[1] AGGARWAL C C. Outlier Analysis[M]. 2nd ed. Cham:Springer,2017:286-286. [2] 王珂, 惠新成, 张遥. 近岸海上安保快艇拦截任务分配模型[J]. 指挥信息系统与技术,2018,9(1):33-38.(WANG K,HUI X C, ZHANG Y. Interception task assignment model for coast guard boats in offshore area[J]. Command Information System and Technology,2018,9(1):33-38.) [3] 郑浩, 王伟, 萨出拉. 基于误差检测的杂波点迹过滤技术[J]. 指挥信息系统与技术,2019,10(4):72-76.(ZHENG H,WANG W,SA C L. Clutter plot filtering technology based on error detecting[J]. Command Information System and Technology,2019,10(4):72-76.) [4] ZHI H,BAH M J,HAMMAD M. Progress in outlier detection techniques:a survey[J]. IEEE Access,2019,7:107964-108000. [5] XU X,LIU W,YAO M. Recent progress of anomaly detection[J]. Complexity,2019,2019:No. 2686378. [6] ZHANG E,ZHANG Y. Average precision[M]//LIU L,ÖZSU M T. Encyclopedia of Database Systems. Boston:Springer,2009:192-193. [7] CAMPOS G O,ZIMEK A,SANDER J,et al. On the evaluation of unsupervised outlier detection:measures, datasets, and an empirical study[J]. Data Mining and Knowledge Discovery,2016, 30(4):891-927. [8] KLEMENT W,FLACH P,JAPKOWICZ N,et al. Smooth Receiver Operating Characteristics(smROC)curves[C]//Proceedings of the 2011 Joint European Conference on Machine Learning and Knowledge Discovery in Databases,LNCS 6912. Berlin:Springer, 2011:193-208. [9] MARQUES H O,CAMPELLO R J G B,ZIMEK A,et al. On the internal evaluation of unsupervised outlier detection[C]//Proceedings of the 27th International Conference on Scientific and Statistical Database Management. New York:ACM,2015:No. 7. [10] HAN J, KAMBER M, PEI J. Data Mining:Concepts and Techniques[M]. 3rd ed. Burlington,MA:Morgan Kaufmann Publishers,2011:351-376. [11] FAN H,ZAÏANE O R,FOSS A,et al. Resolution-based outlier factor:detecting the top-n most outlying data points in engineering data[J]. Knowledge and Information Systems,2009,19(1):31-51. [12] FALCÃO F, ZOPPI T, SILVA C B V, et al. Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection[C]//Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. New York:ACM,2019:318-327. [13] FENG F,LIU X,YONG B,et al. Anomaly detection in ad-hoc networks based on deep learning model:a plug and play device[J]. Ad Hoc Networks,2019,84:82-89. [14] KOUFAKOU A,GEORGIOPOULOS M. A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes[J]. Data Mining and Knowledge Discovery,2010,20(2):259-289. [15] TAMA B A,RHEE K H. An in-depth experimental study of anomaly detection using gradient boosted machine[J]. Neural Computing and Applications,2019,31(4):955-965. [16] BHATTACHARYA G,GHOSH K,CHOWDHURY A S. Outlier detection using neighborhood rank difference[J]. Pattern Recognition Letters,2015,60/61:24-31. [17] HUANG J,ZHU Q,YANG J,et al. A non-parameter outlier detection algorithm based on Natural Neighbor[J]. KnowledgeBased Systems,2016,92:71-77. [18] NARITA K,KITAGAWA H. Outlier detection for transaction databases using association rules[C]//Proceedings of the 9th International Conference on Web-Age Information Management. Piscataway:IEEE,2008:373-380. [19] HANLEY J A,MCNEIL B J. The meaning and use of the area under a Receiver Operating Characteristic (ROC) curve[J]. Radiology,1982,143(1):29-36. [20] ZHANG J,LI Z,NAI K,et al. DELR:a double-level ensemble learning method for unsupervised anomaly detection[J]. Knowledge-Based Systems,2019,181:No. 104783. [21] GAUTAM C,BALAJI R,SUDHARSAN K,et al. Localized multiple kernel learning for anomaly detection:one-class classification[J]. Knowledge-Based Systems, 2019, 165:241-252. [22] KIEU T,YANG B,GUO C,et al. Outlier detection for time series with recurrent autoencoder ensembles[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence. Palo Alto,CA:AAAI Press,2019:2725-2732. [23] CHOUHAN N,KHAN A,KHAN H U R. Network anomaly detection using channel boosted and residual learning based deep convolutional neural network[J]. Applied Soft Computing,2019, 83:No. 105612. [24] CHENG L,WANG Y,MA X. A Neural Probabilistic outlier detection method for categorical data[J]. Neurocomputing,2019, 365:325-335. [25] DUTTA J K,BANERJEE B. Improved outlier detection using sparse coding-based methods[J]. Pattern Recognition Letters, 2019,122:99-105. [26] ASUNCION A U,NEWMAN D J. UCI machine learning repository[EB/OL].[2019-07-11]. http://www.ics.uci.edu/~mlearn/MLRepository.html. [27] HA J,SEOK S,LEE J S. Robust outlier detection using the instability factor[J]. Knowledge-Based Systems, 2014, 63:15-23. |