@article{anomaly_detection_survey, author = {Chandola, Varun and Banerjee, Arindam and Kumar, Vipin}, title = {Anomaly detection: A survey}, year = {2009}, issue_date = {July 2009}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {41}, number = {3}, issn = {0360-0300}, url = {https://doi.org/10.1145/1541880.1541882}, doi = {10.1145/1541880.1541882}, abstract = {Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal and anomalous behavior. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. For each category, we provide a basic anomaly detection technique, and then show how the different existing techniques in that category are variants of the basic technique. This template provides an easier and more succinct understanding of the techniques belonging to each category. Further, for each category, we identify the advantages and disadvantages of the techniques in that category. We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains. We hope that this survey will provide a better understanding of the different directions in which research has been done on this topic, and how techniques developed in one area can be applied in domains for which they were not intended to begin with.}, journal = {ACM Comput. Surv.}, month = jul, articleno = {15}, numpages = {58}, keywords = {outlier detection, Anomaly detection}, }, @dataset{alexander_kyuroson_2023_7913307, author = {Alexander Kyuroson and Niklas Dahlquist and Nikolaos Stathoulopoulos and Vignesh Kottayam Viswanathan and Anton Koval and George Nikolakopoulos}, title = {Multimodal Dataset from Harsh Sub-Terranean Environment with Aerosol Particles for Frontier Exploration }, month = may, year = 2023, publisher = {Zenodo}, version = {v1}, doi = {10.5281/zenodo.7913307}, url = {https://doi.org/10.5281/zenodo.7913307}, }, @article{deepsad, author = {Lukas Ruff and Robert A. Vandermeulen and Nico G{\"{o}}rnitz and Alexander Binder and Emmanuel M{\"{u}}ller and Klaus{-}Robert M{\"{u} }ller and Marius Kloft}, title = {Deep Semi-Supervised Anomaly Detection}, journal = {CoRR}, volume = {abs/1906.02694}, year = {2019}, url = {http://arxiv.org/abs/1906.02694}, eprinttype = {arXiv}, eprint = {1906.02694}, timestamp = {Thu, 13 Jun 2019 13:36:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-02694.bib}, bibsource = {dblp computer science bibliography, https://dblp.org}, }, @inproceedings{subter, title = {Multimodal Dataset from Harsh Sub-Terranean Environment with Aerosol Particles for Frontier Exploration}, url = {http://dx.doi.org/10.1109/MED59994.2023.10185906}, DOI = {10.1109/med59994.2023.10185906}, booktitle = {2023 31st Mediterranean Conference on Control and Automation (MED)}, publisher = {IEEE}, author = {Kyuroson, Alexander and Dahlquist, Niklas and Stathoulopoulos, Nikolaos and Viswanathan, Vignesh Kottayam and Koval, Anton and Nikolakopoulos, George}, year = {2023}, month = jun, pages = {716–721}, } , @inproceedings{deepsvdd, title = {Deep One-Class Classification}, author = {Ruff, Lukas and Vandermeulen, Robert and Goernitz, Nico and Deecke, Lucas and Siddiqui, Shoaib Ahmed and Binder, Alexander and M{\"u}ller , Emmanuel and Kloft, Marius}, booktitle = {Proceedings of the 35th International Conference on Machine Learning}, pages = {4393--4402}, year = {2018}, editor = {Dy, Jennifer and Krause, Andreas}, volume = {80}, series = {Proceedings of Machine Learning Research}, month = {10--15 Jul}, publisher = {PMLR}, pdf = {http://proceedings.mlr.press/v80/ruff18a/ruff18a.pdf}, url = {https://proceedings.mlr.press/v80/ruff18a.html}, abstract = {Despite the great advances made by deep learning in many machine learning problems, there is a relative dearth of deep learning approaches for anomaly detection. Those approaches which do exist involve networks trained to perform a task other than anomaly detection, namely generative models or compression, which are in turn adapted for use in anomaly detection; they are not trained on an anomaly detection based objective. In this paper we introduce a new anomaly detection method—Deep Support Vector Data Description—, which is trained on an anomaly detection based objective. The adaptation to the deep regime necessitates that our neural network and training procedure satisfy certain properties, which we demonstrate theoretically. We show the effectiveness of our method on MNIST and CIFAR-10 image benchmark datasets as well as on the detection of adversarial examples of GTSRB stop signs.