Outlier Detection for Temporal Data
暂无分享,去创建一个
Charu C. Aggarwal | Jiawei Han | Jing Gao | Manish Gupta | Jiawei Han | Jing Gao | C. Aggarwal | Manish Gupta
[1] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[2] Chang-Tien Lu,et al. Wavelet fuzzy classification for detecting and tracking region outliers in meteorological data , 2004, GIS '04.
[3] R. Lasaponara. On the use of principal component analysis (PCA) for evaluating interannual vegetation anomalies from SPOT/VEGETATION NDVI temporal series , 2006 .
[4] William M. Pottenger,et al. A Survey of Emerging Trend Detection in Textual Data Mining , 2004 .
[5] Yizhou Sun,et al. On community outliers and their efficient detection in information networks , 2010, KDD.
[6] Dimitrios Gunopulos,et al. Distributed deviation detection in sensor networks , 2003, SGMD.
[7] Charu C. Aggarwal,et al. Event Detection in Social Streams , 2012, SDM.
[8] Salvatore J. Stolfo,et al. Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[9] Dipankar Dasgupta,et al. Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[10] A. Raftery,et al. Modeling flat stretches, bursts, and outliers in time series using mixture transition distribution models , 1996 .
[11] Boleslaw K. Szymanski,et al. Recursive data mining for masquerade detection and author identification , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[12] S. Muthukrishnan,et al. Mining Deviants in a Time Series Database , 1999, VLDB.
[13] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .
[14] Eamonn J. Keogh,et al. HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[15] Charu C. Aggarwal,et al. Addressing Concept-Evolution in Concept-Drifting Data Streams , 2010, 2010 IEEE International Conference on Data Mining.
[16] David J. Marchette,et al. Scan Statistics on Enron Graphs , 2005, Comput. Math. Organ. Theory.
[17] Hui Xiong,et al. A Stochastic Model for Context-Aware Anomaly Detection in Indoor Location Traces , 2012, 2012 IEEE 12th International Conference on Data Mining.
[18] Eamonn J. Keogh,et al. Finding the most unusual time series subsequence: algorithms and applications , 2006, Knowledge and Information Systems.
[19] Aleksandar Lazarevic,et al. Incremental Local Outlier Detection for Data Streams , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.
[20] Mikhail J. Atallah,et al. Detection of significant sets of episodes in event sequences , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[21] Eamonn J. Keogh,et al. Approximations to magic: finding unusual medical time series , 2005, 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05).
[22] Mikhail J. Atallah,et al. Reliable detection of episodes in event sequences , 2004, Knowledge and Information Systems.
[23] Jiong Yang,et al. CLUSEQ: efficient and effective sequence clustering , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[24] Mario Innocenti,et al. Fault detection using neural networks , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).
[25] Philip S. Yu,et al. Outlier Detection with Uncertain Data , 2008, SDM.
[26] Abhishek Sharma,et al. Context-Aware Time Series Anomaly Detection for Complex Systems , 2013 .
[27] Martin Meckesheimer,et al. Automatic outlier detection for time series: an application to sensor data , 2007, Knowledge and Information Systems.
[28] Mikhail J. Atallah,et al. Markov Models for Identification of Significant Episodes , 2005, SDM.
[29] Peter J. Rousseeuw,et al. Robust regression and outlier detection , 1987 .
[30] Boleslaw K. Szymanski,et al. FUZZY ROC CURVES FOR THE 1 CLASS SVM: APPLICATION TO INTRUSION DETECTION , 2005 .
[31] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[32] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[33] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[34] Hui Xiong,et al. Top-Eye: top-k evolving trajectory outlier detection , 2010, CIKM.
[35] Daniel B. Neill,et al. Fast subset scan for multivariate event detection , 2013, Statistics in medicine.
[36] Philip S. Yu,et al. Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach , 2012, Proc. VLDB Endow..
[37] Dipankar Dasgupta,et al. Novelty detection in time series data using ideas from immunology , 1996 .
[38] Matthew O. Ward,et al. Neighbor-based pattern detection for windows over streaming data , 2009, EDBT '09.
[39] M. Kraetzl,et al. Novel approaches in modelling dynamics of networked surveillance environment , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.
[40] Jiawei Han,et al. On detecting Association-Based Clique Outliers in heterogeneous information networks , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[41] Charu C. Aggarwal,et al. Evolutionary Clustering and Analysis of Bibliographic Networks , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[42] Charu C. Aggarwal,et al. Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble , 2012, 2012 IEEE 12th International Conference on Data Mining.
[43] Anne Lohrli. Chapman and Hall , 1985 .
[44] Ashok N. Srivastava,et al. Anomaly Detection and Diagnosis Algorithms for Discrete Symbol Sequences with Applications to Airline Safety , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[45] Mohammed J. Zaki,et al. ADMIT: anomaly-based data mining for intrusions , 2002, KDD.
[46] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[47] Priya Narasimhan,et al. Tiresias: Black-Box Failure Prediction in Distributed Systems , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[48] Philip S. Yu,et al. Mining knowledge from databases: an information network analysis approach , 2010, SIGMOD Conference.
[49] Yiming Yang,et al. Topic Detection and Tracking Pilot Study Final Report , 1998 .
[50] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[51] Eamonn J. Keogh,et al. Finding Time Series Discords Based on Haar Transform , 2006, ADMA.
[52] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[53] Vic Barnett,et al. Outliers in Statistical Data , 1980 .
[54] Shai Ben-David,et al. Detecting Change in Data Streams , 2004, VLDB.
[55] Lon-Mu Liu,et al. Joint Estimation of Model Parameters and Outlier Effects in Time Series , 1993 .
[56] Yizhou Sun,et al. Ranking-based clustering of heterogeneous information networks with star network schema , 2009, KDD.
[57] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[58] Vasant Honavar,et al. Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation , 2005, ISI.
[59] Dimitrios Gunopulos,et al. Online outlier detection in sensor data using non-parametric models , 2006, VLDB.
[60] Jiawei Han. Exploring the Power of Links in Data Mining , 2007, APWeb/WAIM.
[61] Graham J. Williams,et al. On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.
[62] T. Lane,et al. Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .
[63] Jiawei Han,et al. On the Power of Ensemble: Supervised and Unsupervised Methods Reconciled* , 2010 .
[64] Eamonn J. Keogh,et al. A symbolic representation of time series, with implications for streaming algorithms , 2003, DMKD '03.
[65] Charu C. Aggarwal,et al. On Anomalous Hotspot Discovery in Graph Streams , 2013, 2013 IEEE 13th International Conference on Data Mining.
[66] Jeffrey Scott Vitter,et al. Mining deviants in time series data streams , 2004, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004..
[67] Ira Assent,et al. AnyOut: Anytime Outlier Detection on Streaming Data , 2012, DASFAA.
[68] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[69] R. McCulloch,et al. Bayesian Inference and Prediction for Mean and Variance Shifts in Autoregressive Time Series , 1993 .
[70] Charu C. Aggarwal,et al. Outlier ensembles: position paper , 2013, SKDD.
[71] Yizhou Sun,et al. Integrating community matching and outlier detection for mining evolutionary community outliers , 2012, KDD.
[72] Philip S. Yu,et al. Mining Knowledge from Data: An Information Network Analysis Approach , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[73] Srinivasan Parthasarathy,et al. LOADED: link-based outlier and anomaly detection in evolving data sets , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[74] Carla Marceau,et al. Characterizing the behavior of a program using multiple-length N-grams , 2001, NSPW '00.
[75] Kenji Yamanishi,et al. A unifying framework for detecting outliers and change points from non-stationary time series data , 2002, KDD.
[76] Philip S. Yu,et al. Mining, Indexing, and Similarity Search in Graphs and Complex Structures , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[77] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[78] Charu C. Aggarwal,et al. On change diagnosis in evolving data streams , 2005, IEEE Transactions on Knowledge and Data Engineering.
[79] A. N. Srivastava,et al. Anomaly Detection in Large Sets of High-Dimensional Symbol Sequences , 2006 .
[80] Peter J. Rousseeuw,et al. Clustering by means of medoids , 1987 .
[81] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[82] Vikramaditya R. Jakkula,et al. Anomaly Detection Using Temporal Data Mining in a Smart Home Environment , 2008, Methods of Information in Medicine.
[83] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[84] M. Kraetzl,et al. Detection of abnormal change in dynamic networks , 1999, 1999 Information, Decision and Control. Data and Information Fusion Symposium, Signal Processing and Communications Symposium and Decision and Control Symposium. Proceedings (Cat. No.99EX251).
[85] Haifeng Chen,et al. Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems , 2006, IEEE Transactions on Dependable and Secure Computing.
[86] Jae-Gil Lee,et al. Mining Massive RFID, Trajectory, and Traffic Data Sets , 2008, Knowledge Discovery and Data Mining.
[87] Eyal Amir,et al. Real‐time Bayesian anomaly detection in streaming environmental data , 2007 .
[88] Dennis Shasha,et al. Efficient elastic burst detection in data streams , 2003, KDD '03.
[89] Vipin Kumar,et al. Comparative Evaluation of Anomaly Detection Techniques for Sequence Data , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[90] C.-C. Jay Kuo,et al. Distributed spatio-temporal outlier detection in sensor networks , 2005, SPIE Defense + Commercial Sensing.
[91] Ji Zhang,et al. SPOT: A System for Detecting Projected Outliers From High-dimensional Data Streams , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[92] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[93] Daniel Peña,et al. Detection of outlier patches in autoregressive time series , 1998 .
[94] Li Wei,et al. Assumption-Free Anomaly Detection in Time Series , 2005, SSDBM.
[95] Charu C. Aggarwal,et al. On Abnormality Detection in Spuriously Populated Data Streams , 2005, SDM.
[96] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[97] Aric A. Hagberg,et al. Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.
[98] Jimeng Sun,et al. Streaming Pattern Discovery in Multiple Time-Series , 2005, VLDB.
[99] Christos Faloutsos,et al. Metric forensics: a multi-level approach for mining volatile graphs , 2010, KDD.
[100] Jiawei Han,et al. Community Distribution Outlier Detection in Heterogeneous Information Networks , 2013, ECML/PKDD.
[101] Andrew R. Post,et al. Temporal data mining. , 2008, Clinics in laboratory medicine.
[102] P. Dickinson,et al. Investigation of graph edit distance cost functions for detection of network anomalies , 2007 .
[103] Peter J. Rousseeuw,et al. Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.
[104] Hector Garcia-Molina,et al. Web graph similarity for anomaly detection , 2010, Journal of Internet Services and Applications.
[105] Jae-Gil Lee,et al. Temporal Outlier Detection in Vehicle Traffic Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[106] Zhilin Li,et al. A Multiscale Approach for Spatio‐Temporal Outlier Detection , 2006, Trans. GIS.
[107] Philip S. Yu,et al. Scalable OLAP and mining of information networks , 2009, EDBT '09.
[108] R. Tsay,et al. Outlier Detection in Multivariate Time Series by Projection Pursuit , 2006 .
[109] R. Tsay,et al. Outliers in multivariate time series , 2000 .
[110] Zhen Guo,et al. Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[111] Derya Birant,et al. Spatio-temporal outlier detection in large databases , 2006, 28th International Conference on Information Technology Interfaces, 2006..
[112] Raman K. Mehra,et al. Detection and classification of intrusions and faults using sequences of system calls , 2001, SGMD.
[113] Daniel Peña,et al. The Identification of Multiple Outliers in ARIMA Models , 2003 .
[114] Katharina Morik,et al. Anomaly Detection in Vertically Partitioned Data by Distributed Core Vector Machines , 2013, ECML/PKDD.
[115] Zhilin Li,et al. A hybrid approach to detect spatio-temporal outliers , 2004 .
[116] Philip Chan,et al. Learning States and Rules for Detecting Anomalies in Time Series , 2005, Applied Intelligence.
[117] Lionel Tarassenko,et al. A System for the Analysis of Jet Engine Vibration Data , 1999, Integr. Comput. Aided Eng..
[118] Alberto Luceñ,et al. Detecting possibly non‐consecutive outliers in industrial time series , 1998 .
[119] Fabrizio Angiulli,et al. Detecting distance-based outliers in streams of data , 2007, CIKM '07.
[120] Cheng Zhang,et al. Native API based Windows anomaly intrusion detection method using SVM , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[121] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[122] Philip S. Yu,et al. Outlier detection in graph streams , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[123] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[124] Rajeev Gandhi,et al. Ganesha: blackBox diagnosis of MapReduce systems , 2010, PERV.
