• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Ex
  • Home
  • / ...
  • /Magazines
  • /Ex

CLOSED Call for Papers: Non-IID Outlier Detection in Complex Contexts

Important Dates

  • Paper Submission: CLOSED
  • First Decision: 9 June 2020
  • Revision: 14 July 2020
  • Final Decision: 4 August 2020
  • Camera-ready paper due: 1 September 2020
  • Publication: November/December 2020

Outlier detection (also known as anomaly detection) aims at identifying data objects which are rare or significantly different from the majority of objects. Due to the significance to many critical domains like cybersecurity, fintech, healthcare, public security and AI safety, outlier detection has been one of the most active research areas in various communities, such as machine learning, data mining, computer vision and statistics. Traditional outlier detection techniques generally assume that data is Independent and Identically Distributed (IID), which are significantly challenged in complex contexts where data is actually non-IID. These contexts are ubiquitous in not only graph data, sequence data, spatial data and time series data but also traditional multidimensional, textual and image data. This demands advanced outlier detection approaches to well address those explicit or implicit non-IID data characteristics. This special issue on Non-IID Outlier Detection in Complex Contexts will solicit the latest advancements in outlier detection that consider the data interactions, relations, and heterogeneity to enable a more effective identification of the outliers and to provide more reliable outlier detection systems in the aforementioned critical domains.

Scope of Interest

This special issue solicits original and high-quality research on but not limited to the following topics:

  • Outlier discovery on explicit non-IID data- Graph data- Spatial-temporal data- Sequence data- Time series data- Video data- Mixed numeric-categorical data
  • Outlier discovery on implicit non-IID data- Multidimensional numeric data- Multidimensional categorical data- Text data- Image data
  • Outlier models that break the IID assumption- Un/weakly/semi/fully-supervised models- Graph mining models- Online learning models- Ensemble models- Bayesian networks- Deep learning models- Reinforcement learning models
  • Non-IID outlier discovery theories/foundation- Mathematical formalization- Optimization- Generalization bounds and learnability- Outlier explanation
  • Applications of non-IID outlier detection- Fraud and risk analysis in finance- Disease detection in healthcare- Intrusion detection in cybersecurity- Malicious activity detection in social networks- Event detection in video surveillance- Safety analysis in AI systems
  • Related areas addressing similar issues- Novelty detection- Out-of-distribution example detection- Anti-spoofing techniques- Adversarial learning

Submission

All submissions must comply with the submission guidelines of IEEE Intelligent Systems and will be reviewed by research peers.

Guest Editors

• Dr. Guansong Pang (University of Adelaide, Australia; guansong.pang@adelaide.edu.au)

• Prof. Fabrizio Angiulli (University of Calabria, Italy; fabrizio.angiulli@unical.it)

• Prof. Mihai Cucuringu (University of Oxford, United Kingdom; mihai.cucuringu@stats.ox.ac.uk)

• Prof. Huan Liu (Arizona State University, United States; huan.liu@asu.edu)

Questions?

Inquiries can be sent to the Guest Editors at is6-20@computer.org

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter