<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Gaussian Processes for Anomaly Description in Production Environments</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Christian</forename><surname>Beecks</surname></persName>
							<email>christian.beecks@uni-muenster.de</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">University of Münster</orgName>
								<orgName type="institution" key="instit2">Fraunhofer Institute for Applied Information Technology FIT</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Willy</forename><surname>Kjeld</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">University of Münster</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><surname>Schmidt</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">University of Münster</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fabian</forename><surname>Berns</surname></persName>
							<email>fabian.berns@uni-muenster.de</email>
							<affiliation key="aff2">
								<orgName type="institution">University of Münster</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alexander</forename><surname>Grass</surname></persName>
							<email>alexander.grass@fit.fraunhofer.de</email>
							<affiliation key="aff3">
								<orgName type="institution">Fraunhofer Institute for Applied Information Technology FIT</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Gaussian Processes for Anomaly Description in Production Environments</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">CB150EF09DB742F834C3A4464BC492AC</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T17:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Concomitant with the rapid spread of cyber-physical systems and the advancement of technologies from the Internet of Things, many modern production environments are characterized by vast amounts of sensor data which are generated throughout different stages of production processes. In this paper, we propose a novel method for discovering the inherent structures of anomalies arising in IoT sensor data. Our idea consists in modeling and describing anomalies by means of kernel expressions, which are combinations of well-known kernels. The results of our empirical analysis show that our proposal is suitable for modeling differently structured anomalies. Moreover, the results indicate that Gaussian processes provide a powerful tool for future algorithmic investigations of IoT sensor data.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">INTRODUCTION</head><p>Concomitant with the rapid spread of cyber-physical systems and the advancement of technologies from the Internet of Things (IoT), many modern production environments are characterized by vast amounts of sensor data which are generated throughout different stages of production processes. These sensor data streams are often considered as valuable information sources with a high economic potential and are characterized by high volume, velocity and variety. Their data-driven value is indisputable for optimizing and fine-tuning industrial production processes.</p><p>Monitoring sensor data from complex production processes in order to detect outliers or low-performing production behavior caused by undesired drifts and trends, which we summarize as anomalies, is a challenging task. Not only due to the massive amount of sensor data but also due to different types of anomalies, which are potentially unknown in advance, manual or automatic inspection systems are frequently supported by anomaly detection algorithms. While the last years have witnessed the development of different anomaly detection algorithms, cf. the work of Renaudie et al. <ref type="bibr" target="#b20">[21]</ref> for a recent performance evaluation in an industrial context, only less effort has been spent to the investigation of the inherent structure of an anomaly.</p><p>In this paper, we thus propose a novel method to discover the inherent structure of an anomaly. Our idea consists in modeling and describing anomalies by means of kernel expressions, which are combinations of well-known kernels. By fitting kernel expressions to the corresponding sensor data, we are able to decompose the inherent structure of an anomaly and to describe its individual behavior such as linearity and periodicity by natural language. For this purpose, we make use of Gaussian processes <ref type="bibr" target="#b19">[20]</ref> and the Compositional Kernel Search model <ref type="bibr" target="#b10">[11]</ref>. We carry out our analysis on the recently proposed IoT dataset <ref type="bibr" target="#b4">[5]</ref>, a real-world industry 4.0 dataset, which has been collected within the EU project MONSOON<ref type="foot" target="#foot_0">1</ref> . To sum up, we make the following contributions:</p><p>• We propose a machine-learning-based method in order to model anomalies and to describe their inherent components. • We enrich the MONSOON IoT dataset with a novel ground truth derived from domain experts in order to further stimulate research of anomaly detection algorithms on this real-world dataset.</p><p>The paper is structured as follows. In Section 2, we outline related work. In Section 3, we briefly introduce Gaussian processes and their application to adapt kernel expressions to sensor data. The preliminary results of our proposed method are reported and discussed in Section 4, before we conclude our paper with an outlook on future research directions in Section 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">RELATED WORK</head><p>Strongly related to our approach are anomaly detection algorithms. There is a plethora of these algorithms including Z-Score <ref type="bibr" target="#b9">[10]</ref>, Mahalanobis Distance-Based, Empirical Covariance Estimation <ref type="bibr" target="#b17">[18]</ref> [9], Mahalanobis Distance-Based, Robust Covariance Estimation <ref type="bibr" target="#b21">[22]</ref> [9], Subspace-based PCA Anomaly Detector <ref type="bibr" target="#b8">[9]</ref>, One-Class SVM <ref type="bibr" target="#b22">[23]</ref> [18] [9] <ref type="bibr" target="#b11">[12]</ref>, Isolation Forest (I-Forest) <ref type="bibr" target="#b15">[16]</ref> [18], Gaussian Mixture Model <ref type="bibr" target="#b17">[18]</ref> [9] <ref type="bibr" target="#b18">[19]</ref>, Deep Auto-Encoder <ref type="bibr" target="#b7">[8]</ref>, Local Outlier Factor <ref type="bibr" target="#b6">[7]</ref> [18] <ref type="bibr" target="#b8">[9]</ref> [1], Least Squares Anomaly Detector <ref type="bibr" target="#b23">[24]</ref>, GADPL <ref type="bibr" target="#b13">[14]</ref> and k-nearest Neighbour <ref type="bibr" target="#b12">[13]</ref> [1] <ref type="bibr" target="#b11">[12]</ref>. While these algorithms are all possible options for anomaly detection, as shown in different surveys such as <ref type="bibr" target="#b12">[13]</ref>, <ref type="bibr" target="#b18">[19]</ref> and <ref type="bibr" target="#b8">[9]</ref>, they are not directly suited for describing the inherent structure of anomalies, which is the major focus of this paper. We choose the means of Gaussian processes for anomaly description due to their capability to not only gather statistical indicators, but deliver the very characteristics of specific anomalous behavior from the data <ref type="bibr" target="#b19">[20]</ref>.</p><p>For describing these characteristics, Lloyd et al. <ref type="bibr" target="#b16">[17]</ref> have proposed the Automatic Bayesian Covariance Discovery System that adapts the Compositional Kernel Search Algorithm <ref type="bibr" target="#b10">[11]</ref> by adding intuitive natural language descriptions of the function classes described by their models. In <ref type="bibr" target="#b14">[15]</ref>, these models are expanded to discover kernel structures which are able to explain multiple time series at once.</p><p>In this work, we make use of these algorithms in order to describe the inherent structures of anomalies, as shown in the following section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">GAUSSIAN PROCESSES</head><p>In this section, we describe the analysis of anomalies in sensor data via Gaussian processes. To this end, we assume the sensor data to be univariate<ref type="foot" target="#foot_2">2</ref> and an anomaly A to be a finite subsequence of timestamp-value pairs</p><formula xml:id="formula_0">A = {(t i , v i )} n i=i with timestamps t i ∈ T and values v i ∈ R.</formula><p>As we do not know in advance the number of values and the distances between individual timestamps, we can also thought of an anomaly A as a mathematical function A : T → R, which assigns every timestamp t ∈ T a real-valued value v(t) ∈ R. By considering the individual values v(t) to be random variables following a Gaussian distribution, we can formalize the Gaussian process as</p><formula xml:id="formula_1">v(t) ∼ GP(m(t), k(t, t ′ )), where m(t) = E[v(t)] is the mean function and k(t, t ′ ) = E[(v(t) −m(t)) • (v(t ′ ) −m(t ′ ))] is the covariance function k : T × T → R.</formula><p>In other words, a Gaussian process is a stochastic process over random variables, where every subset of random variables from the Gaussian process follows a normal distribution. The distribution of the Gaussian process is the joint distribution of all of these random variables and it is thus a probability distribution over (the space of) functions in R T .</p><p>While the covariance function k defined above is a general way to model the behavior of data, we aim to describe each anomaly A by its own covariance function k A . That is, we aim to learn a covariance function k A , which is then also denoted as kernel expression in the domain of machine learning, by fitting combinations of well-known kernels, such as</p><formula xml:id="formula_2">• the constant kernel k C (t, t ′ ) = λ ∈ R, • the linear kernel k LIN (t, t ′ ) = (t − l) • (t ′ − l), • the squared exponential kernel k SE (t, t ′ ) = exp − |t −t ′ | 2 2l 2 , • or the periodic kernel k PER (t, t ′ ) = exp 2 sin 2 t −t ′ 2 l 2 .</formula><p>In order to individually fit a kernel expression to each anomaly based on the aforementioned kernels, we use the compositional kernel model, as utilized for instance in <ref type="bibr" target="#b16">[17]</ref>. This allows us to decompose an anomaly into individual components, which can be ranked by their contribution towards explaining the data. As an example, an anomaly A with a highly weighted linear kernel k LIN indicates a hidden linearity component while a highly weighted periodic kernel k PER indicates an inherent periodicity in the anomaly.