• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Ex
  • Home
  • / ...
  • /Magazines
  • /Ex

CLOSED Call for Papers: Special Issue on Deep Anomaly Analytics

Submissions due: 1 August 2022

Publication: March/April 2023

Anomalies (a.k.a. outliers) commonly exist in various real-world scenarios, such as fraud in finance and insurance, intrusion in cybersecurity, fault in safety-critical systems, bushfire early warning, disease outbreak control, fake news, images and videos in social media, and medical diagnosis. Some anomalies could cause disasters that lead to immense economic loss or even deaths unless discovered and dealt with on time. These applications make anomaly analytics increasingly relevant in the modern world. Due to its foremost importance, the study of anomaly detection has a long history and has created a wealth of anomaly detection methods. With the advent of big data, new challenges and questions are introduced, which inspires novel ways of developing algorithms, methods, and techniques to foster the analysis, modeling, interpretation, and prediction as well as detection of anomalies.

Recent years have witnessed rapid growth in the number of academics and practitioners interested in artificial intelligence (AI) for anomaly detection. In particular, various deep learning models have been developed for anomaly detection. In many cases, however, deep models are hard to tune and hard to interpret. In addition, little attention has been paid to other aspects/phases (rather than anomaly detection) of the whole lifecycle of anomaly analytics. On the other hand, the increasing complexity of real-world cyber-physical systems is giving rise to unprecedented challenges facing anomaly analytics.

This special issue aims to promote innovative AI research and development that address key challenges for detecting, describing, modelling, predicting, understanding, suppressing, and eliminating anomalies in various application domains. Topics of interest include, but are not limited to:

  • Foundations and principles of anomaly analytics
  • Novel AI models and algorithms for anomaly analytics
  • Graph learning for anomaly analytics
  • Deep learning techniques for anomaly detection
  • Anomaly modelling, analysis, and (deep) understanding
  • Descriptive, predictive, and prescriptive analytics of anomalies
  • Augmented intelligence for anomaly detection
  • Human-in-the-loop machine learning for anomaly detection
  • Trustworthy anomaly analytics
  • Fairness, transparency, and explainability
  • Privacy, safety, and security
  • Tools, platforms, and systems for deep anomaly analytics
  • Anomaly analytics in various domains

Submission Guidelines

For author information and guidelines on submission criteria, please visit the IS Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.

Questions?

Contact the guest editors at is2-23@computer.org.

Guest Editors

  • Feng Xia, Federation University Australia (Australia)
  • Leman Akoglu, Carnegie Mellon University (USA)
  • Charu Aggarwal, IBM T. J. Watson Research Center (USA)
  • Huan Liu, Arizona State University (USA)

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter