Skip-GANomaly: Skip Connected and Adversarially Trained Encoder-Decoder Anomaly Detection

被引:288
作者
Akcay, Samet [1 ]
Atapour-Abarghouei, Amir [1 ]
Breckon, Toby P. [1 ]
机构
[1] Univ Durham, Dept Comp Sci, Durham, England
来源
2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2019年
关键词
Anomaly Detection; Generative Adversarial Networks; Skip Connections; X-ray Security Screening; GANomaly; NOVELTY DETECTION;
D O I
10.1109/ijcnn.2019.8851808
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite inherent ill-definition, anomaly detection is a research endeavour of great interest within machine learning and visual scene understanding alike. Most commonly, anomaly detection is considered as the detection of outliers within a given data distribution based on some measure of normality. The most significant challenge in real-world anomaly detection problems is that available data is highly imbalanced towards normality (i.e. non-anomalous) and contains at most a sub-set of all possible anomalous samples - hence limiting the use of well-established supervised learning methods. By contrast, we introduce an unsupervised anomaly detection model, trained only on the normal (non-anomalous, plentiful) samples in order to learn the normality distribution of the domain, and hence detect abnormality based on deviation from this model. Our proposed approach employs an encoder-decoder convolutional neural network with skip connections to thoroughly capture the multiscale distribution of the normal data distribution in image space. Furthermore, utilizing an adversarial training scheme for this chosen architecture provides superior reconstruction both within image space and a lower-dimensional embedding vector space encoding. Minimizing the reconstruction error metric within both the image and hidden vector spaces during training aids the model to learn the distribution of normality as required. Higher reconstruction metrics during subsequent test and deployment are thus indicative of a deviation from this normal distribution, hence indicative of an anomaly. Experimentation over established anomaly detection benchmarks and challenging real-world datasets, within the context of X-ray security screening, shows the unique promise of such a proposed approach.
引用
收藏
页数:8
相关论文
共 38 条
[1]   Fraud detection system: A survey [J].
Abdallah, Aisha ;
Maarof, Mohd Aizaini ;
Zainal, Anazida .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :90-113
[2]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[3]   A survey of anomaly detection techniques in financial domain [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Islam, Md. Rafiqul .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :278-288
[4]  
Akcay S., 2018, ARXIV180506725
[5]  
[Anonymous], 2017, 2017 ICLR
[6]  
[Anonymous], 2010, MNIST HANDWRITTEN DI
[7]  
[Anonymous], 2018, IEEE T INF FOREN SEC, DOI DOI 10.1109/TIFS.2018.2812196
[8]  
[Anonymous], INT C LEARN REPR ICL
[9]  
[Anonymous], 2016, ICLR
[10]  
[Anonymous], PROC CVPR IEEE