</p><p>The resulting kernel expressions are reported and discussed in the next section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">PRELIMINARY RESULTS</head><p>In this section, we report and discuss the results of our preliminary performance evaluation. For this purpose, we use the recently introduced MONSOON IoT dataset <ref type="bibr" target="#b4">[5]</ref> which comprises 357,383 data records in total. This dataset is based on a real production line of coffee capsules and the attribute under observation is the plastification time, that is the time which is needed to melt (plastify) the plastic melt for the actual injection molding cycle. More information about this process can be found in <ref type="bibr" target="#b2">[3]</ref>.</p><p>An overview of this attribute value, i.e. the pastification time, as a function of the cycle number is shown in Figure <ref type="figure" target="#fig_0">1</ref>. As can be seen in the figure, while the normal plastification time is at approximately 4.2 seconds, it drops down to less then 3 seconds in case of an anomaly. Supported by domain experts, we figured out 28 anomalies in total in this dataset, of which three are shown in the above figure.</p><p>In the first series of experiments, we computed the best fitting kernel expressions by means of the ABCD algorithm. The results are shown in Table <ref type="table">1</ref> for each anomaly. Together with the kernel expression of the corresponding anomaly, we also show the Bayesian Information Criterion (BIC) value which models the trade-off between model accuracy and size. As can be seen in the table, all anomalies are well described by their corresponding kernel expression (lower BIC values indicate better fit and vice versa). Surprisingly many kernel expressions do not show a linear component k LIN , although some anomalies clearly show this linear tendency. We figure out that this is due to overfitting of the kernel expression in the ABCD algorithm. We aim to address this issue in future research.</p><p>In the second series of experiments, we evaluated suitable a kernel expression of a certain anomaly fits to other anomalies. The results in form of the corresponding BIC values are summarized in Table <ref type="table">2</ref>. As can be seen in this table, kernel expressions of a certain anomaly do in general not fit to other anomalies. One reason for this behavior is the high degree of idiosyncrasy of the anomalies. Another reason might be the overfitting issue mentioned above.</p><p>To sum up, we have investigated the potential of describing anomalies in IoT sensor data by means of kernel expressions. Our preliminary results indicate that our proposal is well suited for this purpose. As one major challenge, we figure out that the problem of overfitting needs to be addressed in future research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">CONCLUSIONS AND FUTURE WORK</head><p>In this paper, we have addressed the problem of discovering the inherent structures of anomalies arising in IoT sensor data. To this end, we have proposed to model and describe anomalies by means of kernel expressions, which are combinations of well-known kernels. The results of our empirical analysis show that our proposal is suitable for modeling differently structured anomalies. Moreover, the results indicate that Gaussian processes provide a powerful tool for future algorithmic investigations of IoT sensor data.</p><p>In future work, we aim to address the problem of overfitting by modifying the grammar used within the ABCD algorithm for computing the kernel expressions. In addition, we aim to further develop our proposal in order to not only describe anomalies but also detect anomalies (which is not the focus of the current paper). For this purpose, we aim to measure similarity in IoT sensor data by incorporating Gaussian processes into adaptive distance-based similarity models, such as the Signature Matching Distance <ref type="bibr" target="#b5">[6]</ref>, and query processing algorithms <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ACKNOWLEDGMENTS</head><p>The project underlying this paper has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement No 723650 (MONSOON). This paper reflects only the authors' views and the commission is not responsible for any use that may be made of the information it contains.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: An example of the MONSOON IoT dataset with three anomalies.</figDesc><graphic coords="2,58.68,83.68,477.89,95.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>Anomaly BIC Kernel Expression 0 -799 C*PER + C*PER + C*PER 1 -706 C*SE*PER + C*SE + C 2 -604 C*PER + C*PER + C*PER + C 3 -921 C*SE*PER + C*PER + C 4 -742 C*PER + C*PER + C*SE + C 5 -543 C*SE*LIN + C*SE + C*WN + C 6 -630 C*PER + C*SE + C*WN + C 7 -1020 C*PER + C*PER + C*PER + C*SE + C 8 -762 C*SE*PER + C*PER + C 9 -1025 C*PER + C*PER + C*SE + C 10 -424 C*PER + C*SE + C*SE 11 -849 C*PER + C*PER + C*SE + C 12 -311 C*SE*PER + C*PER + C 13 -860 C*LIN + C*PER + C*PER + C*PER + C 14 -339 C*PER + C*SE + C*SE 15 -590 C*SE*PER + C*PER + C*SE 16 -503 C*PER + C*SE + C 17 -602 C*SE*PER + C*SE + C*WN + C 18 -545 C*PER + C*SE + C*SE + C 19 -804 C*PER + C*SE + C*WN + C 20 -281 C*PER + C*SE + C*SE 21 -426 C*PER + C*PER + C*SE 22 -425 C*SE*PER + C*PER + C*SE 23 -975 C*SE*PER + C*PER + C 24 -1181 C*PER*LIN + C*PER + C*SE 25 -880 C*PER*PER + C*PER + C*PER + C 26 -455 C*PER + C*PER + C*SE 27 -542 C*PER + C*SE + C*SE Table1: Discovered kernel structures and the Bayesian Information Criterion (BIC) for the encountered 28 anomalies.