[1]ZHANG He,CAI Jiang-hui,ZHANG Ji-fu,et al.An outlier mining algorithm based on information entropy[J].CAAI Transactions on Intelligent Systems,2010,5(2):150-155.
Copy

An outlier mining algorithm based on information entropy

References:
[1]HAN Jiawei, KAMBER M. Data mining:concepts and techniques[M].Bejing:China Machine Press, 2006:254255
[2]HAWKINS D. Identification of outliers [M].London:Chapman and Hall, 1980:228.
[3]BARNETT V, LEWIS T. Outliers in statistical data[M].New York: John Wiley & Sons,1994:7,49.
[4]RUTS I, ROUSSEEUW P. Computing depth contours of bivariate point clouds[J]. Computational Statistics and Data Analysis,1996,23(1):153168.
[5]ARNING A, AGRAWAL R, RAGHAVAN P.A linear method for deviation in large database[C]//Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining. Portlan,Oregon,USA,1996:164169.
?[6]KNORR E M, NG R T. Algorithms of mining distancebased outliers in large datasets[C]//Proc of Int Conf on Very Large Database (VLDB’98).New York,USA, 1998:392402
.[7]BREUNIG M M, KRIEGEL H P, NG R T, et al. LOF: identifying densitybased local outliers[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data. Dallas: ACM Press, 2000:93104.
[8]熊家军,李庆华.信息熵理论与入侵检测聚类问题研究[J].小型微型计算机系统,2005, 26(7):11631166.
XIONG Jiajun, LI Qinghua. Study on clustering problem for intrusion detection with information entropy[J]. Minimicro Systems,2005,26(7):11631166.
[9]薛 萍,金鸿章,王 双.应用最大熵原理分析通信系统脆性风险[J]. 电机与控制学报,2007,11(2): 7478.
XUE Ping, JIN Hongzhang,WANG Shuang. Application of the maximum entropy principle to brittleness risk analysis on communication system[J]. Electric Machines and Control, 2007, 11(2): 7478.
[10]HE Zengyou, XU Xiaofei, DENG Shengchun. A fast greedy algorithm for outlier mining[C]//Proceedings of PAKDD’2006 (LNAI3918). Berlin: SpringerVerlag, 2006:567576.
[11]倪巍伟,陈 耿,陆介平,等.基于局部信息熵的加权子空间离群点检测算法[J].计算机研究与发展,2008,45(7):11891192. NI Weiwei, CHEN Geng, LU Jieping. Local entropy based weighted subspace outlier mining algorithm [J]. Journal of Computer Research and Development, 2008, 45(7):11891192.
[12]于绍越,商 琳. ENBROD:基于信息熵的相对离群点的检测方法[J].南京大学学报:自然科学版,2008,44 (2):11891194. YU Shaoyue, SHANG Lin. An entropybased algorithm to detect relative outliers: ENBROD[J].Journal of Nanjing University:Natural Sciences, 2008,44 (2):11891194. 
[13]DUDA R O, HART P E, STOCK D G. Pattern classification[M].2nd ed. Beijing: China Machine Press, 2003:317356.
[14]NEWMAN D J, HETTICH S, BLAKE C L, et al. UCI repository of machine learning databases[DB/OL]. Irvine, CA: University of California, Department of Information and Computer Science,1998.[20080925]http://www.ics.uci.edu/~mlearn/MLRepository.html.
?[15]张继福,蒋义勇,胡立华,等.基于概念格的天体光谱离群数据识别方法[J].自动化学报,2007,34(9):10601066. ZHANG Jifu, JIANG Yiyong, HU Lihua, et al. A concept lattice based recognition method of celestial spectra outliers[J]. Acta Automatica Sinica, 2007,34(9):10601066.
Similar References:

Memo

-

Last Update: 2010-05-24

Copyright © CAAI Transactions on Intelligent Systems