}, }, @inproceedings{pmlr-v80-ruff18a, title = {Deep One-Class Classification}, author = {Ruff, Lukas and Vandermeulen, Robert and Goernitz, Nico and Deecke, Lucas and Siddiqui, Shoaib Ahmed and Binder, Alexander and M{\"u}ller , Emmanuel and Kloft, Marius}, booktitle = {Proceedings of the 35th International Conference on Machine Learning}, pages = {4393--4402}, year = {2018}, editor = {Dy, Jennifer and Krause, Andreas}, volume = {80}, series = {Proceedings of Machine Learning Research}, month = {10--15 Jul}, publisher = {PMLR}, pdf = {http://proceedings.mlr.press/v80/ruff18a/ruff18a.pdf}, url = {https://proceedings.mlr.press/v80/ruff18a.html}, abstract = {Despite the great advances made by deep learning in many machine learning problems, there is a relative dearth of deep learning approaches for anomaly detection. Those approaches which do exist involve networks trained to perform a task other than anomaly detection, namely generative models or compression, which are in turn adapted for use in anomaly detection; they are not trained on an anomaly detection based objective. In this paper we introduce a new anomaly detection method—Deep Support Vector Data Description—, which is trained on an anomaly detection based objective. The adaptation to the deep regime necessitates that our neural network and training procedure satisfy certain properties, which we demonstrate theoretically. We show the effectiveness of our method on MNIST and CIFAR-10 image benchmark datasets as well as on the detection of adversarial examples of GTSRB stop signs.}, }, @inproceedings{anomaly_detection_medical, author = {{Wei}, Qi and {Ren}, Yinhao and {Hou}, Rui and {Shi}, Bibo and {Lo}, Joseph Y. and {Carin}, Lawrence}, title = "{Anomaly detection for medical images based on a one-class classification}", booktitle = {Medical Imaging 2018: Computer-Aided Diagnosis}, year = 2018, editor = {{Petrick}, Nicholas and {Mori}, Kensaku}, series = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series}, volume = {10575}, month = feb, eid = {105751M}, pages = {105751M}, doi = {10.1117/12.2293408}, adsurl = {https://ui.adsabs.harvard.edu/abs/2018SPIE10575E..1MW}, adsnote = {Provided by the SAO/NASA Astrophysics Data System}, }, @article{anomaly_detection_defi, author = {Ul Hassan, Muneeb and Rehmani, Mubashir Husain and Chen, Jinjun}, journal = {IEEE Communications Surveys \& Tutorials}, title = {Anomaly Detection in Blockchain Networks: A Comprehensive Survey}, year = {2023}, volume = {25}, number = {1}, pages = {289-318}, keywords = {Blockchains;Anomaly detection;Security;Smart contracts;Privacy;Bitcoin;Tutorials;Blockchain;anomaly detection;fraud detection}, doi = {10.1109/COMST.2022.3205643}, } , @article{anomaly_detection_manufacturing, AUTHOR = {Oh, Dong Yul and Yun, Il Dong}, TITLE = {Residual Error Based Anomaly Detection Using Auto-Encoder in SMD Machine Sound}, JOURNAL = {Sensors}, VOLUME = {18}, YEAR = {2018}, NUMBER = {5}, ARTICLE-NUMBER = {1308}, URL = {https://www.mdpi.com/1424-8220/18/5/1308}, PubMedID = {29695084}, ISSN = {1424-8220}, ABSTRACT = {Detecting an anomaly or an abnormal situation from given noise is highly useful in an environment where constantly verifying and monitoring a machine is required. As deep learning algorithms are further developed, current studies have focused on this problem. However, there are too many variables to define anomalies, and the human annotation for a large collection of abnormal data labeled at the class-level is very labor-intensive. In this paper, we propose to detect abnormal operation sounds or outliers in a very complex machine along with reducing the data-driven annotation cost. The architecture of the proposed model is based on an auto-encoder, and it uses the residual error, which stands for its reconstruction quality, to identify the anomaly. We assess our model using Surface-Mounted Device (SMD) machine sound, which is very complex, as experimental data, and state-of-the-art performance is successfully achieved for anomaly detection.}, DOI = {10.3390/s18051308}, }, @article{anomaly_detection_history, author = {F.Y. Edgeworth and}, title = {XLI. On discordant observations }, journal = {The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science}, volume = {23}, number = {143}, pages = {364--375}, year = {1887}, publisher = {Taylor \& Francis}, doi = {10.1080/14786448708628471}, URL = { https://doi.org/10.1080/14786448708628471 }, eprint = { https://doi.org/10.1080/14786448708628471 }, }, @inproceedings{degradation_quantification_rain, author = {Zhang, Chen and Huang, Zefan and Ang, Marcelo H. and Rus, Daniela}, booktitle = {2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)}, title = {LiDAR Degradation Quantification for Autonomous Driving in Rain}, year = {2021}, volume = {}, number = {}, pages = {3458-3464}, keywords = {Degradation;Location awareness;Laser radar;Rain;Codes;System performance;Current measurement}, doi = {10.1109/IROS51168.2021.9636694}, }, @article{deep_learning_overview, title = {Deep learning in neural networks: An overview}, journal = {Neural Networks}, volume = {61}, pages = {85-117}, year = {2015}, issn = {0893-6080}, doi = {https://doi.org/10.1016/j.neunet.2014.09.003}, url = {https://www.sciencedirect.com/science/article/pii/S0893608014002135}, author = {Jürgen Schmidhuber}, keywords = {Deep learning, Supervised learning, Unsupervised learning, Reinforcement learning, Evolutionary computation}, abstract = {In recent years, deep artificial neural networks (including recurrent ones) have won numerous contests in pattern recognition and machine learning. This historical survey compactly summarizes relevant work, much of it from the previous millennium. Shallow and Deep Learners are distinguished by the depth of their credit assignment paths, which are chains of possibly learnable, causal links between actions and effects. I review deep supervised learning (also recapitulating the history of backpropagation), unsupervised learning, reinforcement learning & evolutionary computation, and indirect search for short programs encoding deep and large networks.}, }, @article{autoencoder_survey, title = {A comprehensive survey on design and application of autoencoder in deep learning}, journal = {Applied Soft Computing}, volume = {138}, pages = {110176}, year = {2023}, issn = {1568-4946}, doi = {https://doi.org/10.1016/j.asoc.2023.110176}, url = {https://www.sciencedirect.com/science/article/pii/S1568494623001941}, author = {Pengzhi Li and Yan Pei and Jianqiang Li}, keywords = {Deep learning, Autoencoder, Unsupervised learning, Feature extraction, Autoencoder application}, abstract = {Autoencoder is an unsupervised learning model, which can automatically learn data features from a large number of samples and can act as a dimensionality reduction method. With the development of deep learning technology, autoencoder has attracted the attention of many scholars. Researchers have proposed several improved versions of autoencoder based on different application fields. First, this paper explains the principle of a conventional autoencoder and investigates the primary development process of an autoencoder. Second, We proposed a taxonomy of autoencoders according to their structures and principles. The related autoencoder models are comprehensively analyzed and discussed. This paper introduces the application progress of autoencoders in different fields, such as image classification and natural language processing, etc. Finally, the shortcomings of the current autoencoder algorithm are summarized, and prospected for its future development directions are addressed.}, }, @article{semi_overview, author = {Yang, Xiangli and Song, Zixing and King, Irwin and Xu, Zenglin}, journal = {IEEE Transactions on Knowledge and Data Engineering}, title = {A Survey on Deep Semi-Supervised Learning}, year = {2023}, volume = {35}, number = {9}, pages = {8934-8954}, keywords = {Semisupervised learning;Training;Taxonomy;Task analysis;Deep learning;Data models;Supervised learning;Deep semi-supervised learning;semi-supervised learning;deep learning}, doi = {10.1109/TKDE.2022.3220219}, }, @book{ai_fundamentals_book, title = {Fundamentals of Artificial Intelligence}, url = {http://dx.doi.org/10.1007/978-81-322-3972-7}, DOI = {10.1007/978-81-322-3972-7}, publisher = {Springer India}, author = {Chowdhary, K.R.}, year = {2020}, language = {en}, }, @article{machine_learning_overview, title = {Machine Learning from Theory to Algorithms: An Overview}, volume = {1142}, ISSN = {1742-6596}, url = {http://dx.doi.org/10.1088/1742-6596/1142/1/012012}, DOI = {10.1088/1742-6596/1142/1/012012}, journal = {Journal of Physics: Conference Series}, publisher = {IOP Publishing}, author = {Alzubi, Jafar and Nayyar, Anand and Kumar, Akshi}, year = {2018}, month = nov, pages = {012012}, }, @article{machine_learning_first_definition, title = {Some Studies in Machine Learning Using the Game of Checkers}, volume = {3}, ISSN = {0018-8646}, url = {http://dx.doi.org/10.1147/rd.33.0210}, DOI = {10.1147/rd.33.0210}, number = {3}, journal = {IBM Journal of Research and Development}, publisher = {IBM}, author = {Samuel, A. L.}, year = {1959}, month = jul, pages = {210–229}, }, @inproceedings{bg_ad_pointclouds_scans, title = {Anomaly Detection in 3D Point Clouds using Deep Geometric Descriptors }, url = {http://dx.doi.org/10.1109/WACV56688.2023.00264}, DOI = {10.1109/wacv56688.2023.00264}, booktitle = {2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)}, publisher = {IEEE}, author = {Bergmann, Paul and Sattlegger, David}, year = {2023}, month = jan, pages = {2612–2622}, }, @article{bg_ad_pointclouds_poles, title = {Automatic Detection and Classification of Pole-Like Objects in Urban Point Cloud Data Using an Anomaly Detection Algorithm}, volume = {7}, ISSN = {2072-4292}, url = {http://dx.doi.org/10.3390/rs71012680}, DOI = {10.3390/rs71012680}, number = {10}, journal = {Remote Sensing}, publisher = {MDPI AG}, author = {Rodríguez-Cuenca, Borja and García-Cortés, Silverio and Ordóñez, Celestino and Alonso, Maria}, year = {2015}, month = sep, pages = {12680–12703}, }