security,2018,10(1):60.
[5] COLUCCIA A,DÁLCONZO A,RICCIATO F.Distribution-based anomaly detection via generalized likelihood ratio test:A general maximum entropy approach [J].Computer Networks,2013,57(17):3446-3462.
[6] VU N H,GOPALKRISHNAN V,ASSENT I.An UnbiasedDistance-Based Outlier Detection Approach for High-Dimensional Data[C]//Database Systems for Advanced Applications - 16th International Conference(DASFAA 2011).Hong Kong,China,2011.
[7] YU H,WANG B,XIAO G,et al.Distance-based outlier detection on uncertain data [J].Journal of Computer Research & Development,2010,1(3):293-298.
[8] RADOVANOVIC M,NANOPOULOS A,IVANOVIC M.Re-verse nearest neighbors in unsupervised distance-based outlier detection [J].IEEE Transactions on Knowledge & Data Engineering,2015,27(5):1369-1382.
[9] ZHANG Z,ZHU M,QIU J,et al.Outlier detection based on cluster outlier factor and mutual density[J].International Journal of Intelligent Information and Database Systems,2019,12(1/2):91-108.
[10] TANG B,HE H.A local density-based approach for outlier detection [J].Neurocomputing,2017,241:171-180.
[11] MISHRA G,AGARWAL S,JAIN P K,et al.Outlier detection using subset formation of clustering-based method[C]//International Conference on Advanced Computing Networking and Informatics.Singapore:Springer,2019:521-528.
[12] AZHAR F.Fuzzy clustering-based semi-supervised approachfor outlier detection in big text data [J].Progress in Artificial Intelligence,2019,8(1):123-132.
[13] LI X,CHEN S.A Concise yet Effective model for Non-Aligned Incomplete Multi-view and Missing Multi-Label Learning [J].arXiv:2005.00976,2020.
[14] HU M,CHEN S.Doubly aligned incomplete multi-view clustering [J].arXiv:1903.02785,2019.
[15] WANG Z,XU J,CHEN S,et al.Regularized multi-view learning machine based on response surface technique [J].Neurocompu-ting,2012,97:201-213.
[16] QIAN Q,CHEN S,ZHOU X.Multi-view classification withcross-view must-link and cannot-link side information [J].Knowledge-Based Systems,2013,54:137-146.
[17] GAO J,FAN W,TURAGA D,et al.A spectral framework for detecting inconsistency across multi-source objects relationships[C]//2011 IEEE 11-th International Conference on Data Mi-ning.IEEE,2011:1050-1055.
[18] MARCOS A A,YAMADA M,KIMURA A,et al.Clustering-based anomaly detection in multi-view data[C]//Proceedings of the 22nd ACM international conference on Information & Knowledge Management.2013:1545-1548.
[19] LI S,SHAO M,FU Y.Multi-view low-rank analysis for outlier detection[C]//Proceedings of the 2015 SIAM International Conference on Data Mining.SIAM,2015:748-756.
[20] ZHAO H,FU Y.Dual-regularized multi-view outlier detection[C]//Twenty-Fourth International Joint Conference on Artificial Intelligence.2015.
[21] LI K,LI S,DING Z,et al.Latent discriminant subspace representations for multi-view outlier detection[C]//Thirty-Second AAAI Conference on Artificial Intelligence.2018.
[22] LUO Y,TAO D,RAMAMOHANARAO K,et al.Tensor canonical correlation analysis for multi-view dimension reduction [J].IEEE transactions on Knowledge and Data Engineering,2015,27(11):3111-3124.
[23] CAO B,HE L,KONG X,et al.Tensor-based Multiview feature selection with applications to brain diseases[C]//2014 IEEE International Conference on Data Mining.IEEE,2014:40-49.
[24] BU F.A high-order clustering algorithm based on dropout deep learning for heterogeneous data in cyber-physical-social systems [J].IEEE Access,2017,6:11687-11693.
[25] LI C G,VIDAL R.Structured sparse subspace clustering:A unified optimization framework[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2015:277-286.
[26] LIN Z,CHEN M,MA Y.The augmented Lagrange multipliermethod for exact recovery of corrupted low-rank matrices [J].arXiv:1009.5055,2010.
[27] CAI J F,CANDÈS E J,SHEN Z.A singular value thresholding algorithm for matrix completion [J].SIAM Journal on optimization,2010,20(4):1956-1982.
[28] LIU G,LIN Z,YU Y.Robust subspace segmentation by low-rank representation[C]//Proceedings of the 27th International Conference on Machine Learning (ICML-10).DBLP,2010:663-670.
[29] LIU G,LIN Z,YAN S,et al.Robust recovery of subspace structures by low-rank representation [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2012,35(1):171-184.
[1] XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110.
[2] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[3] DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178.
[4] SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151.
[5] WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151.
[6] LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148.
[7] ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344.
[8] QING Lai-yun, ZHANG Jian-gong, MIAO Jun. Temporal Modeling for Online Anomaly Detection [J]. Computer Science, 2021, 48(7): 206-212.
[9] GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219.
[10] XING Hong-jie, HAO ZhongHebei. Novelty Detection Method Based on Global and Local Discriminative Adversarial Autoencoder [J]. Computer Science, 2021, 48(6): 202-209.
[11] ZOU Cheng-ming, CHEN De. Unsupervised Anomaly Detection Method for High-dimensional Big Data Analysis [J]. Computer Science, 2021, 48(2): 121-127.
[12] SHI Lin-shan, MA Chuang, YANG Yun, JIN Min. Anomaly Detection Algorithm Based on SSC-BP Neural Network [J]. Computer Science, 2021, 48(12): 357-363.
[13] YANG Yue-lin, BI Zong-ze. Network Anomaly Detection Based on Deep Learning [J]. Computer Science, 2021, 48(11A): 540-546.
[14] ZHANG Fan, HE Wen-qi, JI Hong-bing, LI Dan-ping, WANG Lei. Multi-view Dictionary-pair Learning Based on Block-diagonal Representation [J]. Computer Science, 2021, 48(1): 233-240.
[15] FENG An-ran, WANG Xu-ren, WANG Qiu-yun, XIONG Meng-bo. Database Anomaly Access Detection Based on Principal Component Analysis and Random Tree [J]. Computer Science, 2020, 47(9): 94-98.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!