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>706 -371 -874 -613 -427 -384 -973 -705 -1003 -323 -780 -291 -775 -334 -540 -456 -453 -536 -783 -169 -271 -310 -922 -1008 -849 -452 712 -603 -861 -664 -543 -596 -1012 -726 -988 -340 -762 -278 -837 -343 -574 -481 -564 -364 -748 -262 -413 -425 -113 -1008 -862 -461 -522 6 -630 -690 -598 -812 -645 -519 -630 -942 -711 -955 -353 -727 -265 -803 -336 -576 -467 -555 -505 -711 -269 -415 -425 -866 -948 -818 -454 -4987 -710 -628 -203 -879 -571 -277 40 -1020 -610 -605 -280 -786 -289 -690 -308 -470 -443 -386 -532 -797 -105 -124 -165 -901 -979 -812 -434 799 -295 1808 -339 -521 -473 -514 -552 -790 -228 -308 -316 1284 1396 -311 -456 -543 9 -707 -676 -341 -876 -603 -353 -321 -949 -680 -1025 -295 -789 -295 -739 -315 -524 -445 -417 -531 -796 -150 -188 -245 -942 -1030 -833 -417 -516 10 1100 17963 39634 11743 9764 28200 42825 21496 17842 23668 -424 8490 -256 21496 -321 14360 744 16475 1186 6690 -280 27159 22641 15147 16334 16285 1852 5048 11 -768 -264 35152 4123 -613 -275 38575 16915 1813 4547 -205 -849 -308 5682 -282 -366 -453 -369 -525 -843 8404 10581 20436 43440 13649 15087 12678 12444 7084 -311 19649 2792 22502 6864 8959 5856 3580 12974 23140 20507 10828 10761 14404 7576 8797 13 -725 -690 -329 -897 -661 -390 -274 -531 -707 -44 -338 -807 -298 -860 -349 -553 -495 -471 -560 -825 -195 -315 -302 -868 -766 -824 -477 -545 14 782 10272 34307 5692 10540 17399 39816 11292 15353 11941 10135 4633 -286 16934 -339 12064 3486 13876 4713 3175 3996 19687 17287 8695 8431 10076 5533 7290 15 -682 -142 18892 2896 -648 -460 25790 2757 3848 4590 -349 109 -284 1571 -334 -590 -464 -486 -536 -740 -212 -320 -341 3514 2919 4823 -462 -531 16 841 16636 45060 7627 6465 22063 46105 23901 15094 9764 -353 8375 -304 18458 -344 18424 -503 15531 1180 5836 -224 18906 21613 9877 12135 16161 216 2171 17 -728 -706 43 -883 -687 -192 -253 -1034 -724 -1057 -152 -795 -293 -826 -353 -157 -488 -602 -524 -813 690 -188 -922 -622 -337 -189 -699 -687 -615 -254 -828 -305 -757 -318 -487 -446 -388 -551 -842 -69 -124 -180 -975 -798 -853 -438 433 -438 -387 -532 -809 -77 -127 -190 -326 -942 -880 -425 -513 26 108 9489 32787 5935 4124 14088 43508 10486 13005 11777 -335 6449 -280 9810 -322 13738 -450 12148 439 1934 -185 15172 15764 7871 5359 10290 -455 792 27 188 10101 32689 4425 2295 8295 35339 11450 12860 9609 -325 5189 -294 9651 -318 9626 -455 6945 -535 1349 -151 -231 7129 7497 8193 10342 -437 -542 Table 2: Evaluation of the BIC for every kernel expression against every anomaly.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">www.spire2030.eu/monsoon Published in the Workshop Proceedings of the EDBT/ICDT</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2019" xml:id="foot_1">Joint Conference (March 26, 2019, Lisbon, Portugal) on CEUR-WS.org.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_2">It is noteworthy that this approach also applies to multivariate data.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A comparative evaluation of anomaly detection algorithms for maritime video surveillance</title>
		<author>
			<persName><forename type="first">Bryan</forename><surname>Auslander</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kalyan</forename><forename type="middle">Moy</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">W</forename><surname>Aha</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.883535</idno>
		<ptr target="https://doi.org/10.1117/12.883535" />
	</analytic>
	<monogr>
		<title level="m">Proc. SPIE 8019, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X (SPIE Proceedings)</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Edward</surname></persName>
		</editor>
		<editor>
			<persName><surname>Carapezza</surname></persName>
		</editor>
		<meeting>SPIE 8019, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X (SPIE eedings)</meeting>
		<imprint>
			<publisher>SPIE</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page">801907</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Optimal k-Nearest-Neighbor Query Processing via Multiple Lower Bound Approximations</title>
		<author>
			<persName><forename type="first">Christian</forename><surname>Beecks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Max</forename><surname>Berrendorf</surname></persName>
		</author>
		<idno type="DOI">10.1109/BigData.2018.8622493</idno>
		<ptr target="https://doi.org/10.1109/BigData.2018.8622493" />
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Big Data, Big Data 2018</title>
				<meeting><address><addrLine>Seattle, WA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018-12-10">2018. December 10-13, 2018</date>
			<biblScope unit="page" from="614" to="623" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Machine Learning for Enhanced Waste Quantity Reduction: Insights from the MON-SOON Industry 4.0 Project</title>
		<author>
			<persName><forename type="first">Christian</forename><surname>Beecks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shreekantha</forename><surname>Devasya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ruben</forename><surname>Schlutter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Machine Learning for Cyber Physical Systems</title>
				<editor>
