SlideShare a Scribd company logo
1 of 59
Download to read offline
Introduction Methodology Results Conclusions and Future Work Bibliography
LEARNING TARGET PATTERN-OF-LIFE FOR
WIDE-AREA ANOMALY DETECTION
Tatiana López Guevara
June 2015
Introduction Methodology Results Conclusions and Future Work Bibliography
Participants
Supervisors
Dr. Rolf Baxter Dr. Neil Robertson
Introduction Methodology Results Conclusions and Future Work Bibliography
Contents
1 Introduction
2 Methodology
3 Results
4 Conclusions and Future Work
5 Bibliography
Introduction Methodology Results Conclusions and Future Work Bibliography
Section 1
Introduction
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
What is Anomaly Detection?
Chandola et al. [1]: "Patterns in data that do not conform to a well
defined notion of normal behaviour"
Well defined notion?
Same Size?
Same Type?
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
What is Anomaly Detection?
Chandola et al. [1]: "Patterns in data that do not conform to a well
defined notion of normal behaviour"
Well defined notion?
Same Size?
Same Type?
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
What is Anomaly Detection?
Chandola et al. [1]: "Patterns in data that do not conform to a well
defined notion of normal behaviour"
Well defined notion?
Same Size?
Same Type?
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
What is Anomaly Detection?
Chandola et al. [1]: "Patterns in data that do not conform to a well
defined notion of normal behaviour"
Well defined notion?
Same Size?
Same Type?
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
What is Anomaly Detection?
Hawkins et al. [2]: "An observation which deviates so much from
other observations as to arouse suspicions that it was generated by
a different mechanism."
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
What is Anomaly Detection?
Hawkins et al. [2]: "An observation which deviates so much from
other observations as to arouse suspicions that it was generated by
a different mechanism."
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
Pattern-of-Life
Learn preferred behaviour from target’s daily interaction with its
environment
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
Pattern-of-Life
Learn preferred behaviour from target’s daily interaction with its
environment
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
Pattern-of-Life
Learn preferred behaviour from target’s daily interaction with its
environment
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
Pattern-of-Life
Learn preferred behaviour from target’s daily interaction with its
environment
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
Wide-Area
Not limited to a single/fixed scenario
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
Wide-Area
Not limited to a single/fixed scenario
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
What kind of behaviour?
Human movement
⇒ Trajectories
Introduction Methodology Results Conclusions and Future Work Bibliography
Definitions
Anomaly Detection
Detect behaviour not represented by the model
⇒ General indicator of an interesting event!
Introduction Methodology Results Conclusions and Future Work Bibliography
Our observation
What other information could be useful?
Periodic modulation that characterise human nature
Introduction Methodology Results Conclusions and Future Work Bibliography
Why is it useful?
POL as a prior
Enhanced Tracking
Personalized/Proactive Systems
Anomalies detected
Raise alarms ⇒ elderly/cognitive impaired people
Other domains
Change single target’s traces ⇒ ships/cars/pedestrians
Other types of human behaviour
Indoor high level activities
Introduction Methodology Results Conclusions and Future Work Bibliography
Why is it challenging?
POL characteristics : Must have
1 Unsupervised on-line learning
2 Partially observed trajectories
3 No external dependencies
4 Few ad-hoc thresholds / Low False Positive Rate (FPR)
No prior work use time-dependent POL for anomaly detection!
Introduction Methodology Results Conclusions and Future Work Bibliography
Why is it challenging?
POL characteristics : Must have
1 Unsupervised on-line learning
2 Partially observed trajectories
3 No external dependencies
4 Few ad-hoc thresholds / Low False Positive Rate (FPR)
No prior work use time-dependent POL for anomaly detection!
Introduction Methodology Results Conclusions and Future Work Bibliography
Summary of Objectives
Learn behaviour from movement
Single person’s GPS Tracks
Include temporal dependency
Time of the day
Day of the week
Detect Anomalies
Spatial
Spatio-Temporal