[125] Rayford B. Vaughn,et al. Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models , 2005, ISC.
[126] Sangkyum Kim,et al. Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects , 2006, ISI.
[127] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[128] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[129] Shaomin Mu,et al. Sequence-similarity kernels for SVMs to detect anomalies in system calls , 2007, Neurocomputing.
[130] W. Drosdowsky,et al. An analysis of Australian seasonal rainfall anomalies: 1950–1987. I: Spatial patterns , 1993 .
[131] Ana Bianco,et al. Outlier Detection in Regression Models with ARIMA Errors Using Robust Estimates , 2001 .
[132] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[133] Brandon Pincombea,et al. Anomaly Detection in Time Series of Graphs using ARMA Processes , 2007 .
[134] James Allan,et al. Introduction to topic detection and tracking , 2002 .
[135] D. Endler,et al. Intrusion detection. Applying machine learning to Solaris audit data , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[136] Sanjay Chawla,et al. Spatio-temporal Outlier Detection in Precipitation Data , 2008, KDD Workshop on Knowledge Discovery from Sensor Data.
[137] Philip S. Yu,et al. GraphScope: parameter-free mining of large time-evolving graphs , 2007, KDD '07.
[138] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[139] Cyrus Shahabi,et al. TSA-tree: a wavelet-based approach to improve the efficiency of multi-level surprise and trend queries on time-series data , 2000, Proceedings. 12th International Conference on Scientific and Statistica Database Management.
[140] Charu C. Aggarwal,et al. Finding Top-k Shortest Path Distance Changes in an Evolutionary Network , 2011, SSTD.
[141] Jian Pei,et al. WAT: Finding Top-K Discords in Time Series Database , 2007, SDM.
[142] Christoph C. Michael,et al. Two state-based approaches to program-based anomaly detection , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[143] Charu C. Aggarwal,et al. Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams , 2013, IEEE Transactions on Knowledge and Data Engineering.
[144] G. C. Tiao,et al. Estimation of time series parameters in the presence of outliers , 1988 .
[145] Dipankar Dasgupta,et al. A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[146] Hisashi Kashima,et al. Eigenspace-based anomaly detection in computer systems , 2004, KDD.
[147] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[148] Dawei Liu,et al. Efficient anomaly monitoring over moving object trajectory streams , 2009, KDD.
[149] Jiawei Han,et al. Top-K interesting subgraph discovery in information networks , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[150] Gregory F. Cooper,et al. A multivariate Bayesian scan statistic for early event detection and characterization , 2010, Machine Learning.
[151] David J. Hill,et al. Anomaly detection in streaming environmental sensor data: A data-driven modeling approach , 2010, Environ. Model. Softw..
[152] Charu C. Aggarwal,et al. Tutorial: Outlier Detection for Temporal Data , 2013 .
[153] Eyal Amir,et al. Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .
[154] Jörgen Hansson,et al. Issues in Active Real-Time Databases , 1995, ARTDB.
[155] Michael Gertz,et al. Detection and Exploration of Outlier Regions in Sensor Data Streams , 2008, 2008 IEEE International Conference on Data Mining Workshops.
[156] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[157] Eamonn J. Keogh,et al. Finding surprising patterns in a time series database in linear time and space , 2002, KDD.
[158] Pingzhi Fan,et al. A new anomaly detection method based on hierarchical HMM , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[159] Sangkyum Kim,et al. ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets , 2007, SDM.
[160] Jiawei Han,et al. A Geometric Perspective on Dimensionality Reduction , 2009, SDM 2009.
[161] Anup K. Ghosh,et al. Using Program Behavior Pro � les for Intrusion Detection , 1999 .
[162] Andre Lucas,et al. Outlier Detection in Cointegration Analysis , 1998 .
[163] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[164] Kun Li,et al. Efficient Clustering-Based Outlier Detection Algorithm for Dynamic Data Stream , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.
[165] M. Otto,et al. Outliers in Time Series , 1972 .
[166] Li Wei,et al. Experiencing SAX: a novel symbolic representation of time series , 2007, Data Mining and Knowledge Discovery.
[167] B. R. Badrinath,et al. Context-Aware Sensors , 2004, EWSN.
[168] Eamonn J. Keogh,et al. Towards parameter-free data mining , 2004, KDD.
[169] W. Krajewski,et al. Real-time quality control of streamflow data―a simulation study , 1989 .
[170] Jiawei Han,et al. Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data , 2007, VLDB.
[171] Philip S. Yu,et al. Outlier detection for high dimensional data , 2001, SIGMOD '01.
[172] H. Bunke,et al. Median graphs and anomalous change detection in communication networks , 2002, Final Program and Abstracts on Information, Decision and Control.
[173] Srinivasan Parthasarathy,et al. Fast Distributed Outlier Detection in Mixed-Attribute Data Sets , 2006, Data Mining and Knowledge Discovery.
[174] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[175] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[176] James Allan,et al. Topic detection and tracking: event-based information organization , 2002 .
[177] Praneeth Namburi,et al. Online Outlier Detection Based on Relative Neighbourhood Dissimilarity , 2008, WISE.
[178] Sanjay Chawla,et al. Mining for Outliers in Sequential Databases , 2006, SDM.
[179] Michael Gertz,et al. ORDEN: outlier region detection and exploration in sensor networks , 2009, SIGMOD Conference.
[180] J. Ma,et al. Time-series novelty detection using one-class support vector machines , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[181] James Allan,et al. Explorations within topic tracking and detection , 2002 .
[182] Sameer Singh,et al. Novelty detection: a review - part 2: : neural network based approaches , 2003, Signal Process..
[183] Li Wei,et al. SAXually Explicit Images: Finding Unusual Shapes , 2006, Sixth International Conference on Data Mining (ICDM'06).
[184] Jiawei Han,et al. Mining heterogeneous information networks , 2010, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '10.
[185] Tom Fawcett,et al. Activity monitoring: noticing interesting changes in behavior , 1999, KDD '99.
[186] Yizhou Sun,et al. Community Trend Outlier Detection Using Soft Temporal Pattern Mining , 2012, ECML/PKDD.
[187] Kanishka Bhaduri,et al. Distributed anomaly detection using 1‐class SVM for vertically partitioned data , 2011, Stat. Anal. Data Min..
[188] Eamonn J. Keogh,et al. Disk aware discord discovery: finding unusual time series in terabyte sized datasets , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[189] Douglas M. Hawkins. Identification of Outliers , 1980, Monographs on Applied Probability and Statistics.
[190] Charu C. Aggarwal,et al. On clustering heterogeneous social media objects with outlier links , 2012, WSDM '12.
[191] Ma Xiujun,et al. Detecting spatio-temporal outliers in climate dataset: a method study , 2005, Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..
[192] Latifur Khan. Data Stream Mining: Challenges and Techniques , 2010, 2010 22nd IEEE International Conference on Tools with Artificial Intelligence.
[193] Christos Faloutsos,et al. oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.
[194] Jae-Gil Lee,et al. Trajectory Outlier Detection: A Partition-and-Detect Framework , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[195] Jiawei Han,et al. Local Learning for Mining Outlier Subgraphs from Network Datasets , 2014, SDM.
[196] Pavlos Protopapas,et al. Finding anomalous periodic time series , 2009, Machine Learning.
[197] Gang Chen,et al. Attribute Outlier Detection over Data Streams , 2010, DASFAA.
[198] Bo Gao,et al. HMMs (Hidden Markov models) based on anomaly intrusion detection method , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[199] Vijayalakshmi Atluri,et al. Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets , 2004, SAC '04.
[200] Jonathan G. Fiscus,et al. NIST's 1998 topic detection and tracking evaluation (TDT2) , 1999, EUROSPEECH.
[201] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[202] Jae Won Lee,et al. OutlierD: an R package for outlier detection using quantile regression on mass spectrometry data , 2008, Bioinform..
[203] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[204] R. Tsay. Time Series Model Specification in the Presence of Outliers , 1986 .
[205] Charu C. Aggarwal,et al. Detecting Recurring and Novel Classes in Concept-Drifting Data Streams , 2011, 2011 IEEE 11th International Conference on Data Mining.
[206] Xiao-yun Chen,et al. Multi-scale anomaly detection algorithm based on infrequent pattern of time series , 2008 .
[207] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[208] Thorsten Brants,et al. A System for new event detection , 2003, SIGIR.
[209] Junshui Ma,et al. Online novelty detection on temporal sequences , 2003, KDD '03.