Frontiers in Signal Processing
Anomaly Detection of Vehicle Data Based on LOF Algorithm
Download PDF (278 KB) PP. 43 - 49 Pub. Date: January 5, 2020
Author(s)
- Mengjia Yang
College of Electrical & Information Engineering, Southwest Minzu University, Chengdu 610041, China - Daji Ergu*
College of Electrical & Information Engineering, Southwest Minzu University, Chengdu 610041, China
Abstract
Keywords
References
[1] Jiang Ma. Analysis of the current situation and countermeasures of the reform of public institutions’ official vehicles in China [J]. Times finance,2019,(9): 85-86, 90
[2] Deron Lianga; Fengyi Lin and Soushan Wuc. Electronically auditing EDP systems With the support of emerging information technologies[J]. International Journal of Accounting Information Systems, 2001,Vol.2: 130- 147
[3] Jinwei Shao; Jun Lin; Yating Liu; Jia-li Xiao. Discovery of potential audit doubts based on improved Leaders operators [J]. Computer and modernization, 2018,(4): 79-83
[4] Yanna Tan. Study on cluster outlier detection in the field of auditing [D]. Harbin engineering university,2011
[5] Nan Wang; Zizhao Zhang; Xibin Zhao; Quan Miao; Rongrong Ji; Yue Gao. Exploring High-Order Correlations for Industry Anomaly Detection[J].IEEE Transactions on Industrial Electronics,2019,Vol.66(12): 9682-9691
[6] Yang, Jun; Zhou, Chunjie; Yang, Shuanghua; Xu, Haizhou; Hu, Bowen. Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems.[J].IEEE Transactions on Industrial Electronics, 2018,Vol.65(5): 4257-4267
[7] Yingfu Huang; Qiurong Zhang. Identification of Anomaly Behavior of Ships Based on KNN and LOF Combination Algorithm.[J]. AIP Conference Proceedings, 2019,Vol.2073(1): 020090(1-8)
[8] Boddy, Aaron J.; Hurst, William; Mackay, Michael; El Rhalibi, Abdennour. Density-Based Outlier Detection for Safeguarding Electronic patient Record Systems[J]. IEEE ACCESS, 2019,Vol.7: 40285-40294
[9] Ide, T (Ide, Tsuyoshi); Khandelwal, A (Khandelwal, Ankush); Kalagnanam, J (Kalagnanam, Jayant). Sparse Gaussian Markov Random Field Mixtures for Anomaly Detection[J]. 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2016,: 955-960
[10] Ya-Lin Zhang; Longfei Li; Jun Zhou; Xiaolong Li; Zhi-Hua Zhou. Anomaly Detection with Partially Observed Anomalies[A]. WWW ’18: Companion Proceedings of the Web Conference 2018[C], 2018
[11] Sun, J.; Li, H.. Data mining method for listed companies’ financial distress prediction (Article)[J]. Knowledge- Based Systems, 2008,Vol.21(1): 1-5
[12] Kirkos, E.; Spathis, C.; Manolopoulos, Y.. Data Mining techniques for the detection of fraudulent financial statements (Article)[J]. Expert Systems with Applications, 2007,Vol.32(4): 995-1003
[13] Khattab M. Ali Alheeti; Klaus McDonald-Maier. Intelligent intrusion detection in external communication systems for autonomous vehicles[J]. Systems Science & Control Engineering, 2018,Vol.6(1): 48-56
[14] Chandola, V.; Banerjee, A.; Kumar, V.. Anomaly detection: A survey (Review)[J]. ACM Computing Surveys, 2009,Vol.41(3)
[15] Lin, Chi-Chen; Chiu, An-An; Huang, Shaio Yan; Yen, David C.. Detecting the financial statement fraud: The analysis of the differences between data mining techniques and experts’ judgments[J]. KNOWLEDGE-BASED SYSTEMS, 2015,Vol.89: 459-470
[16] Omid Pourheydari; Hossein Nezamabadi-pour and Zeinab Aazami. Identifying qualified audit opinions by artificial neural networks[J]. African Journal of Business Management,2012,Vol.6(44): 11077-11087
[17] Jiaqi Zhong. Application research of data mining technology in computer audit [D]. Nanjing university of posts and telecommunications, 2017
[18] Cheng Zhang. Research and application of data mining technology in financial audit [D]. Anhui university, 2014
[19] Xiaowei Zhang. Audit evidence acquisition system based on data matching and outlier detection technology [D]. Nanjing university of aeronautics and astronautics, 2009
[20] Renyu Liu. Network anomaly detection algorithm based on outlier detection [D]. Chongqing university, 2018