• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Ex
  • Home
  • / ...
  • /Magazines
  • /Ex

CLOSED Call for Papers: Non-IID Outlier Detection in Complex Contexts

Important Dates

  • Paper Submission: CLOSED
  • First Decision: 9 June 2020
  • Revision: 14 July 2020
  • Final Decision: 4 August 2020
  • Camera-ready paper due: 1 September 2020
  • Publication: November/December 2020

Outlier detection (also known as anomaly detection) aims at identifying data objects which are rare or significantly different from the majority of objects. Due to the significance to many critical domains like cybersecurity, fintech, healthcare, public security and AI safety, outlier detection has been one of the most active research areas in various communities, such as machine learning, data mining, computer vision and statistics. Traditional outlier detection techniques generally assume that data is Independent and Identically Distributed (IID), which are significantly challenged in complex contexts where data is actually non-IID. These contexts are ubiquitous in not only graph data, sequence data, spatial data and time series data but also traditional multidimensional, textual and image data. This demands advanced outlier detection approaches to well address those explicit or implicit non-IID data characteristics. This special issue on Non-IID Outlier Detection in Complex Contexts will solicit the latest advancements in outlier detection that consider the data interactions, relations, and heterogeneity to enable a more effective identification of the outliers and to provide more reliable outlier detection systems in the aforementioned critical domains.

Scope of Interest

This special issue solicits original and high-quality research on but not limited to the following topics:

  • Outlier discovery on explicit non-IID data- Graph data- Spatial-temporal data- Sequence data- Time series data- Video data- Mixed numeric-categorical data
  • Outlier discovery on implicit non-IID data- Multidimensional numeric data- Multidimensional categorical data- Text data- Image data
  • Outlier models that break the IID assumption- Un/weakly/semi/fully-supervised models- Graph mining models- Online learning models- Ensemble models- Bayesian networks- Deep learning models- Reinforcement learning models
  • Non-IID outlier discovery theories/foundation- Mathematical formalization- Optimization- Generalization bounds and learnability- Outlier explanation
  • Applications of non-IID outlier detection- Fraud and risk analysis in finance- Disease detection in healthcare- Intrusion detection in cybersecurity- Malicious activity detection in social networks- Event detection in video surveillance- Safety analysis in AI systems
  • Related areas addressing similar issues- Novelty detection- Out-of-distribution example detection- Anti-spoofing techniques- Adversarial learning

Submission

All submissions must comply with the submission guidelines of IEEE Intelligent Systems and will be reviewed by research peers.

Guest Editors

• Dr. Guansong Pang (University of Adelaide, Australia; guansong.pang@adelaide.edu.au)

• Prof. Fabrizio Angiulli (University of Calabria, Italy; fabrizio.angiulli@unical.it)

• Prof. Mihai Cucuringu (University of Oxford, United Kingdom; mihai.cucuringu@stats.ox.ac.uk)

• Prof. Huan Liu (Arizona State University, United States; huan.liu@asu.edu)

Questions?

Inquiries can be sent to the Guest Editors at is6-20@computer.org

LATEST NEWS
Resume Template
Resume Template
IEEE Reveals 2026 Predictions for Top Technology Trends 
IEEE Reveals 2026 Predictions for Top Technology Trends 
7 Best Practices for Secure Software Engineering in 2026
7 Best Practices for Secure Software Engineering in 2026
Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech
Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech
Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams
Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams
Read Next

Resume Template

IEEE Reveals 2026 Predictions for Top Technology Trends 

7 Best Practices for Secure Software Engineering in 2026

Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech

Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams

Computing’s Top 30: Bala Siva Sai Akhil Malepati

The Art of Code Meets the Standards of Science: Why SWEBOK Matters

Re-Engineering Cloud-Native Principles for Safety-Critical Software Systems

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter