Pruning Based Method for Outlier Detection

被引:0
|
作者
Pamula, Rajendra [1 ]
Deka, Jatindra Kumar [1 ]
Nandi, Sukumar [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati 781039, Assam, India
来源
2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2012年
关键词
ALGORITHMS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a method to capture outliers. We apply a clustering algorithm to divide the dataset into independent clusters. The clusters which are dense in nature doesnot contain outliers. And the clusters which are sparse are probable candidate clusters for outliers. Pruning the dense clusters makes the dataset small and sparse. For the unpruned points we calculated a distance based outlier score. The computations needed for calculating the outlier score reduces considerably due to the pruning of many points. Based on the outlier score we declare the top-n points with the highest score as outliers. The experimental results using real data set demonstrate that even though the number of computations are less, the proposed method performs better than the existing method.
引用
收藏
页码:210 / 213
页数:4
相关论文
共 50 条
  • [1] An Outlier Detection Method Based on Cluster Pruning
    Pamula, Rajendra
    Deka, Jatindra Kumar
    Nandi, Sukumar
    2014 2ND INTERNATIONAL CONFERENCE ON BUSINESS AND INFORMATION MANAGEMENT (ICBIM), 2014,
  • [2] Efficient Pruning Schemes for Distance-Based Outlier Detection
    Vu, Nguyen Hoang
    Gopalkrishnan, Vivekanand
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT II, 2009, 5782 : 160 - 175
  • [3] PSO clustering and pruning-based KNN for outlier detection
    Mayanglambam, Sushilata D.
    Horng, Shi-Jinn
    Pamula, Rajendra
    SOFT COMPUTING, 2023,
  • [4] An Intrusion Detection Method Based on Outlier Ensemble Detection
    Huang, Bin
    Li, Wen-fang
    Chen, De-li
    Shi, Liang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 600 - +
  • [5] An Outlier Detection Based DDoS Defense Method
    Wang, Dongqi
    Zhu Yufu
    Chang Guiran
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 511 - 514
  • [6] Outlier detection method based on improved distance
    School of Computer Science and Engineering, South China University of Technology, Guangzhou 510640, China
    Huanan Ligong Daxue Xuebao, 2008, 9 (25-30):
  • [7] Clustering-Based Outlier Detection Method
    Jiang, Sheng-yi
    An, Qing-bo
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2008, : 429 - 433
  • [8] A Centroid-Based Outlier Detection Method
    Wang, Xiaochun
    Chen, Yiqin
    Wang, Xia Li
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1411 - 1416
  • [9] A new outlier detection method based on OPTICS
    Wang, Yue Fei
    Yu, Jiong
    Su, Guo Ping
    Qian, Yu Rong
    SUSTAINABLE CITIES AND SOCIETY, 2019, 45 : 197 - 212
  • [10] Outlier detection method based on standard scores
    Wang, Ya-Nan
    PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 : 1012 - 1017