Introduction Methodology Results Conclusions and Future Work Bibliography
Section 2
Methodology
Introduction Methodology Results Conclusions and Future Work Bibliography
Hierarchical Model Learning
Temporal layer
Preferred schedules
Spatial layer
Preferred routes
Sp
Te
Introduction Methodology Results Conclusions and Future Work Bibliography
Overview of Proposed Methodology
Update Spatial
Model
Spatial
Anomaly ?
Temporal
Anomaly ?
Update Temporal
Model
Point Anomaly
Logger
Trajectory Point
Anomaly
Processor
Temporal Layer
Spatial Layer
Anomaly Detection
Preprocessing
Introduction Methodology Results Conclusions and Future Work Bibliography
Spatial Layer
Introduction Methodology Results Conclusions and Future Work Bibliography
Spatial Layer: Model Learning
Adaptation of on-line method proposed by Piciarelli et al. [4]
to work with wide-area data
1 2 3
4 5 6
c1
c2 c3
c4
c1
c4
c2 c3
c1
c2 c3
c4
c1
c2 c3
c4
c1
c2 c3
c4
c5
c1
c2 c3
c4
c5
c6
(Images adapted from [4]).
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer
Two methods
1 Kernel Density Estimation (KDE)
2 Conformal Anomaly Detection (CAD)
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - Kernel Density Estimator (KDE)
KDE Definition
ˆf (x;h) =
1
n
n
i=1
Kh(x−xi) (1)
Which Kernel?
Circular data
⇒ von-Misses Kernel
Advantages
Non parametric
Parameter-light
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - Kernel Density Estimator (KDE)
KDE Definition
ˆf (x;h) =
1
n
n
i=1
Kh(x−xi) (1)
Which Kernel?
Circular data
⇒ von-Misses Kernel
Advantages
Non parametric
Parameter-light
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - Kernel Density Estimator (KDE)
KDE Definition
ˆf (x;h) =
1
n
n
i=1
Kh(x−xi) (1)
Which Kernel?
Circular data
⇒ von-Misses Kernel
Advantages
Non parametric
Parameter-light
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer
Two methods
1 Kernel Density Estimation (KDE)
2 Conformal Anomaly Detection (CAD)
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - Conformal Anomaly Detector (CAD)
Proposed by Laxhammar et al. [3]
Advantages
Based on theory of confidence Interval
Completely on-line
Parameter-light
is directly bounded to the FPR
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - CAD - Method
Input
Previous observations: B = {z1,..,zn−1}
New observation: zn
Output
Ratio of samples in B that are at least as
different as zn.
pzn
Nonconformity Measure NCM
Sum of the distance of the K− nearest
neighbours
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - CAD - Method
Input
Previous observations: B = {z1,..,zn−1}
New observation: zn
Output
Ratio of samples in B that are at least as
different as zn.
pzn
Nonconformity Measure NCM
Sum of the distance of the K− nearest
neighbours
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - CAD - Method
Input
Previous observations: B = {z1,..,zn−1}
New observation: zn
Output
Ratio of samples in B that are at least as
different as zn.
pzn
Nonconformity Measure NCM
Sum of the distance of the K− nearest
neighbours
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - CAD - Method
Input
Previous observations: B = {z1,..,zn−1}
New observation: zn
Output
Ratio of samples in B that are at least
as different as zn.
pzn
Nonconformity Measure NCM
Sum of the distance of the K− nearest
neighbours
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - CAD - Method
Input
Previous observations: B = {z1,..,zn−1}
New observation: zn
Output
Ratio of samples in B that are at least
as different as zn.
pzn
Nonconformity Measure NCM
Sum of the distance of the K− nearest
neighbours
Introduction Methodology Results Conclusions and Future Work Bibliography
Anomaly Detection
Spatial
No cluster match found
Match to a low density cluster < thrT
Temporal - KDE Method
Low density regions: less than 95% of the total density
Temporal - CAD Method
Fraction less than parameter: pzn <
Introduction Methodology Results Conclusions and Future Work Bibliography
Section 3
Results
Introduction Methodology Results Conclusions and Future Work Bibliography
Datasets
Heriot-Watt Dataset
Period: 7 months Dates: Oct 2014 - Apr 2015
Introduction Methodology Results Conclusions and Future Work Bibliography
Qualitative Results - Spatial Layer
Zoom in: Most Transited Area
Introduction Methodology Results Conclusions and Future Work Bibliography
Qualitative Results - Spatial Layer
Zoom out: Overall view
Introduction Methodology Results Conclusions and Future Work Bibliography
Quantitative Results - Spatial Layer
Quantitative result of spatial anomalies detected by the Spatial layer
Introduction Methodology Results Conclusions and Future Work Bibliography
