Online Learning and Sequential Anomaly Detection in Trajectories

被引:150
作者
Laxhammar, Rikard [1 ]
Falkman, Goran [2 ]
机构
[1] Saab AB, S-17541 Jarfalla, Sweden
[2] Univ Skovde, S-54128 Skovde, Sweden
关键词
Anomaly detection; trajectory data; online learning; conformal prediction;
D O I
10.1109/TPAMI.2013.172
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detection of anomalous trajectories is an important problem in the surveillance domain. Various algorithms based on learning of normal trajectory patterns have been proposed for this problem. Yet, these algorithms typically suffer from one or more limitations: They are not designed for sequential analysis of incomplete trajectories or online learning based on an incrementally updated training set. Moreover, they typically involve tuning of many parameters, including ad-hoc anomaly thresholds, and may therefore suffer from overfitting and poorly-calibrated alarm rates. In this article, we propose and investigate the Sequential Hausdorff Nearest-Neighbor Conformal Anomaly Detector (SHNN-CAD) for online learning and sequential anomaly detection in trajectories. This is a parameter-light algorithm that offers a well-founded approach to the calibration of the anomaly threshold. The discords algorithm, originally proposed by Keogh et al., is another parameter-light anomaly detection algorithm that has previously been shown to have good classification performance on a wide range of time-series datasets, including trajectory data. We implement and investigate the performance of SHNN-CAD and the discords algorithm on four different labeled trajectory datasets. The results show that SHNN-CAD achieves competitive classification performance with minimum parameter tuning during unsupervised online learning and sequential anomaly detection in trajectories.
引用
收藏
页码:1158 / 1173
页数:16
相关论文
共 42 条
[1]  
Alt H, 2009, LECT NOTES COMPUT SC, V5760, P235, DOI 10.1007/978-3-642-03456-5_16
[2]  
[Anonymous], 1973, Pattern Classification and Scene Analysis
[3]   Clustering of Vehicle Trajectories [J].
Atev, Stefan ;
Miller, Grant ;
Papanikolopoulos, Nikolaos P. .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2010, 11 (03) :647-657
[4]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[5]  
Brax C., 2008, P 11 INT C INF FUS C
[6]  
Bu Y., 2009, P 15 ACM SIGKDD NEW
[7]   How close are we to solving the problem of automated visual surveillance? A review of real-world surveillance, scientific progress and evaluative mechanisms [J].
Dee, Hannah M. ;
Velastin, Sergio A. .
MACHINE VISION AND APPLICATIONS, 2008, 19 (5-6) :329-343
[8]  
Eskin E., 2000, P 17 ICML SAN FRANC
[9]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[10]  
Gammerman A, 2007, COMPUT J, V50, P151, DOI [10.1093/comjnl/bxl065, 10.1093/comjnl/bx1065]