Research on Abnormal Data Mining Algorithm

被引:0
作者
Dong Anfa [1 ]
Zhang Chunhai [1 ]
机构
[1] Ocean Univ China, Qingdao, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC) | 2017年
关键词
outlier mining; abnormal data; method;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper mainly discusses the commonly used outlier mining method, and gives the definition of abnormal data. According to different classification types, different types of outlier mining methods are classified, then several of the more commonly used outlier mining algorithms were introduced, a variety of outlier mining algorithms have their own application standards.
引用
收藏
页码:1477 / 1480
页数:4
相关论文
共 9 条
[1]   Outlier mining in large high-dimensional data sets [J].
Angiulli, F ;
Pizzuti, C .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (02) :203-215
[2]   Multilevel fast physical optics algorithm for radiation from non-planar apertures [J].
Boag, A ;
Letrou, C .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (06) :2064-2072
[3]  
Breunig M., 2000, P SIGMOD 00 DALL TEX, P427
[4]   SLOM: a new measure for local spatial outliers [J].
Chawla, S ;
Sun, P .
KNOWLEDGE AND INFORMATION SYSTEMS, 2006, 9 (04) :412-429
[5]   A Survey of Outlier Detection Methods in Network Anomaly Identification [J].
Gogoi, Prasanta ;
Bhattacharyya, D. K. ;
Borah, B. ;
Kalita, Jugal K. .
COMPUTER JOURNAL, 2011, 54 (04) :570-588
[6]   A survey of outlier detection methodologies [J].
Hodge V.J. ;
Austin J. .
Artificial Intelligence Review, 2004, 22 (2) :85-126
[7]  
[倪巍伟 Ni Weiwei], 2008, [计算机研究与发展, Journal of Computer Research and Development], V45, P1189
[8]  
Song XH, 2009, J HUAZHONG U SCI TEC
[9]  
Yu Yan., 2008, Proceedings of the International Conference on Neural Information Processing, P571