• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Guanhua, Ma Xiuli, Yang Dongqing, Tang Shiwei, Shuai Meng, Xie Kunqing. Discovering Redundancy-Aware Top-k Anomalies in High Dimensional Data[J]. Journal of Computer Research and Development, 2010, 47(5): 788-795.
Citation: Chen Guanhua, Ma Xiuli, Yang Dongqing, Tang Shiwei, Shuai Meng, Xie Kunqing. Discovering Redundancy-Aware Top-k Anomalies in High Dimensional Data[J]. Journal of Computer Research and Development, 2010, 47(5): 788-795.

Discovering Redundancy-Aware Top-k Anomalies in High Dimensional Data

More Information
  • Published Date: May 14, 2010
  • Discovering anomalies is an important data mining task which has been studied in many applications. In this paper, by emphasizing the problems of exception measurement of high dimensional objects and redundancy in the set of anomalies, an approach is proposed to discover the anomalies in high dimensional data. With a bipartite graph representation of the given high dimensional dataset, the capability of compression of each object is used to measure the degree of exception of the object. Based on the exception measure, the dataset containing different types of attributes, such as binary attributes, categorical attributes and numeric attributes, are well supported. To solve the problem of redundancy in the set of top-k anomalies, the concept of redundancy-aware top-k anomalies is proposed. For the problem of mining the exact set of the redundancy-aware top-k anomalies is NP-hard, an algorithm based on greedy heuristics, named k-AnomaliesHD, is designed to discover an approximate set of the redundancy-aware top-k anomalies efficiently. The experimental study both on real and synthetic datasets shows that the algorithm scales linearly with the dimensionality of the dataset and quadratic to the size of the dataset. Further, compared with the redundancy-unaware method, the set of redundancy-aware top-k anomalies is much more effective to cover the abnormal patterns of data.
  • Related Articles

    [1]Zhou Peng, Zuo Zhiqiang. Design and Implementation of a Parallel Symbolic Execution Engine Based on Multi-Threading[J]. Journal of Computer Research and Development, 2023, 60(2): 248-261. DOI: 10.7544/issn1000-1239.202220920
    [2]Chen Zhe, Wang Zhi, Wang Xiaochu, Jia Chunfu. Using Code Mobility to Obfuscate Control Flow in Binary Codes[J]. Journal of Computer Research and Development, 2015, 52(8): 1902-1909. DOI: 10.7544/issn1000-1239.2015.20140607
    [3]Wang Jin, Huang Zhiqiu, Tang Jiajun, Chen Zhe, Xiao Fangxiong. Predicate Constraint Oriented BPEL Modeling and Feasible Path Analysis[J]. Journal of Computer Research and Development, 2014, 51(4): 838-847.
    [4]Shou Lidan, Hu Wei, Luo Xinyuan, Chen Ke, and Chen Gang. An Implementation of Attributive Predicate Lock in Database System[J]. Journal of Computer Research and Development, 2012, 49(10): 2260-2270.
    [5]Pan Yi, Zhang Kailong, and Pan Jingui. Content-Based Publish/Subscribe Mechanism and Algorithm Based on Predicate Covering[J]. Journal of Computer Research and Development, 2011, 48(5): 765-777.
    [6]Bai Yan and Liu Dayou. A Logical Exception Handling Method in Agent Communication[J]. Journal of Computer Research and Development, 2007, 44(3).
    [7]Tang Feng, Wu Chenggang, Zhang Zhaoqing, Yang Hao. Exception Handling in Application Level Binary Translation[J]. Journal of Computer Research and Development, 2006, 43(12): 2166-2173.
    [8]Wang Fengqin, Hu Dinglei, and Liu Chunlin. A Register Allocation Algorithm for Predicated Code[J]. Journal of Computer Research and Development, 2006, 43(8): 1471-1476.
    [9]Wang Yu, Meng Xiaofeng, Wang Shan. Using Histograms to Estimate the Selectivity of XPath Expression with Value Predicates[J]. Journal of Computer Research and Development, 2006, 43(2): 288-294.
    [10]Yue Qiang, Li Wei, Xu Zhiwei. An Exception Handling Method Based on Grid Service Routes[J]. Journal of Computer Research and Development, 2005, 42(4): 551-556.

Catalog

    Article views (778) PDF downloads (502) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return