ITERATIVE ANOMALY DETECTION

被引:0
|
作者
Wang, Yulei [1 ,2 ,3 ]
Xue, Bai [1 ,4 ]
Wang, Lin [5 ]
Li, Hsiao-Chi [6 ]
Lee, Li-Chien [4 ]
Yu, Chunyan [1 ]
Song, Meiping [1 ,2 ]
Li, Sen [1 ]
Chang, Chein-I [1 ]
机构
[1] Dalian Maritime Univ, Informat & Technol Coll, Dalian, Peoples R China
[2] State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[3] Chinese Acad Sci, Key Lab Spectral Imaging Technol, Xian, Shaanxi, Peoples R China
[4] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21228 USA
[5] Xidian Univ, Sch Phys & Optoelect Engn, Xian, Shaanxi, Peoples R China
[6] Fu Jen Catholic Univ, Dept Comp Sci & Informat Engn, New Taipei 242, Taiwan
关键词
Anomaly detection (AD); Iterative AD (IAD);
D O I
暂无
中图分类号
P [天文学、地球科学];
学科分类号
07 ;
摘要
Anomaly detection (AD) is designed to find targets that are spectrally distinct from their surrounding neighborhood. Unfortunately, commonly used anomaly detectors generally do not take into account its surrounding spatial information. This paper derives an iterative version of anomaly detection, iterative anomaly detection (IAD) to address this issue. Its idea is to use a Gaussian filter to capture spatial information of the anomaly detection map and then feeds back the Gaussian filtered AD map to create a new data cube. The whole process is repeated over again in an iterative manner. When IAD is terminated anomaly representatives are identified and can be used as desired target signatures to implement constrain energy minimization (CEM) so as to classify all detected anomalies. Accordingly, IAD can be considered as anomaly classification.
引用
收藏
页码:586 / 589
页数:4
相关论文
共 50 条
  • [41] Anomaly detection based Intrusion Detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 420 - +
  • [42] Iterative multiuser detection
    Damnjanovic, AD
    Vojcic, BR
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2001, 3 (03) : 211 - 218
  • [43] Deep Anomaly Analytics: Advancing the Frontier of Anomaly Detection
    Xia, Feng
    Akoglu, Leman
    Aggarwal, Charu
    Liu, Huan
    IEEE INTELLIGENT SYSTEMS, 2023, 38 (02) : 32 - 35
  • [44] Target-to-Anomaly Conversion for Hyperspectral Anomaly Detection
    Chang, Chein-, I
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2022, 60
  • [45] Anomaly Detection of Metro Station Tracks Based on Sequential Updatable Anomaly Detection Framework
    Zheng, Zhongxing
    Liu, Weiming
    Liu, Ruikang
    Wang, Liang
    Mao, Liang
    Qiu, Qisheng
    Ling, Guangzheng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (11) : 7677 - 7691
  • [46] TECHNIQUE FOR IMPROVED CONVERGENCE IN ITERATIVE ANALYSIS OF GRAVITY ANOMALY PROFILES
    FOURNIER, KP
    KRUPICKA, SF
    GEOPHYSICS, 1973, 38 (03) : 500 - 506
  • [47] Underwater localization iterative algorithm based on geomagnetic anomaly inversion
    Huang Yu
    Wu Li-Hua
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 687 - 690
  • [48] Detection of Network Intrusions Using Anomaly Detection
    Macedo, Andre Manuel
    Magalhaes, Joao Paulo
    2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [49] A novel immune detection algorithm for anomaly detection
    Zhang, YJ
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL & 13TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1 AND 2, 2005, : 1441 - 1446
  • [50] REDUCING ANOMALY DETECTION IN IMAGES TO DETECTION IN NOISE
    Davy, Axel
    Ehret, Thibaud
    Morel, Jean-Michel
    Delbracio, Mauricio
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2018, : 1058 - 1062