			<persName><forename type="first">Jürgen</forename><surname>Beyerer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Christian</forename><surname>Kühnert</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Oliver</forename><surname>Niggemann</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Multi-step threshold algorithm for efficient feature-based query processing in large-scale multimedia databases</title>
		<author>
			<persName><forename type="first">Christian</forename><surname>Beecks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexander</forename><surname>Graß</surname></persName>
		</author>
		<idno type="DOI">10.1109/BigData.2016.7840652</idno>
		<ptr target="https://doi.org/10.1109/BigData.2016.7840652" />
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Big Data, BigData 2016</title>
				<meeting><address><addrLine>Washington DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016-12-05">2016. 2016. December 5-8, 2016</date>
			<biblScope unit="page" from="596" to="605" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Metric Indexing for Efficient Data Access in the Internet of Things</title>
		<author>
			<persName><forename type="first">Christian</forename><surname>Beecks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexander</forename><surname>Grass</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shreekantha</forename><surname>Devasya</surname></persName>
		</author>
		<idno type="DOI">10.1109/BigData.2018.8622387</idno>
		<ptr target="https://doi.org/10.1109/BigData.2018.8622387" />
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Big Data, Big Data 2018</title>
				<meeting><address><addrLine>Seattle, WA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018-12-10">2018. December 10-13, 2018</date>
			<biblScope unit="page" from="5132" to="5136" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Signature matching distance for content-based image retrieval</title>
		<author>
			<persName><forename type="first">Christian</forename><surname>Beecks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Steffen</forename><surname>Kirchhoff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><surname>Seidl</surname></persName>
		</author>
		<idno type="DOI">10.1145/2461466.2461474</idno>
		<ptr target="https://doi.org/10.1145/2461466.2461474" />
	</analytic>
	<monogr>
		<title level="m">International Conference on Multimedia Retrieval, ICMR&apos;13</title>
				<meeting><address><addrLine>Dallas, TX, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2013-04-16">2013. April 16-19, 2013</date>
			<biblScope unit="page" from="41" to="48" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">LOF: Identifying Density-Based Local Outliers</title>
		<author>
			<persName><forename type="first">Markus</forename><surname>Breunig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hans-Peter</forename><surname>Kriegel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Raymond</forename><forename type="middle">T</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jörg</forename><surname>Sander</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data</title>
				<meeting>the 2000 ACM SIGMOD International Conference on Management of Data</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="93" to="104" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">Arno</forename><surname>Candel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Erin</forename><surname>Ledell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Viraj</forename><surname>Parmar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anisha</forename><surname>Arora</surname></persName>
		</author>
		<ptr target="http://docs.h2o.ai/h2o/latest-stable/h2o-docs/booklets/DeepLearningBooklet.pdf" />
		<title level="m">Deep Learning with H2O</title>
				<imprint>
			<date type="published" when="2018-01">2018. 01/08/2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Anomaly Detection: A Survey</title>
		<author>
			<persName><forename type="first">Varun</forename><surname>Chandola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arindam</forename><surname>Banerjee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vipin</forename><surname>Kumar</surname></persName>
		</author>
		<idno type="DOI">10.1145/1541880.1541882</idno>
		<ptr target="https://doi.org/10.1145/1541880.1541882" />
	</analytic>
	<monogr>
		<title level="j">ACM Comput. Surv</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">58</biblScope>
			<date type="published" when="2009-07">2009. July 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">An Application of Unsupervised Fraud Detection to Passenger Name Records</title>
		<author>
			<persName><forename type="first">R</forename><surname>Domingues</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Buonora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Senesi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Thonnard</surname></persName>
		</author>
		<idno type="DOI">10.1109/DSN-W.2016.21</idno>
		<ptr target="https://doi.org/10.1109/DSN-W.2016.21" />
	</analytic>
	<monogr>
		<title level="m">46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="54" to="59" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">David</forename><surname>Duvenaud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">James</forename><forename type="middle">Robert</forename><surname>Lloyd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roger</forename><surname>Grosse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joshua</forename><forename type="middle">B</forename><surname>Tenenbaum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zoubin</forename><surname>Ghahramani</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1302.4922</idno>
