Robust archetypoids for anomaly detection in big functional data

被引:0
|
作者
Guillermo Vinue
Irene Epifanio
机构
[1] Katholieke Universiteit Leuven,
[2] Universitat Jaume I,undefined
来源
Advances in Data Analysis and Classification | 2021年 / 15卷
关键词
Anomaly detection; Functional data analysis; Archetypal analysis; Big data; R package; 62P30;
D O I
暂无
中图分类号
学科分类号
摘要
Archetypoid analysis (ADA) has proven to be a successful unsupervised statistical technique to identify extreme observations in the periphery of the data cloud, both in classical multivariate data and functional data. However, two questions remain open in this field: the use of ADA for outlier detection and its scalability. We propose to use robust functional archetypoids and adjusted boxplot to pinpoint functional outliers. Furthermore, we present a new archetypoid algorithm for obtaining results from large data sets in reasonable time. Functional time series are occurring in many practical problems, so this paper focuses on functional data settings. The new algorithm for detecting functional anomalies, called CRO-FADALARA, can be used with both univariate and multivariate curves. Our proposal for outlier detection is compared with all the state-of-the-art methods in a controlled study, showing a good performance. Furthermore, CRO-FADALARA is applied to two large time series data sets, where outliers curves are discussed and the reduction in computational time is clearly stated. A third case study with a small ECG data set is discussed, given its importance in functional data scenarios. All data, R code and a new R package are freely available.
引用
收藏
页码:437 / 462
页数:25
相关论文
共 50 条
  • [1] Robust archetypoids for anomaly detection in big functional data
    Vinue, Guillermo
    Epifanio, Irene
    ADVANCES IN DATA ANALYSIS AND CLASSIFICATION, 2021, 15 (02) : 437 - 462
  • [2] Online Anomaly Detection in Big Data
    Balasingam, B.
    Sankavaram, M. S.
    Choi, K.
    Ayala, D. F. M.
    Sidoti, D.
    Pattipati, K.
    Willett, P.
    Lintz, C.
    Commeau, G.
    Dorigo, F.
    Fahrny, J.
    2014 17TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2014,
  • [3] Robust Anomaly Detection Algorithms for Real-time Big Data Comparison of algorithms
    Hasani, Zirije
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 449 - 454
  • [4] Robust Anomaly Detection on Unreliable Data
    Zhao, Zilong
    Cerf, Sophie
    Birke, Robert
    Robu, Bogdan
    Bouchenak, Sara
    Ben Mokhtar, Sonia
    Chen, Lydia Y.
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 630 - 637
  • [5] Anomaly Detection Guidelines for Data Streams in Big Data
    Rana, Annie Ibrahim
    Estrada, Giovani
    Sole, Marc
    Muntes, Victor
    2016 3RD INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE (ISCMI 2016), 2016, : 94 - 98
  • [6] Contextual Anomaly Detection in Big Sensor Data
    Hayes, Michael A.
    Capretz, Miriam A. M.
    2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, : 64 - 71
  • [7] Anomaly Detection for Big Data Security: A Benchmark
    Es-Samaali, Hamza H.
    Outchakoucht, Aissam A.
    Benhadou, Siham S.
    Mounnan, Oussama O.
    Abou El Kalam, Anas A.
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING AND TECHNOLOGY, BDET 2021, 2021, : 35 - 39
  • [8] Big Data Analytics for Anomaly Detection in Blockchain
    Ozbilen, Mahmut Lutfullah
    Ozcan, Elif
    Keles, Mustafa Berk
    Zeybel, Merve
    Dervisoglu, Havanur
    Dogan, Aslinur
    Haklidir, Mehmet
    2023 31ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2023,
  • [9] Perspective of anomaly detection in big data for data quality improvement
    Keskar, Vinaya
    Yadav, Jyoti
    Kumar, Ajay
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 532 - 537
  • [10] Robust Data Model for Enhanced Anomaly Detection
    Reddy, R. Ravinder
    Ramadevi, Y.
    Sunitha, K. V. N.
    PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2015, VOL 2, 2016, 439 : 439 - 446