309
Views
1
CrossRef citations to date
0
Altmetric
Articles

Temporal Characterization and Filtering of Sensor Data to Support Anomaly Detection

ORCID Icon, , &
Pages 475-486 | Received 14 Jan 2021, Accepted 21 Jul 2022, Published online: 12 Oct 2022

References

  • Aggarwal, C. C. (2005), “On Abnormality Detection in Spuriously Populated Data Streams,” in Proceedings of the 2005 SIAM International Conference on Data Mining, pp. 80–91. SIAM. DOI: 10.1137/1.9781611972757.8.
  • Aggarwal, C. C. (2015), “Outlier Analysis,” in Data Mining, pp. 237–263, Cham: Springer.
  • Bishop, C. M. (2006), “Pattern Recognition,” Machine Learning, 128, 610–634.
  • Bolton, R. J., and Hand, D. J. (2002), “Statistical Fraud Detection: A Review,” Statistical Science, 17, 235–249. DOI: 10.1214/ss/1042727940.
  • Breunig, M. M., Kriegel, H.-P., Ng, R. T., and Sander, J. (2000), “Lof: Identifying Density-based Local Outliers,” in ACM Sigmod Record (Vol. 29), pp. 93–104. ACM. DOI: 10.1145/335191.335388.
  • Carnell, R. (2012), LHS: Latin Hypercube Samples. R package version 0.10.
  • Chandola, V., Banerjee, A., and Kumar, V. (2009), “Anomaly Detection: Survey,” ACM Computing Survey, 41, 1–58. DOI: 10.1145/1541880.1541882.
  • Dai, W., Mrkvička, T., Sun, Y., and Genton, M. G. (2020), “Functional Outlier Detection and Taxonomy by Sequential Transformations,” Computational Statistics & Data Analysis, 149, 106960.
  • Dempster, A. P., Laird, N. M., and Rubin, D. B. (1977), “Maximum Likelihood from Incomplete Data via the EM Algorithm,” Journal of the Royal Statistical Society, Series B, 39, 1–38.
  • Djuric, P. M., Kotecha, J. H., Zhang, J., Huang, Y., Ghirmai, T., Bugallo, M. F., and Miguez, J. (2003), “Particle Filtering,” IEEE Signal Processing Magazine, 20, 19–38. DOI: 10.1109/MSP.2003.1236770.
  • Doucet, A., Godsill, S., and Andrieu, C. (2000), “On Sequential Monte Carlo Sampling Methods for Bayesian Filtering,” Statistics and Computing, 10, 197–208.
  • Fearnhead, P., and Clifford, P. (2003), “On-Line Inference for Hidden Markov Models via Particle Filters,” Journal of the Royal Statistical Society, Series B, 65, 887–899. DOI: 10.1111/1467-9868.00421.
  • Gaffney, S. J., and Smyth, P. (2005), “Joint Probabilistic Curve Clustering and Alignment,” in Advances in Neural Information Processing Systems, pp. 473–480.
  • Green, P. J., and Silverman, B. W. (2019), Nonparametric Regression and Generalized Linear Models: A Roughness Penalty Approach, Boca Raton, FL: Chapman and Hall/CRC.
  • Harris, T., Tucker, J. D., Li, B., and Shand, L. (2021), “Elastic Depths for Detecting Shape Anomalies in Functional Data,” Technometrics, 63, 466–476. DOI: 10.1080/00401706.2020.1811156.
  • Hastie, T., and Tibshirani, R. (1987), “Generalized Additive Models: Some Applications,” Journal of the American Statistical Association, 82, 371–386. DOI: 10.1080/01621459.1987.10478440.
  • Kneip, A., and Gasser, T. (1992), “Statistical Tools to Analyze Data Representing a Sample of Curves,” The Annals of Statistics, 20, 1266–1305. DOI: 10.1214/aos/1176348769.
  • Kneip, A., Li, X., MacGibbon, K., and Ramsay, J. (2000), “Curve Registration by Local Regression,” Canadian Journal of Statistics, 28, 19–29. DOI: 10.2307/3315251.n.
  • Lee, W., and Stolfo, S. J. (1998), “Data Mining Approaches for Intrusion Detection,” in Usenix Security.
  • Listgarten, J. (2007), “Analysis of Sibling Time Series Data: Alignment and Difference Detection,” PhD thesis, University of Toronto.
  • Listgarten, J., Neal, R. M., Roweis, S. T., and Emili, A. (2004), “Multiple Alignment of Continuous Time Series,” in Advances in Neural Information Processing Systems, pp. 817–824.
  • Liu, J. S., and Chen, R. (1998), “Sequential Monte Carlo Methods for Dynamic Systems,” Journal of the American Statistical Association, 93, 1032–1044. DOI: 10.1080/01621459.1998.10473765.
  • Liu, X., and Yang, M. C. (2009), “Simultaneous Curve Registration and Clustering for Functional Data,” Computational Statistics & Data Analysis, 53, 1361–1376.
  • Marchette, D. J. (2001), Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint, New York: Springer.
  • Munir, M., Erkel, S., Dengel, A., and Ahmed, S. (2017), “Pattern-based Contextual Anomaly Detection in HVAC Systems,” in 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 1066–1073. IEEE. DOI: 10.1109/ICDMW.2017.150.
  • Pokrajac, D., Lazarevic, A., and Latecki, L. J. (2007), “Incremental Local Outlier Detection for Data Streams,” in 2007 IEEE Symposium on Computational Intelligence and Data Mining, pp. 504–515. IEEE. DOI: 10.1109/CIDM.2007.368917.
  • Qiu, P. (2013), Introduction to Statistical Process Control, Boca Raton, FL: CRC Press.
  • Ramsay, J. O. (2006), Functional Data Analysis. Wiley Online Library.
  • Ramsay, J. O., and Li, X. (1998), “Curve Registration,” Journal of the Royal Statistical Society, Series B, 60, 351–363. DOI: 10.1111/1467-9868.00129.
  • Sakoe, H., and Chiba, S. (1978), “Dynamic Programming Algorithm Optimization for Spoken Word Recognition,” IEEE Transactions on Acoustics, Speech, and Signal Processing, 26, 43–49. DOI: 10.1109/TASSP.1978.1163055.
  • Tsay, R. S. (1988), “Outliers, Level Shifts, and Variance Changes in Time Series,” Journal of Forecasting, 7, 1–20. DOI: 10.1002/for.3980070102.
  • Xu, Y., Yan, C., Shi, J., Lu, Z., Niu, X., Jiang, Y., and Zhu, F. (2021), “An Anomaly Detection and Dynamic Energy Performance Evaluation Method for HVAC Systems based on Data Mining,”’ Sustainable Energy Technologies and Assessments, 44, 101092. DOI: 10.1016/j.seta.2021.101092.
  • Yan, H., Paynabar, K., and Shi, J. (2017), “Anomaly Detection in Images with Smooth Background via Smooth-Sparse Decomposition,” Technometrics, 59, 102–114. DOI: 10.1080/00401706.2015.1102764.
  • Zhou, X., Yang, T., Liang, L., Zi, X., Yan, J., and Pan, D. (2021), “Anomaly Detection Method of Daily Energy Consumption Patterns for Central Air Conditioning Systems,” Journal of Building Engineering, 38, 102179. DOI: 10.1016/j.jobe.2021.102179.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.