Research Article

Latent Clustering Models for Outlier Identification in Telecom Data

Table 1

Anomaly detection methods compared.

ā€‰No dateDate

No clusteringGaussianTime-Gaussian
ClusteringGMM(i) Time-GMM
(ii) GPLSA