		<title level="m">Structure Discovery in Nonparametric Regression through Compositional Kernel Search</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Geometric Framework for Unsupervised Anomaly Detection</title>
		<author>
			<persName><forename type="first">Eleazar</forename><surname>Eskin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrew</forename><surname>Arnold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Prerau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Leonid</forename><surname>Portnoy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sal</forename><surname>Stolfo</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-1-4615-0953-0{_}4</idno>
		<ptr target="https://doi.org/10.1007/978-1-4615-0953-0{_}4" />
	</analytic>
	<monogr>
		<title level="m">Applications of Data Mining in Computer Security</title>
				<editor>
			<persName><forename type="first">Daniel</forename><surname>Barbará</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Sushil</forename><surname>Jajodia</surname></persName>
		</editor>
		<meeting><address><addrLine>Boston, MA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer US and Imprint and Springer</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="77" to="101" />
		</imprint>
	</monogr>
	<note>Advances in Information Security</note>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data</title>
		<author>
			<persName><forename type="first">Markus</forename><surname>Goldstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Seiichi</forename><surname>Uchida</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Unsupervised Anomaly Detection in Production Lines</title>
		<author>
			<persName><forename type="first">Alexander</forename><surname>Graß</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christian</forename><surname>Beecks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jose</forename><surname>Angel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Carvajal</forename><surname>Soto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Machine Learning for Cyber Physical Systems</title>
				<editor>
			<persName><forename type="first">Jürgen</forename><surname>Beyerer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Christian</forename><surname>Kühnert</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Oliver</forename><surname>Niggemann</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="18" to="25" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Automatic Construction of Nonparametric Relational Regression Models for Multiple Time Series</title>
		<author>
			<persName><forename type="first">Yunseong</forename><surname>Hwang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anh</forename><surname>Tong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jaesik</forename><surname>Choi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research</title>
				<editor>
			<persName><forename type="first">Maria</forename></persName>
		</editor>
		<editor>
			<persName><forename type="first">Florina</forename><surname>Balcan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Kilian</forename><forename type="middle">Q</forename><surname>Weinberger</surname></persName>
		</editor>
		<meeting>the 33rd International Conference on Machine Learning ( Machine Learning Research</meeting>
		<imprint>
			<publisher>PLMR</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="page" from="3030" to="3039" />
		</imprint>
	</monogr>
	<note>ICML 2016</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Isolation Forest</title>
		<author>
			<persName><forename type="first">Tony</forename><surname>Fei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kai</forename><forename type="middle">Ming</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zhi-Hua</forename><surname>Ting</surname></persName>
		</author>
		<author>
			<persName><surname>Zhou</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICDM.2008.17</idno>
		<ptr target="https://doi.org/10.1109/ICDM.2008.17" />
	</analytic>
	<monogr>
		<title level="m">Eighth IEEE International Conference on Data Mining</title>
				<editor>
			<persName><forename type="first">Fosca</forename><surname>Giannotti</surname></persName>
		</editor>
		<meeting><address><addrLine>Piscataway, NJ</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="413" to="422" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">James</forename><surname>Robert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lloyd</forename></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Duvenaud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roger</forename><surname>Grosse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joshua</forename><forename type="middle">B</forename><surname>Tenenbaum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zoubin</forename><surname>Ghahramani</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1402.4304</idno>
