Skip to main content

Mining High Impact Exceptional Behavior Patterns

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4819))

Abstract

In the real world, exceptional behavior can be seen in many situations such as security-oriented fields. Such behavior is rare and dispersed, while some of them may be associated with significant impact on the society. A typical example is the event September 11. The key feature of the above rare but significant behavior is its high potential to be linked with some significant impact. Identifying such particular behavior before generating impact on the world is very important. In this paper, we develop several types of high impact exceptional behavior patterns. The patterns include frequent behavior patterns which are associated with either positive or negative impact, and frequent behavior patterns that lead to both positive and negative impact. Our experiments in mining debt-associated customer behavior in social-security areas show the above approaches are useful in identifying exceptional behavior to deeply understand customer behavior and streamline business process.

This work is sponsored by Australian Research Council Discovery Grant (DP0773412, DP0667060) and Linkage Grant (LP0775041).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhao, Y., Cao, L.: Full report: Improving income reporting (May 31, 2006)

    Google Scholar 

  2. Cao, L., Zhang, C.: Domain-driven data mining: a practical methodology. Int. J. of Data Warehousing and Mining  (2006)

    Google Scholar 

  3. Centrelink. Integrated activity management developer guide, Technical Report, 30 (September 1999)

    Google Scholar 

  4. Centrelink: Summary report: Improving income reporting (June 2006)

    Google Scholar 

  5. Chen, H., Wang, F., Zeng, D.: Intelligence and security informatics for homeland security: information, communication, and transportation. IEEE Transactions on Intelligent Transportation Systems 5(4), 329–341 (2004)

    Article  Google Scholar 

  6. Wu, X., Zhang, C., Zhang, S.: Efficient Mining of Both Positive and Negative Association Rules. ACM Transactions on Information Systems 22(3), 381–405 (2004)

    Article  Google Scholar 

  7. Zhang, J., Bloedorn, E., Rosen, L., Venese, D.: [7] Zhang, J. In: Perner, P. (ed.) ICDM 2004. LNCS (LNAI), vol. 3275, pp. 571–574. Springer, Heidelberg (2004)

    Google Scholar 

  8. Cao, L., Zhao, Y., Zhang, C., Zhang, H.: Activity Mining: from Activities to Actions. International Journal of Information Technology & Decision Making 7(2) (2008)

    Google Scholar 

  9. Cao, L., Zhao, Y., Zhang, C.: Mining Impact-Targeted Activity Patterns in Imbalanced Data. IEEE Trans. on Knowledge and Data Engineering (to appear)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Takashi Washio Zhi-Hua Zhou Joshua Zhexue Huang Xiaohua Hu Jinyan Li Chao Xie Jieyue He Deqing Zou Kuan-Ching Li Mário M. Freire

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, L., Zhao, Y., Figueiredo, F., Ou, Y., Luo, D. (2007). Mining High Impact Exceptional Behavior Patterns. In: Washio, T., et al. Emerging Technologies in Knowledge Discovery and Data Mining. PAKDD 2007. Lecture Notes in Computer Science(), vol 4819. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77018-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77018-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77016-9

  • Online ISBN: 978-3-540-77018-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics