Neural-Inspired Anomaly Detection
Anomaly detection is an important problem in various fields of complex systems research including image processing, data analysis, physical security and cybersecurity. In image processing, it is used for removing noise while preserving image quality, and in data analysis, physical security and cybersecurity, it is used to find interesting data points, objects or events in a vast sea of information. Anomaly detection will continue to be an important problem in domains intersecting with “Big Data”. In this paper we provide a novel algorithm for anomaly detection that uses phase-coded spiking neurons as basic computational elements.
This paper describes objective technical results and analysis. Any subjective views or opinions that might be expressed in the paper do not necessarily represent the views of the U.S. Department of Energy or the United States Government. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International, Inc., for the U. S. Department of Energy’s National Nuclear Security Administration under Contract DE-NA0003525. SAND No. 2018-5891 C.
- 6.Honda, T., Nayar, S.K.: Finding “anomalies” in an arbitrary image. In: Proceedings of the Eighth IEEE International Conference on Computer Vision, (ICCV), pp. 516–523. IEEE (2001). https://doi.org/10.1109/ICCV.2001.937669
- 10.Stubbs, J.J., Birch, G.C., Woo, B.L., Kouhestani, C.G.: Physical security assessment with convolutional neural network transfer learning. In: Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST). IEEE (2017). https://doi.org/10.1109/CCST.2017.8167800
- 11.Teng, H.S., Chen, K., Lu, S.C.Y.: Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 278–284. IEEE (1990). https://doi.org/10.1109/RISP.1990.63857
- 12.Tomasi, C., Manduchi, R.: Bilateral filtering for gray and color images. In: Proceedings of the Sixth International Conference on Computer Vision (IEEE Cat. No. 98CH36271), pp. 839–846. IEEE (1998). https://doi.org/10.1109/ICCV.1998.710815
- 13.Verzi, S.J., Rothganger, F., Parekh, O.D., Quach, T.T., Miner, N.E., James, C.D., Aimone, J.B.: Computing with spikes: the advantage of fine-grained timing (Accepted)Google Scholar
- 14.Verzi, S.J., Vineyard, C.M., Vugrin, E.D., Galiardi, M., James, C.D., Aimone, J.B.: Optimization-based computation with spiking neurons. In: Proceedings of the IEEE 2017 International Joint Conference on Neural Network (IJCNN), pp. 2015–2022. IEEE(2017). https://doi.org/10.1109/IJCNN.2017.7966098
- 15.Woo, B.L., Birch, G.C., Stubbs, J.J., Kouhestani, C.G.: Unmanned aerial system detection and assessment through temporal frequency analysis. In: Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST). IEEE (2017). https://doi.org/10.1109/CCST.2017.8167832