		<title level="m">Automatic Construction and Natural-Language Description of Nonparametric Regression Models</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Scikit-learn: Machine Learning in Python</title>
		<author>
			<persName><forename type="first">Fabian</forename><surname>Pedregosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gaël</forename><surname>Varoquaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexandre</forename><surname>Gramfort</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincent</forename><surname>Michel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bertrand</forename><surname>Thirion</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Olivier</forename><surname>Grisel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mathieu</forename><surname>Blondel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peter</forename><surname>Prettenhofer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ron</forename><surname>Weiss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincent</forename><surname>Dubourg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jake</forename><surname>Vanderplas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexandre</forename><surname>Passos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Cournapeau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matthieu</forename><surname>Brucher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matthieu</forename><surname>Perrot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Édouard</forename><surname>Duchesnay</surname></persName>
		</author>
		<ptr target="http://dl.acm.org/citation.cfm?id=1953048.2078195" />
	</analytic>
	<monogr>
		<title level="j">J. Mach. Learn. Res</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="2825" to="2830" />
			<date type="published" when="2011-11">2011. Nov. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">A Comprehensive Survey of Data Mining-based Fraud Detection Research</title>
		<author>
			<persName><forename type="first">Clifton</forename><surname>Phua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Vincent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kate</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ross</forename><forename type="middle">W</forename><surname>Smith-Miles</surname></persName>
		</author>
		<author>
			<persName><surname>Gayler</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1009.6119</idno>
		<ptr target="http://arxiv.org/abs/1009.6119" />
		<imprint>
			<date type="published" when="2010">2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Gaussian Processes for Machine Learning (Adaptive Computation And Machine Learning</title>
		<author>
			<persName><forename type="first">Carl</forename><surname>Edward Rasmussen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christopher</forename><forename type="middle">K I</forename><surname>Williams</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>The MIT Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Benchmarking Anomaly Detection Algorithms in an Industrial Context: Dealing with Scarce Labels and Multiple Positive Types</title>
		<author>
			<persName><forename type="first">David</forename><surname>Renaudie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maria</forename><forename type="middle">A</forename><surname>Zuluaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rodrigo</forename><surname>Acuna-Agost</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Big Data</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1227" to="1236" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Least median of squares regression</title>
		<author>
			<persName><forename type="first">Rousseeuw</forename><surname>Peter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the American statistical association</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="871" to="880" />
			<date type="published" when="1984">1984. 1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Estimating the Support of a High-Dimensional Distribution</title>
		<author>
			<persName><forename type="first">Bernhard</forename><surname>Schölkopf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">C</forename><surname>Platt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">C</forename><surname>Shawe-Taylor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alex</forename><forename type="middle">J</forename><surname>Smola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Robert</forename><forename type="middle">C</forename><surname>Williamson</surname></persName>
		</author>
		<idno type="DOI">10.1162/089976601750264965</idno>
		<ptr target="https://doi.org/10.1162/089976601750264965" />
	</analytic>
	<monogr>
		<title level="j">Neural Comput</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="1443" to="1471" />
			<date type="published" when="2001-07">2001. July 2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods</title>
		<author>
			<persName><forename type="first">M</forename><surname>Tavallaee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Stakhanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
		<idno type="DOI">10.1109/TSMCC.2010.2048428</idno>
		<ptr target="https://doi.org/10.1109/TSMCC.2010.2048428" />
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="516" to="524" />
			<date type="published" when="2010-09">2010. September 2010</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
