期刊文献+

Top-k Outlier Detection from Uncertain Data 被引量:1

Top-k Outlier Detection from Uncertain Data
原文传递
导出
摘要 Uncertain data are common due to the increasing usage of sensors, radio frequency identification(RFID), GPS and similar devices for data collection. The causes of uncertainty include limitations of measurements, inclusion of noise, inconsistent supply voltage and delay or loss of data in transfer. In order to manage, query or mine such data, data uncertainty needs to be considered. Hence,this paper studies the problem of top-k distance-based outlier detection from uncertain data objects. In this work, an uncertain object is modelled by a probability density function of a Gaussian distribution. The naive approach of distance-based outlier detection makes use of nested loop. This approach is very costly due to the expensive distance function between two uncertain objects. Therefore,a populated-cells list(PC-list) approach of outlier detection is proposed. Using the PC-list, the proposed top-k outlier detection algorithm needs to consider only a fraction of dataset objects and hence quickly identifies candidate objects for top-k outliers. Two approximate top-k outlier detection algorithms are presented to further increase the efficiency of the top-k outlier detection algorithm.An extensive empirical study on synthetic and real datasets is also presented to prove the accuracy, efficiency and scalability of the proposed algorithms. Uncertain data are common due to the increasing usage of sensors, radio frequency identification(RFID), GPS and similar devices for data collection. The causes of uncertainty include limitations of measurements, inclusion of noise, inconsistent supply voltage and delay or loss of data in transfer. In order to manage, query or mine such data, data uncertainty needs to be considered. Hence,this paper studies the problem of top-k distance-based outlier detection from uncertain data objects. In this work, an uncertain object is modelled by a probability density function of a Gaussian distribution. The naive approach of distance-based outlier detection makes use of nested loop. This approach is very costly due to the expensive distance function between two uncertain objects. Therefore,a populated-cells list(PC-list) approach of outlier detection is proposed. Using the PC-list, the proposed top-k outlier detection algorithm needs to consider only a fraction of dataset objects and hence quickly identifies candidate objects for top-k outliers. Two approximate top-k outlier detection algorithms are presented to further increase the efficiency of the top-k outlier detection algorithm.An extensive empirical study on synthetic and real datasets is also presented to prove the accuracy, efficiency and scalability of the proposed algorithms.
出处 《International Journal of Automation and computing》 EI CSCD 2014年第2期128-142,共15页 国际自动化与计算杂志(英文版)
基金 supported by Grant-in-Aid for Scientific Research(A)(#24240015A)
关键词 Top-k distance-based outlier detection uncertain data Gaussian uncertainty cell-based approach PC-list based approach Top-k distance-based outlier detection uncertain data Gaussian uncertainty cell-based approach PC-list based approach
  • 相关文献

参考文献7

  • 1Abhishek B. Sharma,Leana Golubchik,Ramesh Govindan.Sensor faults[J].ACM Transactions on Sensor Networks (TOSN).2010(3)
  • 2Hugo Garces,Daniel Sbarbaro.Outliers detection in environmental monitoring databases[J].Engineering Applications of Artificial Intelligence.2010(2)
  • 3Ashrar A.Omer,Johnson P.Thomas.Mutual Authentication Protocols for RFID Systems[J].International Journal of Automation and computing,2008,5(4):348-365. 被引量:3
  • 4Yufei Tao,Xiaokui Xiao,Reynold Cheng.Range search on multidimensional uncertain data[J].ACM Transactions on Database Systems (TODS).2007(3)
  • 5Zengyou He,Xiaofei Xu,Shengchun Deng.Discovering cluster-based local outliers[J].Pattern Recognition Letters.2003(9)
  • 6Manson Graeme,Pierce Gareth,Worden Keith.On the Long-Term Stability of Normal Condition for Damage Detection in a Composite Panel[J].Key Engineering Materials.2001(204)
  • 7J. Nievergelt,Hans Hinterberger,Kenneth C. Sevcik.The Grid File[J].ACM Transactions on Database Systems (TODS).1984(1)

二级参考文献13

  • 1[1]I.Vajda,L.Buttyan.Lightweight Authentication Pro-tocols for Low-cost RFID Tags.In Proceedings of the 2rid Workshop on Security in Uniquitous Com-puting-Ubicomp,[Online],Available:http://www.hit.bme.hu/-buttyan/publications/VajdaB03suc.pdf,2003.
  • 2[2]S.A.Weis,S.E.Sarma,R.L.Rivest,D.W.Eengels.Se-curity and Privacy Aspects of Low-cost Radio Frequency Identification Systems.In Proceedings of Internationl Con-ference on Security in Pervasive Computin,Lecture Notes in Computer Seince,Springer-Verlag,vol.2802,pp.202-212,2004.
  • 3[3]M.Ohkubo,K.Suzuki,S.Kinoshita.Cryptographic Approach to "privacy-friendly" Tags.In Proceedings of RFID Privacy Workshop,MIT,Massachusetts,USA,[Online],Available:http://lasecwww.epfl.ch/-gavoine/download/papers/OhkuboSK-2003-mit-paper.pdf 2003.
  • 4[4]AID Center.900 MHs Class O Radio Frequency (RF) Identification Tag Specification,Auto-ID Cen-ter,Cambridge,MA,USA,[Online],Available:http://www.epcglobalinc.org/standards/specs/900_MHz_Class_O_RFIDTag_Specification.pdf,2003.
  • 5[5]D.Henrici,P.Muller.Hash-based Enhancement of Loca-tion Privacy for Radio-frequency Identification Devices Us-ing Varying Identifiers.In Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Commu-nications Workshops,IEEE Press,pp.149-153,2004.
  • 6[6]S.Lee,T.Asano,K.Kim.RFID Mutual Authentication Scheme Based on Synchronized Secret Information.In Proceedngs of Symposium on Cryptography and Infor-mation Security,Hiroshima,Japan,[Online],Available:http:/ /caislab.ieu.ac.kr /Paper /paper_files/2006/SCIS_Lee.pdf,2006.
  • 7[7]J.Yang,J.Park,H.Lee,K.Ren,K.Kim.Mutual Au-thentication Protocol for Low-cost RFID.In Proceedings of Workshop on RFID and Lightweight Crypto,pp.17-24,2005.
  • 8[8]B.Calmels,S.Canard,M.Girault,H.Sibert.Low-cost Cryptography for Privacy in RFID Systems.In Proceed-ings of International Conference on Smart Card Research and Advanced Applications,Lecture Notes in Computer Science,Springer-Verlag,voL 3928,pp.273-251,2006.
  • 9[9]A.Juels.Minimalist Cryptography for Low-cost RFID Tags.In Proceedings of the 4th International Conference on Security in Communication Networks,Lecture Notes in Computer Science,Springer-Verlag,vol.3352,pp.149-164,2004.
  • 10[10]L.Batina,J.Guajardo,T.Kerins,N.Mentens,P.Tuyls,I.Verbauwhede.Public Key Cryptography for RFID-tags.In Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops,IEEE Press,pp.217-222,2006.

共引文献2

同被引文献4

引证文献1

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部