期刊文献+

孤立点检测算法与应用 被引量:10

Algorithms and Applications of Outlier Detection
下载PDF
导出
摘要 孤立点检测问题是数据挖掘领域中的一个重要研究内容.首先对目前有代表性的孤立点检测算法进行综述,详细阐述了其实现的基本原理、实现的步骤和应用范围,进而对这些典型算法的优缺点进行了分析与比较,随后介绍了几种孤立点的典型应用,最后对孤立点检测算法的发展趋势从4个方面进行了展望. Outlier detection is a very important aspect of data mining. The typical outlier detection algorithms are discussed in detail firstly, including basic principles, implementation procedure and application fieldes. And then, the merits and drawbacks of these algorithms are analyzed and compared; the representative examples of outlier detection algorithms are introduced. Finally, four aspects in the future development of outlier detection algorithms are outlined.
作者 鄢团军 刘勇
出处 《三峡大学学报(自然科学版)》 CAS 2009年第1期98-103,共6页 Journal of China Three Gorges University:Natural Sciences
基金 国家自然科学基金资助项目(50805087) 三峡大学科学基金资助项目
关键词 孤立点检测 算法 应用 outlier detection algorithms opplication
  • 相关文献

参考文献33

  • 1Knorr, Edwin M, Raymond T. Ng. Algorithms for Mining Distance-Based Outliers in Large Datasets[R]. Very Large Data Bases Conference Proceedings, 1998: 24-27.
  • 2Knorr E, Ng R, Tucakov V. Distance-Based Outlier.. Algorithms and Applications[J]. VLDB, 2000,8 (3-4):237-253.
  • 3Aggarwal C, Yu P. An Effective and Efficient Algorithm for High-dimensional Outlier Detection[J]. VLDB, 2005,14(2) :211-221.
  • 4Paul S T, Fung K Y. A Generalized Extreme Studentized Residual Multiple outlier-detection Procedure in Linear Regression[J]. Technometrics, 1991,33 (3) : 339-348.
  • 5Yamanishi K, Takeuchi J, Williams G. Online Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms [R]. Boston, MA, USA: In Proceedings of the Sixth ACM SIGKDDOO, 2000:320-324.
  • 6Ramaswamy S, Rastogi R, Kyuseok S. Efficient Algorithms for Mining Outliers from Large Data Sets[R]. In Proc. of the ACM SIGMOD International Conference on Management of Data, 2000:93-104.
  • 7Merz C J, Merphy P. UCI Repository of Machine I.earning Databases. URL.. http://www. ics. uci. edu/ mleaml MLRRepository. html, 1996.
  • 8Brito M R, Ch'avez E L, Quiroz A J, et al. Connectivity of the Mutual -nearest-neighbor Graph in Clustering and Outlier Detection[J]. Statistics Probability Letters, 1997,35 ( 1 ) :33-42.
  • 9Ville Hautamaki, Ismo Karkkainen, Pasi Franti. Outlier Detection Using k-Nearest Neighbour Graph[R]. In Proceedings of the 17th International Conference on Pattern Recognition, 2004:430-433.
  • 10Spiros Papadimitriou, Hiroyuki Kitagawa, Phillip B Gibbons, Christos Faloutsos. LOCI: Fast Outlier Detection Using the Local Correlation Integral[R]. Bangalore, India: 19th International Conference on Data Engineering, 2003 : 315-326.

二级参考文献16

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 2金澈清,钱卫宁,周傲英.流数据分析与管理综述[J].软件学报,2004,15(8):1172-1181. 被引量:161
  • 3陈玉祥.预测技术与应用[M].北京:机械工业出版社,1984..
  • 4SM潘迪特 吴宪民.时间序列及系统分析与应用[M].机械工业出版社,1988..
  • 5Donald A Jackson,Yong Chen.Robust principal component analysis and outlier detection with ecological data[J].Environmetrics.2004;15(2):129~139
  • 6Lalor G C,Zhang C.Multivariate outlier detection and remediation in geochemical databases[J].The Science of the Total Environment,2001 ;28(1):99~109
  • 7R Agrawal,J Gehrke,D Gunopulos et al.Automaticubspace clustering of high dimentional data for data mining application[C].In:Proceedings of the ACM SIGMOD Conference on Management of Data,Seattle,Washington,1998:94~105
  • 8R A Johnson.Applied Multivariate Statistical Analysis[M].4th Ed,Prentice-Hall,NJ,1998
  • 9KDD Cup 1999 Data.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,2003-08
  • 10A Lazarevic L Ertoz,V Kumar et al.A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection[C].In:Proceedings of the Third SIAM Conference on Data Mining,2003-05

共引文献72

同被引文献76

引证文献10

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部