2008
DOI: 10.1007/s10479-008-0371-9
|View full text |Cite
|
Sign up to set email alerts
|

Cluster-based outlier detection

Abstract: Outlier detection has important applications in the field of data mining, such as fraud detection, customer behavior analysis, and intrusion detection. Outlier detection is the process of detecting the data objects which are grossly different from or inconsistent with the remaining set of data. Outliers are traditionally considered as single points; however, there is a key observation that many abnormal events have both temporal and spatial locality, which might form small clusters that also need to be deemed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 183 publications
(70 citation statements)
references
References 29 publications
0
61
0
Order By: Relevance
“…Examples are distance based methods (e.g., k NN, see Ramaswamy, Rastogi, & Shim, 2000; LDOF, see Zhang, Hutter, & Jin, 2009), density based methods (e.g., LOF, see Breunig et al, 2000), clustering based methods (e.g., CBOF, see Duan, Xu, Liu, & Lee, 2009), and isolation based methods (e.g., iForest, see Liu et al, 2012;MassAD, see Ting, Zhou, Liu, & Tan, 2013). These methods rely on the key characteristic of numeric data, i.e., the notion of ordering.…”
Section: Methods For Numeric Datamentioning
confidence: 99%
“…Examples are distance based methods (e.g., k NN, see Ramaswamy, Rastogi, & Shim, 2000; LDOF, see Zhang, Hutter, & Jin, 2009), density based methods (e.g., LOF, see Breunig et al, 2000), clustering based methods (e.g., CBOF, see Duan, Xu, Liu, & Lee, 2009), and isolation based methods (e.g., iForest, see Liu et al, 2012;MassAD, see Ting, Zhou, Liu, & Tan, 2013). These methods rely on the key characteristic of numeric data, i.e., the notion of ordering.…”
Section: Methods For Numeric Datamentioning
confidence: 99%
“…Using several MUP-shape features along with the MU firing pattern features used may also improve the performance of the SCC. The MUP-shape features can be extracted based on the methods presented for finding the outliers in a cluster [186][187][188] or even the methods developed for detecting super-imposed MUPs in a MUPT [189].…”
Section: Future Workmentioning
confidence: 99%
“…Outlier detection has been very interesting topic for research community [3]- [11]. Ramaswamy et al proposed a distance based outlier detection method in [3].…”
Section: Related Workmentioning
confidence: 99%
“…He et al in [5] presented new definition of outlier which they named as cluster-based local outlier, which provides importance to the local data behaviour. Duan et al in [11] proposed a cluster based outlier detection algorithm which can detect both single point outliers and cluster-based outliers.…”
Section: Related Workmentioning
confidence: 99%