
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Yixin Chen, Xin Dang, Hanxiang Peng, Henry L. Bart Jr., "Outlier Detection with the Kernelized Spatial Depth Function," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 2, pp. 288305, February, 2009.  
BibTex  x  
@article{ 10.1109/TPAMI.2008.72, author = {Yixin Chen and Xin Dang and Hanxiang Peng and Henry L. Bart Jr.}, title = {Outlier Detection with the Kernelized Spatial Depth Function}, journal ={IEEE Transactions on Pattern Analysis and Machine Intelligence}, volume = {31}, number = {2}, issn = {01628828}, year = {2009}, pages = {288305}, doi = {http://doi.ieeecomputersociety.org/10.1109/TPAMI.2008.72}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Pattern Analysis and Machine Intelligence TI  Outlier Detection with the Kernelized Spatial Depth Function IS  2 SN  01628828 SP288 EP305 EPD  288305 A1  Yixin Chen, A1  Xin Dang, A1  Hanxiang Peng, A1  Henry L. Bart Jr., PY  2009 KW  Outlier detection KW  novelty detection KW  anomaly detection KW  statistical depth function KW  spatial depth KW  kernel method KW  unsupervised learning. VL  31 JA  IEEE Transactions on Pattern Analysis and Machine Intelligence ER   
[1] N. Abe, B. Zadrozny, and J. Langford, “Outlier Detection by Active Learning,” Proc. ACM SIGKDD '06, pp. 504509, 2006.
[2] D.C. Adams and F.J. Rohlf, “Ecological Character Displacement in Plethodon: Biomechanical Differences Found from a Geometric Morphometric Study,” Proc. Nat'l Academy of Sciences, vol. 97, pp.41064111, 2000.
[3] C.C. Aggarwal and P.S. Yu, “Outlier Detection for High Dimensional Data,” Proc. ACM SIGMOD '01, pp. 3746, 2001.
[4] F. Angiulli, S. Basta, and C. Pizzuti, “DistanceBased Detection and Prediction of Outliers,” IEEE Trans. Knowledge and Data Eng., vol. 18, no. 2, pp. 145160, Feb. 2006.
[5] A.C. Atkinson, “Fast Very Robust Methods for the Detection of Multiple Outliers,” J. Am. Statistical Assoc., vol. 89, no. 428, pp.13291339, 1994.
[6] A. Banerjee, P. Burlina, and C. Diehl, “A Support Vector Method for Anomaly Detection in Hyperspectral Imagery,” IEEE Trans. Geoscience and Remote Sensing, vol. 44, no. 8, pp. 22822291, Aug. 2006.
[7] V. Barnett and T. Lewis, Outliers in Statistical Data. John Wiley & Sons, 1994.
[8] M.M. Breunig, H.P. Kriegel, R.T. Ng, and J. Sander, “LOF: Identifying DensityBased Local Outliers,” Proc. ACM SIGMOD '00, pp. 93104, 2000.
[9] C. Campbell and K.P. Bennett, “A Linear Programming Approach to Novelty Detection,” Advances in Neural Information Processing Systems 13, pp. 395401, 2001.
[10] M.J. Carlotto, “A ClusterBased Approach for Detecting ManMade Objects and Changes in Imagery,” IEEE Trans. Geoscience and Remote Sensing, vol. 43, no. 2, pp. 374387, Feb. 2005.
[11] D. Castaño and A. Kunoth, “Robust Regression of Scattered Data with Adaptive SplineWavelets,” IEEE Trans. Image Processing, vol. 15, no. 6, pp. 16211632, June 2006.
[12] P. Chaudhuri, “Multivariate Location Estimation Using Extension of $R\hbox{}{\rm Estimates}$ through $U\hbox{}{\rm Statistics}$ Type Approach,” The Annals of Statistics, vol. 20, no. 2, pp. 897916, 1992.
[13] P. Chaudhuri, “On a Geometric Notion of Quantiles for Multivariate Data,” J. Am. Statistical Assoc., vol. 91, no. 434, pp. 862872, 1996.
[14] Y. Chen, H.L. Bart Jr., S. Huang, and H. Chen, “A Computational Framework for Taxonomic Research: Diagnosing Body Shape within Fish Species Complexes,” Proc. Fifth IEEE Int'l Conf. Data Mining, pp. 593596, 2005.