Qualitative Results - Temporal Layer
0/24 1
2
3
4
5
6
7
8
9
10
111213
14
15
16
17
18
19
20
21
22
23
+
KDE CAD
8 19 20 21 22 23 24
KDE Circular
Anomalies
Observations
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Track: 758, Cluster: 1839 [-1]
KDE Circular
Anomalies
Observations
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
KDE Circular
1
Track: 715, Cluster: 2139 [-1]
KDE Circular
2
Introduction Methodology Results Conclusions and Future Work Bibliography
Qualitative Results - Temporal Layer
0/24 1
2
3
4
5
6
7
8
9
10
111213
14
15
16
17
18
19
20
21
22
23
+
KDE CAD
19 20 21 22 23 24
KDE Circular
Anomalies
Observations
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Track: 758, Cluster: 1839 [-1]
KDE Circular
Anomalies
Observations
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0 21 22 23 24
KDE Circular
Anomalies
Observations
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Track: 715, Cluster: 2139 [-1]
KDE Circular
Anomalies
Observations
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
Introduction Methodology Results Conclusions and Future Work Bibliography
Quantitative Results - Temporal Layer
KDE CAD
Quantitative result of spatial anomalies detected by the Temporal layer
Introduction Methodology Results Conclusions and Future Work Bibliography
Datasets
Geolife Dataset
Microsoft Research
Area:
75km2
Period:
71 days
Dates:
Feb 9 - Apr 27, 2009
Introduction Methodology Results Conclusions and Future Work Bibliography
Qualitative Results - Spatial Layer
GeoLife: Each color represents one cluster
Introduction Methodology Results Conclusions and Future Work Bibliography
Qualitative Results - Temporal Layer
KDE CAD
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
0
0.2
0.4
0.6
0.8
1
1.2
1.4
Track: 405, Cluster: 239 [−1]
KDE Circular
Anomalies
Observations
0 5 10 15 20 25
0
2
4
6
8
NCM Track: 405, Cluster: 239 [−1]
Temporal Resolution
Alpha
0 5 10 15 20
0
0.5
1
CAD Probability Track: 405, Cluster: 239 [−1]
Temporal Resolution
p
CAD method creates narrower normality regions ( 30m) than KDE
Introduction Methodology Results Conclusions and Future Work Bibliography
Section 4
Conclusions and Future Work
Introduction Methodology Results Conclusions and Future Work Bibliography
Conclusions
1 New hierarchical model incorporating time-dependence was
proposed
2 Two methods for modelling temporal information were
implemented/compared
3 A CAD-NCM metric using circular distance for time was
proposed
4 KDE method showed an over-smoothing effect due to the
bandwidth selection method.
5 Spatial and Spatio-Temporal anomalies quantitatively and
qualitatively assessed against 2 datasets
Introduction Methodology Results Conclusions and Future Work Bibliography
Future Work
1 Proper way to forget!
2 Test other CAD-NCM’s: Entropy-based / Local Outlier Factor
(LOF)
3 Efficient on-line Kernel Density Estimation
4 Anomaly prediction using Long Short-Term Memory Networks
Introduction Methodology Results Conclusions and Future Work Bibliography
Thank you
Any questions ?
Introduction Methodology Results Conclusions and Future Work Bibliography
Section 5
Bibliography
Introduction Methodology Results Conclusions and Future Work Bibliography
Bibliography
Varun Chandola, Arindam Banerjee, and Vipin Kumar.
Anomaly detection.
ACM Computing Surveys, 41(3):1–58, 2009.
Douglas M Hawkins.
Identification of outliers, volume 11.
Springer, 1980.
Rikard Laxhammar and Goran Falkman.
Online learning and sequential anomaly detection in trajectories.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(6):1158–1173, 2014.
C. Piciarelli and G. L. Foresti.
On-line trajectory clustering for anomalous events detection.
Pattern Recognition Letters, 27:1835–1842, 2006.
Introduction Methodology Results Conclusions and Future Work Bibliography
Spatial Model Learning
Matching
Match
Found?
Create Cluster
Update Cluster
Exiting 
Cluster?
Near
End?
Split
no
yes
yes
no
Concatenate
Roots
Prune Dead
Clusters
Merge 
Clusters
Model Learning: Left image show the cluster building process (Modified from [4]) executed every time a new trajectory point
is observed. Right image the maintenance process executed in batch. Developed in the VisionLab.
Distance Function
d(zi,C) = min
j
dist(zi,cj)
σ2
∀j ∈ 1,..,M (2)
Introduction Methodology Results Conclusions and Future Work Bibliography
Temporal Layer - Kernel Density Estimator
KDE Definition
ˆf (x;h) =
1
n
n
i=1
Kh(x−xi) (3)
KDE using von-Misses Kernel
ˆf (θ;v) =
1
n(2π)Ir(v)
n
i=1
evcos(θ−θi)
(4)
0/24 1
2
3
4
5
6
7
8
9
10
111213
14
15
16
17
18
19
20
21
22
23
+
0/24 1
2
3
4
5
6
7
8
9
10
111213
14
15
16
17
18
19
20
21
22
23
+

