Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/347090.347160acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article
Free access

On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms

Published: 01 August 2000 Publication History
First page of PDF

References

[1]
V. Barnett and T. Lewis, Outliers in Statistical Data, John Wiley &: Sons, 1994.
[2]
F. Bonchi, F. Giannotti, G. Mainetto, and D. Pedeschi, A classification-based methodology for planning audit strategies in fraud detection, in Proc. of KDD-99, pp:175-184, 1999.
[3]
P. Burge and J. Shaw-Taylor, Detecting cellular fraud using adaptive prototypes, in Proc. o} AI Approaches to Fraud Detection and Risk Management, pp:9-13, 1997.
[4]
P. Chan and S. Stolfo, Toward scalable learning with non-uniform class and cost-distributions: A case study in credit card fraud detection, in Proc. ofg KDD-98, AAAI-Press, pp:164-168 (1998).
[5]
T. Fawcett and F. Provost, Activity monitoring: noticing interesting changes in behavior, in Proc. of KDD-99, pp:53-62, 1999.
[6]
I. Grabec, Self-organization of Neurons described by the maximum-entropy principle, Biological Cybernetics vol. 63, pp:403-409, 1990.
[7]
htt p://kddAcs.uci.edu/databases/kddcup99/kddcup99.html
[8]
E. M. Knorr and R. T. Ng, Algorithms for mining distance-based outliers in large datasets, in Proc. of the 2th VLDB Con}erence, pp:392-403, 1998.
[9]
W. Lee, S. J. Stolfo, and K. W. Mok, Mining in a data-flow environment: experience in network intrusion detection, in Proc. of KDD-99, pp:114-124, 1999.
[10]
R. M. Neal and G. E. Hinton, A view of the EM algorithm that justifies incremental, sparse, and other variants, ftp:// ftp.cs.toronto.edu/pub/radford/www/publications.html 1993.
[11]
S. Rosset, U. Murad, E. Neumann, Y. Idan, and G. Pinkas, Discovery of fraud rules for telecommunications-chalenges and solutions, in Proc. of KDD-99, pp:409-413, 1999.

Cited By

View all
  • (2025)LaAeb: A comprehensive log-text analysis based approach for insider threat detectionComputers & Security10.1016/j.cose.2024.104126148(104126)Online publication date: Jan-2025
  • (2024)Network Anomaly Detection Algorithm Based on Fusion of Artificial Fish Swarming and Isolation Forest2024 5th International Conference on Computer Engineering and Application (ICCEA)10.1109/ICCEA62105.2024.10603987(238-242)Online publication date: 12-Apr-2024
  • (2024)Reimagine Application Performance as a Graph: Novel Graph-Based Method for Performance Anomaly Classification in High-Performance Computing2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00041(240-245)Online publication date: 2-Jul-2024
  • Show More Cited By

Index Terms

  1. On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      KDD '00: Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
      August 2000
      537 pages
      ISBN:1581132336
      DOI:10.1145/347090
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 August 2000

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Article

      Conference

      KDD00
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)205
      • Downloads (Last 6 weeks)32
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)LaAeb: A comprehensive log-text analysis based approach for insider threat detectionComputers & Security10.1016/j.cose.2024.104126148(104126)Online publication date: Jan-2025
      • (2024)Network Anomaly Detection Algorithm Based on Fusion of Artificial Fish Swarming and Isolation Forest2024 5th International Conference on Computer Engineering and Application (ICCEA)10.1109/ICCEA62105.2024.10603987(238-242)Online publication date: 12-Apr-2024
      • (2024)Reimagine Application Performance as a Graph: Novel Graph-Based Method for Performance Anomaly Classification in High-Performance Computing2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00041(240-245)Online publication date: 2-Jul-2024
      • (2024)Multi-modal data novelty detection with adversarial autoencodersApplied Soft Computing10.1016/j.asoc.2024.112063(112063)Online publication date: Aug-2024
      • (2024)Synergetic proto-pull and reciprocal points for open set recognitionMachine Vision and Applications10.1007/s00138-024-01596-235:5Online publication date: 23-Aug-2024
      • (2023)Generative Perturbation Analysis for Probabilistic Black-Box Anomaly AttributionProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3580305.3599365(845-856)Online publication date: 6-Aug-2023
      • (2022)Attribute Restoration Framework for Anomaly DetectionIEEE Transactions on Multimedia10.1109/TMM.2020.304688424(116-127)Online publication date: 2022
      • (2022)Enhanced Tree-Based Anomaly Detection2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)10.1109/FUZZ-IEEE55066.2022.9882557(1-7)Online publication date: 18-Jul-2022
      • (2022)AutoAD: an Automated Framework for Unsupervised Anomaly Detection2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA54385.2022.10032396(1-10)Online publication date: 13-Oct-2022
      • (2022)An enhanced anomalies detection method based on isolation forest and fuzzy set2022 IEEE 8th International Conference on Cloud Computing and Intelligent Systems (CCIS)10.1109/CCIS57298.2022.10016390(432-436)Online publication date: 26-Nov-2022
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media