A visual-numeric approach to clustering and anomaly detection for trajectory data

被引:0
|
作者
Dheeraj Kumar
James C. Bezdek
Sutharshan Rajasegarar
Christopher Leckie
Marimuthu Palaniswami
机构
[1] The University of Melbourne,Department of Electrical and Electronic Engineering
[2] The University of Melbourne,Department of Computing and Information Systems
[3] National ICT Australia,undefined
来源
The Visual Computer | 2017年 / 33卷
关键词
Trajectory clustering; Anomaly detection; ClusiVAT hierarchical clustering; MIT trajectory dataset;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a novel application of Visual Assessment of Tendency (VAT)-based hierarchical clustering algorithms (VAT, iVAT, and clusiVAT) for trajectory analysis. We introduce a new clustering based anomaly detection framework named iVAT+ and clusiVAT+ and use it for trajectory anomaly detection. This approach is based on partitioning the VAT-generated Minimum Spanning Tree based on an efficient thresholding scheme. The trajectories are classified as normal or anomalous based on the number of paths in the clusters. On synthetic datasets with fixed and variable numbers of clusters and anomalies, we achieve 98 % classification accuracy. Our two-stage clusiVAT method is applied to 26,039 trajectories of vehicles and pedestrians from a parking lot scene from the real life MIT trajectories dataset. The first stage clusters the trajectories ignoring directionality. The second stage divides the clusters obtained from the first stage by considering trajectory direction. We show that our novel two-stage clusiVAT approach can produce natural and informative trajectory clusters on this real life dataset while finding representative anomalies.
引用
收藏
页码:265 / 281
页数:16
相关论文
共 50 条
  • [31] Vehicle Anomaly Detection based on Trajectory Data of ANPR System
    Sun, Yuyan
    Zhu, Hongsong
    Liao, Yong
    Sun, Limin
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [32] Network-based anomaly intrusion detection with numeric-and-nominal mixed data
    蔡龙征
    余胜生
    王晓锋
    周敬利
    Journal of Shanghai University, 2006, (05) : 415 - 420
  • [33] Hybrid Group Anomaly Detection for Sequence Data: Application to Trajectory Data Analytics
    Belhadi, Asma
    Djenouri, Youcef
    Srivastava, Gautam
    Cano, Alberto
    Lin, Jerry Chun-Wei
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 9346 - 9357
  • [34] Visual saliency approach to anomaly detection in an image ensemble
    Singh, Anurag
    Pratt, Michael A.
    Chu, Chee-Hung Henry
    INDEPENDENT COMPONENT ANALYSES, COMPRESSIVE SAMPLING, WAVELETS, NEURAL NET, BIOSYSTEMS, AND NANOENGINEERING XI, 2013, 8750
  • [35] Probabilistic framework of visual anomaly detection for unbalanced data
    Wang, Yongxiong
    Li, Xuan
    Ding, Xueming
    NEUROCOMPUTING, 2016, 201 : 12 - 18
  • [36] Anomaly detection for visual analytics of power consumption data
    Janetzko, Halldor
    Stoffel, Florian
    Mittelstaedt, Sebastian
    Keim, Daniel A.
    COMPUTERS & GRAPHICS-UK, 2014, 38 : 27 - 37
  • [37] A Clustering-Based Unsupervised Approach to Anomaly Intrusion Detection
    Nikolova, Evgeniya
    Jecheva, Veselina
    PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 202 - 205
  • [38] A Mixed Clustering Approach for Real-Time Anomaly Detection
    Mazarbhuiya, Fokrul Alom
    Shenify, Mohamed
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [39] CLAPP: A self constructing feature clustering approach for anomaly detection
    Kumar, Gunupudi Rajesh
    Mangathayaru, Nimmala
    Narsimha, Gugulothu
    Reddy, Gali Suresh
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 74 : 417 - 429
  • [40] Online Clustering for Evolving Data Streams with Online Anomaly Detection
    Chenaghlou, Milad
    Moshtaghi, Masud
    Leckie, Christopher
    Salehi, Mahsa
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2018, PT II, 2018, 10938 : 506 - 519