More Related Content

Viewers also liked

Kb behaviour-recognition
Kb behaviour-recognitionKb behaviour-recognition
Kb behaviour-recognitionMahfuzul Haque
 
Socially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMS
Socially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMSSocially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMS
Socially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMSBehavior Design AMS
 
Ensemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and BeyondEnsemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and Beyondzukun
 
Robust techniques for background subtraction in urban
Robust techniques for background subtraction in urbanRobust techniques for background subtraction in urban
Robust techniques for background subtraction in urbantaylor_1313
 
masters seminar_Detection
masters seminar_Detectionmasters seminar_Detection
masters seminar_Detectionashek1520
 
Activity recognition for video surveillance
Activity recognition for video surveillanceActivity recognition for video surveillance
Activity recognition for video surveillancevariable_orr
 
Seminar on Driver Behaviour Detection using Swarm Intelligence.
Seminar on Driver Behaviour Detection using Swarm Intelligence.Seminar on Driver Behaviour Detection using Swarm Intelligence.
Seminar on Driver Behaviour Detection using Swarm Intelligence.Rajani Suryavanshi
 
Activity Recognition using RGBD
Activity Recognition using RGBDActivity Recognition using RGBD
Activity Recognition using RGBDnazlitemu
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersIshara Amarasekera
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)nikhilus85
 
Human activity recognition
Human activity recognition Human activity recognition
Human activity recognition srikanthgadam
 
Human activity recognition
Human activity recognitionHuman activity recognition
Human activity recognitionRandhir Gupta
 
Surveillance and Notification of Diseases
Surveillance and Notification of DiseasesSurveillance and Notification of Diseases
Surveillance and Notification of DiseasesDr Ghaiath Hussein
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEAswinraj Manickam
 
Abnormal Behavior
Abnormal BehaviorAbnormal Behavior
Abnormal BehaviorAlex Holub
 

Viewers also liked (17)

Kb behaviour-recognition
Kb behaviour-recognitionKb behaviour-recognition
Kb behaviour-recognition
 
Socially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMS
Socially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMSSocially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMS
Socially intelligent sensing - Hayley Hung - TU Delft - Behavior Design AMS
 
Ensemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and BeyondEnsemble of Exemplar-SVM for Object Detection and Beyond
Ensemble of Exemplar-SVM for Object Detection and Beyond
 
Robust techniques for background subtraction in urban
Robust techniques for background subtraction in urbanRobust techniques for background subtraction in urban
Robust techniques for background subtraction in urban
 
masters seminar_Detection
masters seminar_Detectionmasters seminar_Detection
masters seminar_Detection
 
Activity recognition for video surveillance
Activity recognition for video surveillanceActivity recognition for video surveillance
Activity recognition for video surveillance
 
Seminar on Driver Behaviour Detection using Swarm Intelligence.
Seminar on Driver Behaviour Detection using Swarm Intelligence.Seminar on Driver Behaviour Detection using Swarm Intelligence.
Seminar on Driver Behaviour Detection using Swarm Intelligence.
 
Activity Recognition using RGBD
Activity Recognition using RGBDActivity Recognition using RGBD
Activity Recognition using RGBD
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone Accelerometers
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)
 
Human activity recognition
Human activity recognition Human activity recognition
Human activity recognition
 
Human activity recognition
Human activity recognitionHuman activity recognition
Human activity recognition
 
Surveillance and Notification of Diseases
Surveillance and Notification of DiseasesSurveillance and Notification of Diseases
Surveillance and Notification of Diseases
 
Reviewing as ots video
Reviewing as ots videoReviewing as ots video
Reviewing as ots video
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
 
Abnormal Behavior
Abnormal BehaviorAbnormal Behavior
Abnormal Behavior
 
Surveillance
SurveillanceSurveillance
Surveillance
 

Similar to POL Anomaly Detection

Metabolomic Data Analysis Workshop and Tutorials (2014)
Metabolomic Data Analysis Workshop and Tutorials (2014)Metabolomic Data Analysis Workshop and Tutorials (2014)
Metabolomic Data Analysis Workshop and Tutorials (2014)Dmitry Grapov
 
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptfouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptKinjalkumar Patel
 
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptfouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptKhoiLe90
 
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptfouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptAnandKumar459862
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Detection of SOA Antipatterns
Detection of SOA AntipatternsDetection of SOA Antipatterns
Detection of SOA AntipatternsFrancis Palma
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...IRJET Journal
 
PSA pattern to predict CRPC
PSA pattern to predict CRPCPSA pattern to predict CRPC
PSA pattern to predict CRPCYejin Kim
 
A Vision for User-Centered Scientific Computing at Jefferson Lab
A Vision for User-Centered Scientific Computing at Jefferson LabA Vision for User-Centered Scientific Computing at Jefferson Lab
A Vision for User-Centered Scientific Computing at Jefferson LabWouter Deconinck
 
Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...
Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...
Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...Camille Maumet
 
Comparison of papers NN-filter
Comparison of papers NN-filterComparison of papers NN-filter
Comparison of papers NN-filtersaman shaheen
 
KNN.pptx
KNN.pptxKNN.pptx
KNN.pptxdfgd7
 
Technical research writing
Technical research writing   Technical research writing
Technical research writing AJAL A J
 

Similar to POL Anomaly Detection (20)

Metabolomic Data Analysis Workshop and Tutorials (2014)
Metabolomic Data Analysis Workshop and Tutorials (2014)Metabolomic Data Analysis Workshop and Tutorials (2014)
Metabolomic Data Analysis Workshop and Tutorials (2014)
 
Exposé Ontology
Exposé OntologyExposé Ontology
Exposé Ontology
 
Fahroo - Optimization and Discrete Mathematics - Spring Review 2013
Fahroo - Optimization and Discrete Mathematics - Spring Review 2013Fahroo - Optimization and Discrete Mathematics - Spring Review 2013
Fahroo - Optimization and Discrete Mathematics - Spring Review 2013
 
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptfouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
 
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptfouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
 
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.pptfouad_kharroubi_PhD_Defense_05_06_2014.ppt
fouad_kharroubi_PhD_Defense_05_06_2014.ppt
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Detection of SOA Antipatterns
Detection of SOA AntipatternsDetection of SOA Antipatterns
Detection of SOA Antipatterns
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
 
Research design mahesh
Research design maheshResearch design mahesh
Research design mahesh
 
PSA pattern to predict CRPC
PSA pattern to predict CRPCPSA pattern to predict CRPC
PSA pattern to predict CRPC
 
Software Radio Course
Software Radio CourseSoftware Radio Course
Software Radio Course
 
A Vision for User-Centered Scientific Computing at Jefferson Lab
A Vision for User-Centered Scientific Computing at Jefferson LabA Vision for User-Centered Scientific Computing at Jefferson Lab
A Vision for User-Centered Scientific Computing at Jefferson Lab
 
Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...
Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...
Supporting image-based meta-analysis with NIDM: Standardized reporting of neu...
 
Comparison of papers NN-filter
Comparison of papers NN-filterComparison of papers NN-filter
Comparison of papers NN-filter
 
KNN.pptx
KNN.pptxKNN.pptx
KNN.pptx
 
KNN.pptx
KNN.pptxKNN.pptx
KNN.pptx
 
DPHEP_BLUETWO_001
DPHEP_BLUETWO_001DPHEP_BLUETWO_001
DPHEP_BLUETWO_001
 
Technical research writing
Technical research writing   Technical research writing
Technical research writing
 

Recently uploaded

2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 

Recently uploaded (20)

2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 

POL Anomaly Detection

  • 1. Introduction Methodology Results Conclusions and Future Work Bibliography LEARNING TARGET PATTERN-OF-LIFE FOR WIDE-AREA ANOMALY DETECTION Tatiana López Guevara June 2015
  • 2. Introduction Methodology Results Conclusions and Future Work Bibliography Participants Supervisors Dr. Rolf Baxter Dr. Neil Robertson
  • 3. Introduction Methodology Results Conclusions and Future Work Bibliography Contents 1 Introduction 2 Methodology 3 Results 4 Conclusions and Future Work 5 Bibliography
  • 4. Introduction Methodology Results Conclusions and Future Work Bibliography Section 1 Introduction
  • 5. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions What is Anomaly Detection? Chandola et al. [1]: "Patterns in data that do not conform to a well defined notion of normal behaviour" Well defined notion? Same Size? Same Type?
  • 6. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions What is Anomaly Detection? Chandola et al. [1]: "Patterns in data that do not conform to a well defined notion of normal behaviour" Well defined notion? Same Size? Same Type?
  • 7. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions What is Anomaly Detection? Chandola et al. [1]: "Patterns in data that do not conform to a well defined notion of normal behaviour" Well defined notion? Same Size? Same Type?
  • 8. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions What is Anomaly Detection? Chandola et al. [1]: "Patterns in data that do not conform to a well defined notion of normal behaviour" Well defined notion? Same Size? Same Type?
  • 9. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions What is Anomaly Detection? Hawkins et al. [2]: "An observation which deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism."
  • 10. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions What is Anomaly Detection? Hawkins et al. [2]: "An observation which deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism."
  • 11. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions Pattern-of-Life Learn preferred behaviour from target’s daily interaction with its environment
  • 12. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions Pattern-of-Life Learn preferred behaviour from target’s daily interaction with its environment
  • 13. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions Pattern-of-Life Learn preferred behaviour from target’s daily interaction with its environment
  • 14. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions Pattern-of-Life Learn preferred behaviour from target’s daily interaction with its environment
  • 15. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions Wide-Area Not limited to a single/fixed scenario
  • 16. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions Wide-Area Not limited to a single/fixed scenario
  • 17. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions What kind of behaviour? Human movement ⇒ Trajectories
  • 18. Introduction Methodology Results Conclusions and Future Work Bibliography Definitions Anomaly Detection Detect behaviour not represented by the model ⇒ General indicator of an interesting event!
  • 19. Introduction Methodology Results Conclusions and Future Work Bibliography Our observation What other information could be useful? Periodic modulation that characterise human nature
  • 20. Introduction Methodology Results Conclusions and Future Work Bibliography Why is it useful? POL as a prior Enhanced Tracking Personalized/Proactive Systems Anomalies detected Raise alarms ⇒ elderly/cognitive impaired people Other domains Change single target’s traces ⇒ ships/cars/pedestrians Other types of human behaviour Indoor high level activities
  • 21. Introduction Methodology Results Conclusions and Future Work Bibliography Why is it challenging? POL characteristics : Must have 1 Unsupervised on-line learning 2 Partially observed trajectories 3 No external dependencies 4 Few ad-hoc thresholds / Low False Positive Rate (FPR) No prior work use time-dependent POL for anomaly detection!
  • 22. Introduction Methodology Results Conclusions and Future Work Bibliography Why is it challenging? POL characteristics : Must have 1 Unsupervised on-line learning 2 Partially observed trajectories 3 No external dependencies 4 Few ad-hoc thresholds / Low False Positive Rate (FPR) No prior work use time-dependent POL for anomaly detection!
  • 23. Introduction Methodology Results Conclusions and Future Work Bibliography Summary of Objectives Learn behaviour from movement Single person’s GPS Tracks Include temporal dependency Time of the day Day of the week Detect Anomalies Spatial Spatio-Temporal
