Neural-Inspired Anomaly Detection

  • Stephen J. VerziEmail author
  • Craig M. Vineyard
  • James B. Aimone
Conference paper
Part of the Springer Proceedings in Complexity book series (SPCOM)


Anomaly detection is an important problem in various fields of complex systems research including image processing, data analysis, physical security and cybersecurity. In image processing, it is used for removing noise while preserving image quality, and in data analysis, physical security and cybersecurity, it is used to find interesting data points, objects or events in a vast sea of information. Anomaly detection will continue to be an important problem in domains intersecting with “Big Data”. In this paper we provide a novel algorithm for anomaly detection that uses phase-coded spiking neurons as basic computational elements.



This paper describes objective technical results and analysis. Any subjective views or opinions that might be expressed in the paper do not necessarily represent the views of the U.S. Department of Energy or the United States Government. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International, Inc., for the U. S. Department of Energy’s National Nuclear Security Administration under Contract DE-NA0003525. SAND No. 2018-5891 C.


  1. 1.
    Chang, C.I., Chiang, S.S.: Anomaly detection and classification for hyperspectral imagery. IEEE Trans. Geosci. Remote Sens. 40(6), 1314–1325 (2002). Scholar
  2. 2.
    Chen, T., Wu, H.R.: Adaptive impulse detection using center-weighted median filters. IEEE Signal Process. Lett. 8(1), 1–3 (2001). Scholar
  3. 3.
    Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE–13(2), 222–232 (1987). Scholar
  4. 4.
    Dong, Y., Chan, R.H., Xu, S.: A detection statistic for random-valued impulse noise. IEEE Trans. Image Process. 16(4), 1112–1120 (2007). Scholar
  5. 5.
    Garnett, R., Huegerich, T., Chui, C., He, W.: A universal noise removal algorithm with an impulse detector. IEEE Trans. Image Process. 14(11), 1747–1754 (2005). Scholar
  6. 6.
    Honda, T., Nayar, S.K.: Finding “anomalies” in an arbitrary image. In: Proceedings of the Eighth IEEE International Conference on Computer Vision, (ICCV), pp. 516–523. IEEE (2001).
  7. 7.
    Jolivet, R., Lewis, T.J., Gerstner, W.: Generalized integrate-and-fire-models of neuronal activity approximate spike trains of a detailed model to a high degree of accuracy. J. Neurophysiol. 92(2), 959–976 (2004). Scholar
  8. 8.
    Muthukrishnan, R., Poonkuzhali, G.: A comprehensive survey on outlier detection methods. Am. Eurasian J. Sci. Res. 12(3), 161–171 (2017). Scholar
  9. 9.
    Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51, 3448–3470 (2007). Scholar
  10. 10.
    Stubbs, J.J., Birch, G.C., Woo, B.L., Kouhestani, C.G.: Physical security assessment with convolutional neural network transfer learning. In: Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST). IEEE (2017).
  11. 11.
    Teng, H.S., Chen, K., Lu, S.C.Y.: Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 278–284. IEEE (1990).
  12. 12.
    Tomasi, C., Manduchi, R.: Bilateral filtering for gray and color images. In: Proceedings of the Sixth International Conference on Computer Vision (IEEE Cat. No. 98CH36271), pp. 839–846. IEEE (1998).
  13. 13.
    Verzi, S.J., Rothganger, F., Parekh, O.D., Quach, T.T., Miner, N.E., James, C.D., Aimone, J.B.: Computing with spikes: the advantage of fine-grained timing (Accepted)Google Scholar
  14. 14.
    Verzi, S.J., Vineyard, C.M., Vugrin, E.D., Galiardi, M., James, C.D., Aimone, J.B.: Optimization-based computation with spiking neurons. In: Proceedings of the IEEE 2017 International Joint Conference on Neural Network (IJCNN), pp. 2015–2022. IEEE(2017).
  15. 15.
    Woo, B.L., Birch, G.C., Stubbs, J.J., Kouhestani, C.G.: Unmanned aerial system detection and assessment through temporal frequency analysis. In: Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST). IEEE (2017).
  16. 16.
    Yan, M.: Restoration of images corrupted by impulse noise and mixed Gaussian impulse noise using blind inpainting. SIAM J. Imaging Sci. 6(3), 1227–1245 (2013). Scholar
  17. 17.
    Zhu, Y., Huang, C.: An improved median filtering algorithm for image noise reduction. Phys. Procedia 25, 609–616 (2012). Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Stephen J. Verzi
    • 1
    Email author
  • Craig M. Vineyard
    • 1
  • James B. Aimone
    • 1
  1. 1.Sandia National LaboratoriesAlbuauerqueUSA

Personalised recommendations