[15] C. Croux and P.J. Rousseeuw, “Alternatives to the Median Absolute Deviation,” J. Am. Statistical Assoc., vol. 88, no. 424, pp.12731283, 1993.
[16] X. Dang and R. Serfling, “Nonparametric DepthBased Multivariate Outlier Identifiers, and Robustness Properties,” submitted for journal publication, 2006.
[17] G. Danuser and M. Stricker, “Parametric Model Fitting: From Inlier Characterization to Outlier Detection,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 3, pp. 263280, Mar. 1998.
[18] E. Eskin, “Anomaly Detection over Noisy Data Using Learned Probability Distributions,” Proc. 17th Int'l Conf. Machine Learning, pp. 255262, 2000.
[19] S. Fidler, D. Skočaj, and A. Leonardis, “Combining Reconstructive and Discriminative Subspace Methods for Robust Classification and Regression by Subsampling,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 28, no. 3, pp. 337350, Mar. 2006.
[20] A.B. Frakt, W.C. Karl, and A.S. Willsky, “A Multiscale Hypothesis Testing Approach to Anomaly Detection and Localization from Noisy Tomographic Data,” IEEE Trans. Image Processing, vol. 7, no. 6, pp. 825837, June 1998.
[21] M.G. Genton, “Classes of Kernels for Machine Learning: A Statistics Perspective,” J. Machine Learning Research, vol. 2, pp.299312, 2001.
[22] A.K. Ghosh and P. Chaudhuri, “On Data Depth and DistributionFree Discriminant Analysis Using Separating Surfaces,” Bernoulli, vol. 11, no. 1, pp. 127, 2005.
[23] A.K. Ghosh and P. Chaudhuri, “On Maximum Depth Classifiers,” Scandinavian J. Statistics, vol. 32, no. 2, pp. 327350, 2005.
[24] R.C. Gonzalez and R.E. Woods, Digital Image Processing, third ed. AddisonWesley, 1992.
[25] J.C. Gower, “Generalized Procrustes Analysis,” Psychometrika, vol. 40, pp. 3351, 1975.
[26] H. Hajji, “Statistical Analysis of Network Traffic for Adaptive Faults Detection,” IEEE Trans. Neural Networks, vol. 16, no. 5, pp.10531063, Sept. 2005.
[27] S.J. Han and S.B. Cho, “Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program,” IEEE Trans. Systems, Man, and Cybernetics B, vol. 36, no. 3, pp. 559570, June 2006.
[28] D.M. Hawkins, Identification of Outliers. Chapman and Hall, 1980.
[29] W. Hu, X. Xiao, Z. Fu, D. Xie, T. Tan, and S. Maybank, “A System for Learning Statistical Motion Patterns,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 28, no. 9, pp. 14501464, Sept. 2006.
[30] J. Hugg, E. Rafalin, K. Seyboth, and D. Souvaine, “An Experimental Study of Old and New Depth Measures,” Proc. Workshop Algorithm Eng. and Experiments (ALENEX '06), pp. 5164, 2006.
[31] R. Jörnsten, “Clustering and Classification Based on the $L_{1}$ Data Depth,” J. Multivariate Analysis, vol. 90, no. 1, pp. 6789, 2004.
[32] D.G. Kendall, “ShapeManifolds, Procrustean Metrics and Complex Projective Spaces,” Bull. London Math. Soc., vol. 16, no. 2 pp.81121, 1984.
[33] E. Keogh, J. Lin, A.W. Fu, and H. van Herle, “Finding Unusual Medical TimeSeries Subsequences: Algorithms and Applications,” IEEE Trans. Information Technology in Biomedicine, vol. 10, no. 3, pp. 429439, Mar. 2006.
[34] E.M. Knorr and R.T. Ng, “Algorithms for Mining DistanceBased Outliers in Large Datasets,” Proc. 24th Int'l Conf. Very Large Data Bases, pp. 392403, 1998.
[35] G. Kollios, D. Gunopulos, N. Koudas, and S. Berchtold, “Efficient Biased Sampling for Approximate Clustering and Outlier Detection in Large Data Sets,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 11701187, Sept./Oct. 2003.
