Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 1542540, 11 pages
http://dx.doi.org/10.1155/2016/1542540
Research Article

Latent Clustering Models for Outlier Identification in Telecom Data

1Columbia University, New York, NY, USA
2Nanjing Howso Technology, Nanjing, China
3Georgia State University, Atlanta, GA, USA
4Department of Marketing, The Chinese University of Hong Kong, Shatin, Hong Kong

Received 29 July 2016; Revised 3 November 2016; Accepted 17 November 2016

Academic Editor: Mariusz Głąbowski

Copyright © 2016 Ye Ouyang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. J. McLachlan and K. E. Basford, “Mixture models. Inference and applications to clustering,” in Statistics: Textbooks and Monographs, Dekker, New York, NY, USA, 1988. View at Google Scholar
  2. T. Hofmann, “Probabilistic latent semantic analysis,” in Proceedings of the 15th Conference on Uncertainty in Artificial Intelligence, Morgan Kaufmann, 1999.
  3. R Core Team, R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing, Vienna, Austria, 2016, https://www.R-project.org/.
  4. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: a survey,” ACM Computing Surveys, vol. 41, no. 3, article 15, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. P. Laskov, P. Düssel, C. Schäfer, and K. Rieck, “Learning intrusion detection: supervised or unsupervised?” in Image Analysis and Processing—ICIAP 2005: 13th International Conference, Cagliari, Italy, September 6–8, 2005. Proceedings, vol. 3617 of Lecture Notes in Computer Science, pp. 50–57, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  6. N. V. Chawla, N. Japkowicz, and A. Kotcz, “Editorial: special issue on learning from imbalanced data sets,” ACM Sigkdd Explorations Newsletter, vol. 6, no. 1, pp. 1–6, 2004. View at Publisher · View at Google Scholar
  7. C. Phua, D. Alahakoon, and V. Lee, “Minority report in fraud detection: classification of skewed data,” ACM SIGKDD Explorations Newsletter, vol. 6, no. 1, pp. 50–59, 2004. View at Publisher · View at Google Scholar
  8. A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. V. Bamnett and T. Lewis, Outliers in Statistical Data, 1994.
  10. D. Agarwal, “Detecting anomalies in cross-classified streams: a Bayesian approach,” Knowledge and Information Systems, vol. 11, no. 1, pp. 29–44, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. A. K. Jain, “Data clustering: 50 years beyond K-means,” Pattern Recognition Letters, vol. 31, no. 8, pp. 651–666, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. A. P. Dempster, N. M. Laird, and D. B. Rubin, “Maximum likelihood from incomplete data via the EM algorithm,” Journal of the Royal Statistical Society Series B: Methodological, vol. 39, no. 1, pp. 1–38, 1977. View at Google Scholar · View at MathSciNet
  13. H. Hajji, “Statistical analysis of network traffic for adaptive faults detection,” IEEE Transactions on Neural Networks, vol. 16, no. 5, pp. 1053–1063, 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Ouyang, M. H. Fallah, S. Hu et al., “A novel methodology of data analytics and modeling to evaluate LTE network performance,” in Proceedings of the 13th Annual Wireless Telecommunications Symposium (WTS '14), IEEE, Washington, DC, USA, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. M. J. Desforges, P. J. Jacob, and J. E. Cooper, “Applications of probability density estimation to the detection of abnormal conditions in engineering,” Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, vol. 212, no. 8, pp. 687–703, 1998. View at Publisher · View at Google Scholar · View at Scopus
  16. M. M. T. Chiang and B. Mirkin, “Intelligent choice of the number of clusters in k-means clustering: an experimental study with different cluster spreads,” Journal of Classification, vol. 27, no. 1, pp. 3–40, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. M. Gupta, J. Gao, C. Aggarwal, and J. Han, “Outlier detection for temporal data,” Synthesis Lectures on Data Mining and Knowledge Discovery, vol. 5, pp. 1–129, 2014. View at Publisher · View at Google Scholar
  18. S. Rayana and L. Akoglu, “Less is more: building selective anomaly ensembles,” ACM Transactions on Knowledge Discovery from Data, vol. 10, no. 4, article 42, 2016. View at Publisher · View at Google Scholar
  19. Y. Ouyang and T. Yan, “Profiling wireless resource usage for mobile apps via crowdsourcing-based network analytics,” IEEE Internet of Things Journal, vol. 2, no. 5, pp. 391–398, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Guo, W. Huang, and B. M. Williams, “Real time traffic flow outlier detection using short-term traffic conditional variance prediction,” Transportation Research Part C: Emerging Technologies, vol. 50, pp. 160–172, 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Y. Lokhov, N. Lemons, T. C. McAndrew, A. Hagberg, and S. Backhaus, “Detection of cyber-physical faults and intrusions from physical correlations,” https://arxiv.org/abs/1602.06604.
  22. Y. Ouyang and H. M. Fallah, “A performance analysis for UMTS packet switched network based on multivariate KPIs,” in Proceedings of the IEEE Wireless Telecommunications Symposium, Tampa, Fla, USA, April 2010.
  23. T. Hofmann, “Probabilistic latent semantic indexing,” in Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '99), Berkeley, Calif, USA, 1999. View at Publisher · View at Google Scholar
  24. Z. Lu, W. Pan, E. W. Xiang, Q. Yang, L. Zhao, and E. H. Zhong, “Selective transfer learning for cross domain recommendation,” https://arxiv.org/abs/1210.7056.
  25. H. Wickham, Elegant Graphics for Data Analysis, Springer Science & Business Media, 2009.
  26. R. J. Little and D. B. Rubin, Statistical Analysis with Missing Data, Wiley Series in Probability and Mathematical Statistics: Applied Probability and Statistics, John Wiley & Sons, New York, NY, USA, 1987. View at MathSciNet