  • 24. Introduction Methodology Results Conclusions and Future Work Bibliography Section 2 Methodology
  • 25. Introduction Methodology Results Conclusions and Future Work Bibliography Hierarchical Model Learning Temporal layer Preferred schedules Spatial layer Preferred routes Sp Te
  • 26. Introduction Methodology Results Conclusions and Future Work Bibliography Overview of Proposed Methodology Update Spatial Model Spatial Anomaly ? Temporal Anomaly ? Update Temporal Model Point Anomaly Logger Trajectory Point Anomaly Processor Temporal Layer Spatial Layer Anomaly Detection Preprocessing
  • 27. Introduction Methodology Results Conclusions and Future Work Bibliography Spatial Layer
  • 28. Introduction Methodology Results Conclusions and Future Work Bibliography Spatial Layer: Model Learning Adaptation of on-line method proposed by Piciarelli et al. [4] to work with wide-area data 1 2 3 4 5 6 c1 c2 c3 c4 c1 c4 c2 c3 c1 c2 c3 c4 c1 c2 c3 c4 c1 c2 c3 c4 c5 c1 c2 c3 c4 c5 c6 (Images adapted from [4]).
  • 29. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer Two methods 1 Kernel Density Estimation (KDE) 2 Conformal Anomaly Detection (CAD)
  • 30. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - Kernel Density Estimator (KDE) KDE Definition ˆf (x;h) = 1 n n i=1 Kh(x−xi) (1) Which Kernel? Circular data ⇒ von-Misses Kernel Advantages Non parametric Parameter-light
  • 31. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - Kernel Density Estimator (KDE) KDE Definition ˆf (x;h) = 1 n n i=1 Kh(x−xi) (1) Which Kernel? Circular data ⇒ von-Misses Kernel Advantages Non parametric Parameter-light
  • 32. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - Kernel Density Estimator (KDE) KDE Definition ˆf (x;h) = 1 n n i=1 Kh(x−xi) (1) Which Kernel? Circular data ⇒ von-Misses Kernel Advantages Non parametric Parameter-light
  • 33. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer Two methods 1 Kernel Density Estimation (KDE) 2 Conformal Anomaly Detection (CAD)
  • 34. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - Conformal Anomaly Detector (CAD) Proposed by Laxhammar et al. [3] Advantages Based on theory of confidence Interval Completely on-line Parameter-light is directly bounded to the FPR
  • 35. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - CAD - Method Input Previous observations: B = {z1,..,zn−1} New observation: zn Output Ratio of samples in B that are at least as different as zn. pzn Nonconformity Measure NCM Sum of the distance of the K− nearest neighbours
  • 36. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - CAD - Method Input Previous observations: B = {z1,..,zn−1} New observation: zn Output Ratio of samples in B that are at least as different as zn. pzn Nonconformity Measure NCM Sum of the distance of the K− nearest neighbours
  • 37. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - CAD - Method Input Previous observations: B = {z1,..,zn−1} New observation: zn Output Ratio of samples in B that are at least as different as zn. pzn Nonconformity Measure NCM Sum of the distance of the K− nearest neighbours
  • 38. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - CAD - Method Input Previous observations: B = {z1,..,zn−1} New observation: zn Output Ratio of samples in B that are at least as different as zn. pzn Nonconformity Measure NCM Sum of the distance of the K− nearest neighbours
  • 39. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - CAD - Method Input Previous observations: B = {z1,..,zn−1} New observation: zn Output Ratio of samples in B that are at least as different as zn. pzn Nonconformity Measure NCM Sum of the distance of the K− nearest neighbours
  • 40. Introduction Methodology Results Conclusions and Future Work Bibliography Anomaly Detection Spatial No cluster match found Match to a low density cluster < thrT Temporal - KDE Method Low density regions: less than 95% of the total density Temporal - CAD Method Fraction less than parameter: pzn <
  • 41. Introduction Methodology Results Conclusions and Future Work Bibliography Section 3 Results
  • 42. Introduction Methodology Results Conclusions and Future Work Bibliography Datasets Heriot-Watt Dataset Period: 7 months Dates: Oct 2014 - Apr 2015
  • 43. Introduction Methodology Results Conclusions and Future Work Bibliography Qualitative Results - Spatial Layer Zoom in: Most Transited Area
  • 44. Introduction Methodology Results Conclusions and Future Work Bibliography Qualitative Results - Spatial Layer Zoom out: Overall view
  • 45. Introduction Methodology Results Conclusions and Future Work Bibliography Quantitative Results - Spatial Layer Quantitative result of spatial anomalies detected by the Spatial layer
  • 46. Introduction Methodology Results Conclusions and Future Work Bibliography Qualitative Results - Temporal Layer 0/24 1 2 3 4 5 6 7 8 9 10 111213 14 15 16 17 18 19 20 21 22 23 + KDE CAD 8 19 20 21 22 23 24 KDE Circular Anomalies Observations 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Track: 758, Cluster: 1839 [-1] KDE Circular Anomalies Observations 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 KDE Circular 1 Track: 715, Cluster: 2139 [-1] KDE Circular 2
  • 47. Introduction Methodology Results Conclusions and Future Work Bibliography Qualitative Results - Temporal Layer 0/24 1 2 3 4 5 6 7 8 9 10 111213 14 15 16 17 18 19 20 21 22 23 + KDE CAD 19 20 21 22 23 24 KDE Circular Anomalies Observations 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Track: 758, Cluster: 1839 [-1] KDE Circular Anomalies Observations 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0 21 22 23 24 KDE Circular Anomalies Observations 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Track: 715, Cluster: 2139 [-1] KDE Circular Anomalies Observations 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
  • 48. Introduction Methodology Results Conclusions and Future Work Bibliography Quantitative Results - Temporal Layer KDE CAD Quantitative result of spatial anomalies detected by the Temporal layer
  • 49. Introduction Methodology Results Conclusions and Future Work Bibliography Datasets Geolife Dataset Microsoft Research Area: 75km2 Period: 71 days Dates: Feb 9 - Apr 27, 2009
  • 50. Introduction Methodology Results Conclusions and Future Work Bibliography Qualitative Results - Spatial Layer GeoLife: Each color represents one cluster
  • 51. Introduction Methodology Results Conclusions and Future Work Bibliography Qualitative Results - Temporal Layer KDE CAD 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Track: 405, Cluster: 239 [−1] KDE Circular Anomalies Observations 0 5 10 15 20 25 0 2 4 6 8 NCM Track: 405, Cluster: 239 [−1] Temporal Resolution Alpha 0 5 10 15 20 0 0.5 1 CAD Probability Track: 405, Cluster: 239 [−1] Temporal Resolution p CAD method creates narrower normality regions ( 30m) than KDE
  • 52. Introduction Methodology Results Conclusions and Future Work Bibliography Section 4 Conclusions and Future Work
  • 53. Introduction Methodology Results Conclusions and Future Work Bibliography Conclusions 1 New hierarchical model incorporating time-dependence was proposed 2 Two methods for modelling temporal information were implemented/compared 3 A CAD-NCM metric using circular distance for time was proposed 4 KDE method showed an over-smoothing effect due to the bandwidth selection method. 5 Spatial and Spatio-Temporal anomalies quantitatively and qualitatively assessed against 2 datasets
  • 54. Introduction Methodology Results Conclusions and Future Work Bibliography Future Work 1 Proper way to forget! 2 Test other CAD-NCM’s: Entropy-based / Local Outlier Factor (LOF) 3 Efficient on-line Kernel Density Estimation 4 Anomaly prediction using Long Short-Term Memory Networks
  • 55. Introduction Methodology Results Conclusions and Future Work Bibliography Thank you Any questions ?
  • 56. Introduction Methodology Results Conclusions and Future Work Bibliography Section 5 Bibliography
  • 57. Introduction Methodology Results Conclusions and Future Work Bibliography Bibliography Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection. ACM Computing Surveys, 41(3):1–58, 2009. Douglas M Hawkins. Identification of outliers, volume 11. Springer, 1980. Rikard Laxhammar and Goran Falkman. Online learning and sequential anomaly detection in trajectories. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(6):1158–1173, 2014. C. Piciarelli and G. L. Foresti. On-line trajectory clustering for anomalous events detection. Pattern Recognition Letters, 27:1835–1842, 2006.
  • 58. Introduction Methodology Results Conclusions and Future Work Bibliography Spatial Model Learning Matching Match Found? Create Cluster Update Cluster Exiting Cluster? Near End? Split no yes yes no Concatenate Roots Prune Dead Clusters Merge Clusters Model Learning: Left image show the cluster building process (Modified from [4]) executed every time a new trajectory point is observed. Right image the maintenance process executed in batch. Developed in the VisionLab. Distance Function d(zi,C) = min j dist(zi,cj) σ2 ∀j ∈ 1,..,M (2)
  • 59. Introduction Methodology Results Conclusions and Future Work Bibliography Temporal Layer - Kernel Density Estimator KDE Definition ˆf (x;h) = 1 n n i=1 Kh(x−xi) (3) KDE using von-Misses Kernel ˆf (θ;v) = 1 n(2π)Ir(v) n i=1 evcos(θ−θi) (4) 0/24 1 2 3 4 5 6 7 8 9 10 111213 14 15 16 17 18 19 20 21 22 23 + 0/24 1 2 3 4 5 6 7 8 9 10 111213 14 15 16 17 18 19 20 21 22 23 +