[36] H. Kwon and N.M. Nasrabadi, “Kernel RXAlgorithm: A Nonlinear Anomaly Detector for Hyperspectral Imagery,” IEEE Trans. Geoscience and Remote Sensing, vol. 43, no. 2, pp. 388397, Feb 2005.
[37] J. Langford, “Tutorial on Practical Prediction Theory for Classification,” J. Machine Learning Research, vol. 6, pp. 273306, 2005.
[38] A. Lazarevic and V. Kumar, “Feature Bagging for Outlier Detection,” Proc. ACM SIGKDD '05, pp. 157166, 2005.
[39] S. Lele and J.T. Richtsmeier, “Euclidean Distance Matrix Analysis: A Coordinate Free Approach for Comparing Biological Shapes Using Landmark Data,” Am. J. Physical Anthropology, vol. 86, pp.415427, 1991.
[40] A. Leonardis and H. Bischof, “Robust Recognition Using Eigenimages,” Computer Vision and Image Understanding, vol. 78, no. 1, pp. 99118, 2000.
[41] R.Y. Liu, “On a Notion of Data Depth Based on Random Simplices,” The Annals of Statistics, vol. 18, no. 1, pp. 405414, 1990.
[42] C. Manikopoulos and S. Papavassiliou, “Network Intrusion and Fault Detection: A Statistical Anomaly Approach,” IEEE Comm. Magazine, vol. 40, no. 10, pp. 7683, 2002.
[43] M. Markou and S. Singh, “Novelty Detection: A ReviewPart 1: Statistical Approaches,” Signal Processing, vol. 83, no. 12, pp.24812497, 2003.
[44] M. Markou and S. Singh, “Novelty Detection: A ReviewPart 2: Neural Network Based Approaches,” Signal Processing, vol. 83, no. 12, pp. 24992521, 2003.
[45] M. Markou and S. Singh, “A Neural NetworkBased Novelty Detection for Image Sequence Analysis,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 28, no. 10, pp. 16641677, Oct. 2006.
[46] D.J. Miller and J. Browning, “A Mixture Model and EMBased Algorithm for Class Discovery, Robust Classification, and Outlier Rejection in Mixed Labeled/Unlabeled Data Sets,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 14681483, Nov. 2003.
[47] L. Parra, G. Deco, and S. Miesbach, “Statistical Independence and Novelty Detection with Information Preserving NonLinear Maps,” Neural Computation, vol. 8, no. 2, pp. 260269, 1996.
[48] F. Preparata and M. Shamos, Computational Geometry: An Introduction. Springer, 1988.
[49] G. Rätsch, S. Mika, B. Schölkopf, and K.R. Müller, “Constructing Boosting Algorithms from SVMs: An Application to OneClass Classification,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 9, pp. 11841199, Sept. 2002.
[50] S. Ramaswamy, R. Rastogi, and S. Kyuseok, “Efficient Algorithms for Mining Outliers from Large Data Sets,” Proc. ACM SIGMOD '00, pp. 427438, 2000.
[51] I.S. Reed and X. Yu, “Adaptive MultipleBand CFAR Detection of an Optical Pattern with Unknown Spectral Distribution,” IEEE Trans. Acoustics, Speech, and Signal Processing, vol. 38, no. 10, pp.17601770, Oct. 1990.
[52] B.D. Ripley, Pattern Recognition and Neural Networks. Cambridge Univ. Press, 1996.
[53] S. Roberts and L. Tarassenko, “A Probabilistic Resource Allocating Network for Novelty Detection,” Neural Computation, vol. 6, no. 2, pp. 270284, 1994.
[54] D.M. Rocke and D.L. Woodruff, “Identification of Outliers in Multivariate Data,” J. Am. Statistical Assoc., vol. 91, no. 435, pp.10471061, 1996.
[55] P.J. Rousseeuw and K. van Driessen, “A Fast Algorithm for the Minimum Covariance Determinant Estimator,” Technometrics, vol. 41, no. 3, pp. 212223, 1999.
[56] P.J. Rousseeuw and A.M. Leroy, Robust Regression and Outlier Detection. John Wiley & Sons, 1987.
[57] P.J. Rousseeuw and I. Ruts, “Algorithm AS 307: Bivariate Location Depth,” Applied Statistics, vol. 45, no. 4, pp. 516526, 1996.
[58] I. Ruts and P. Rousseeuw, “Computing Depth Contours of Bivariate Point Clouds,” Computational Statistics and Data Analysis, vol. 23, no. 1, pp. 153168, 1996.
[59] B. Schölkopf, J.C. Platt, J. ShaweTaylor, A.J. Smola, and R.C. Williamson, “Estimating the Support of a HighDimensional Distribution,” Neural Computation, vol. 13, no. 7, pp. 14431471, 2001.
[60] S.M. Schweizer and J.M.F. Moura, “Hyperspectral Imagery: Clutter Adaptation in Anomaly Detection,” IEEE Trans. Information Theory, vol. 46, no. 5, pp. 18551871, Aug. 2000.
[61] R. Serfling, “A Depth Function and a Scale Curve Based on Spatial Quantiles,” Statistical Data Analysis Based on the L1Norm and Related Methods, Y. Dodge, ed., pp. 2538, 2002.
[62] J. ShaweTaylor and N. Cristianini, Kernel Methods for Pattern Analysis. Cambridge Univ. Press, 2004.
[63] D.E. Slice, “Landmark Coordinates Aligned by Procrustes Analysis Do Not Lie in Kendall's Shape Space,” Systematic Biology, vol. 50, pp. 141149, 2001.
[64] C.G. Small, “A Survey of Multidimensional Medians,” Int'l Statistical Rev., vol. 58, no. 3, pp. 263277, 1990.
[65] D. Song, M.I. Heywood, and A.N. ZincirHeywood, “Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection,” IEEE Trans. Evolutionary Computation, vol. 9, no. 3, pp. 225239, June 2005.
[66] C. Stauffer and W.E. Grimson, “Learning Patterns of Activity Using RealTime Tracking,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 747757, Aug. 2000.
[67] I. Steinwart, D. Hush, and C. Scovel, “A Classification Framework for Anomaly Detection,” J. Machine Learning Research, vol. 6, pp.211232, 2005.
[68] P. Sun and S. Chawla, “On Local Spatial Outliers,” Proc. Fourth IEEE Int'l Conf. Data Mining, pp. 209216, 2004.
[69] J. Takeuchi and K. Yamanishi, “A Unifying Framework for Detecting Outliers and Change Points from Time Series,” IEEE Trans. Knowledge and Data Eng., vol. 18, no. 4, pp. 482492, Apr. 2006.
[70] J. Tang, Z. Chen, A.W.C. Fu, and D. Cheung, “A Robust Outlier Detection Scheme in Large Data Sets,” Proc. PacificAsia Conf. Knowledge Discovery and Data Mining, pp. 535548, 2002.
[71] M. Thottan and C. Ji, “Anomaly Detection in IP Networks,” IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 21912204, Aug. 2003.
[72] J.W. Tukey, “Mathematics and Picturing Data,” Proc. Int'l Congress of Math., vol. 2, pp. 523531, 1974.
[73] V. Vapnik, The Nature of Statistical Learning Theory. Springer, 1995.
[74] Y. Vardi and C.H. Zhang, “The Multivariate $L_{1}\hbox{}{\rm Median}$ and Associated Data Depth,” Proc. Nat'l Academy of Sciences, vol. 97, no. 4, pp. 14231436, 2000.
[75] A. Weber, Theory of the Location of Industries (translated by C.J.Friedrich from Weber's 1909 book). Univ. of Chicago Press, 1929.
[76] L. Wei, E. Keogh, and X. Xi, “SAXually Explicit Images: Finding Unusual Shapes,” Proc. IEEE Int'l Conf. Data Mining, pp. 711720, 2006.
[77] W. Zhou and R. Serfling, “Multivariate Spatial UQuantiles: ABahadurKiefer Representation, a TheilSen Estimator for Multiple Regression, and a Robust Dispersion Estimator,” manuscript, http://www.utdallas.edu/~serfling/papers Zhou Serfling2006.pdf, 2006.
[78] Y. Zuo and R. Serfling, “General Notions of Statistical Depth Function,” The Annals of Statistics, vol. 28, no. 2, pp. 461482, 2000.