Skip to main content

Contextual Anomaly Detection Using Log-Linear Tensor Factorization

  • Conference paper
  • First Online:
Advances in Knowledge Discovery and Data Mining (PAKDD 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9078))

Included in the following conference series:

  • 4198 Accesses

Abstract

This paper presents a novel approach for the detection of contextual anomalies. This approach, based on log-linear tensor factorization, considers a stream of discrete events, each representing the co-occurence of contextual elements, and detects events with low-probability. A parametric model is used to learn the joint probability of contextual elements, in which the parameters are the factors of the event tensor. An efficient method, based on Nesterov’s accelerated gradient ascent, is proposed to learn these parameters. The proposed approach is evaluated on the low-rank approximation of tensors, the prediction of future of events and the detection of events representing abnormal behaviors. Results show our method to outperform state of the art approaches for these problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bader, B.W., Berry, M.W., Browne, M.: Discussion tracking in enron email using parafac. In: Survey of Text Mining II, pp. 147–163. Springer (2008)

    Google Scholar 

  2. Bader, B.W., Kolda, T.G., et al.: Matlab tensor toolbox version 2.5 (2012). http://www.sandia.gov/~tgkolda/TensorToolbox/

  3. Benezeth, Y., Jodoin, P.M., Saligrama, V., Rosenberger, C.: Abnormal events detection based on spatio-temporal co-occurences. In: IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), pp. 2458–2465 (2009)

    Google Scholar 

  4. Chi, E.C., Kolda, T.G.: On tensors, sparsity, and nonnegative factorizations. SIAM Journal on Matrix Analysis and Applications 33(4), 1272–1299 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  5. Chung, P.C., Liu, C.D.: A daily behavior enabled hidden markov model for human behavior understanding. Pattern Recognition 41(5), 1572–1580 (2008)

    Article  MATH  Google Scholar 

  6. Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal and Ubiquitous Computing 10(4), 255–268 (2006)

    Article  Google Scholar 

  7. Hara, K., Omori, T., Ueno, R.: Detection of unusual human behavior in intelligent house. In: 12th IEEE Workshop on Neural Networks for Signal Processing, pp. 697–706 (2002)

    Google Scholar 

  8. Hayashi, K., Takenouchi, T., Shibata, T., Kamiya, Y., Kato, D., Kunieda, K., Yamada, K., Ikeda, K.: Exponential family tensor factorization for missing-values prediction and anomaly detection. In: 10th IEEE Int. Conf. on Data Mining (ICDM), pp. 216–225 (2010)

    Google Scholar 

  9. Hu, D.H., Zhang, X.X., Yin, J., Zheng, V.W., Yang, Q.: Abnormal activity recognition based on hdp-hmm models. In: IJCAI, pp. 1715–1720 (2009)

    Google Scholar 

  10. Jiang, F., Yuan, J., Tsaftaris, S.A., Katsaggelos, A.K.: Anomalous video event detection using spatiotemporal context. Computer Vision and Image Understanding 115(3), 323–333 (2011)

    Article  Google Scholar 

  11. Kim, H., Lee, S., Ma, X., Wang, C.: Higher-order PCA for anomaly detection in large-scale networks. In: 3rd IEEE Int. Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), pp. 85–88 (2009)

    Google Scholar 

  12. Kolda, T., Bader, B.: Tensor decompositions and applications. SIAM Review 51(3), 455–500 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  13. Latecki, L.J., Lazarevic, A., Pokrajac, D.: Outlier detection with kernel density functions. In: Perner, P. (ed.) MLDM 2007. LNCS (LNAI), vol. 4571, pp. 61–75. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Li, C., Han, Z., Ye, Q., Jiao, J.: Abnormal behavior detection via sparse reconstruction analysis of trajectory. In: 6th IEEE Int. Conf. on Image and Graphics (ICIG), pp. 807–810 (2011)

    Google Scholar 

  15. Nesterov, Y.: Gradient methods for minimizing composite functions. Mathematical Programming 140(1), 125–161 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  16. Piciarelli, C., Micheloni, C., Foresti, G.L.: Trajectory-based anomalous event detection. Circuits and Systems for Video Technology 18(11), 1544–1554 (2008)

    Article  Google Scholar 

  17. Rendle, S., Gantner, Z., Freudenthaler, C., Schmidt-Thieme, L.: Fast context-aware recommendations with factorization machines. In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 635–644. ACM (2011)

    Google Scholar 

  18. Sillito, R.R., Fisher, R.B.: Semi-supervised learning for anomalous trajectory detection. In: BMVC, pp. 1–10 (2008)

    Google Scholar 

  19. Sun, J., Tao, D., Faloutsos, C.: Beyond streams and graphs: dynamic tensor analysis. In: 12th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 374–383 (2006)

    Google Scholar 

  20. Tork, H.F., Oliveira, M., Gama, J., Malinowski, S., Morla, R.: Event and anomaly detection using tucker3 decomposition. In: Workshop on Ubiquitous Data Mining, p. 8 (2012)

    Google Scholar 

  21. Welling, M., Weber, M.: Positive tensor factorization. Pattern Recognition Letters 22(12), 1255–1261 (2001)

    Article  MATH  Google Scholar 

  22. Yuan, J., Zheng, Y., Xie, X., Sun, G.: Driving with knowledge from the physical world. In: 17th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 316–324 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alpa Jayesh Shah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Shah, A.J., Desrosiers, C., Sabourin, R. (2015). Contextual Anomaly Detection Using Log-Linear Tensor Factorization. In: Cao, T., Lim, EP., Zhou, ZH., Ho, TB., Cheung, D., Motoda, H. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2015. Lecture Notes in Computer Science(), vol 9078. Springer, Cham. https://doi.org/10.1007/978-3-319-18032-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18032-8_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18031-1

  • Online ISBN: 978-3-319-18032-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics