Discovering the top-k unexplained sequences in time-stamped observation data

Massimiliano Albanese, Cristian Molinaro, Fabio Persia, Antonio Picariello, V. S. Subrahmanian

Research output: Contribution to journalArticlepeer-review

34 Scopus citations

Abstract

There are numerous applications where we wish to discover unexpected activities in a sequence of time-stamped observation data-for instance, we may want to detect inexplicable events in transactions at a website or in video of an airport tarmac. In this paper, we start with a known set A of activities (both innocuous and dangerous) that we wish to monitor. However, in addition, we wish to identify "unexplained" subsequences in an observation sequence that are poorly explained (e.g., because they may contain occurrences of activities that have never been seen or anticipated before, i.e., they are not in A. We formally define the probability that a sequence of observations is unexplained (totally or partially) w.r.t. A. We develop efficient algorithms to identify the top-k Totally and partially unexplained sequences w.r.t. A. These algorithms leverage theorems that enable us to speed up the search for totally/partially unexplained sequences. We describe experiments using real-world video and cyber-security data sets showing that our approach works well in practice in terms of both running time and accuracy.

Original languageEnglish (US)
Article number6506840
Pages (from-to)577-594
Number of pages18
JournalIEEE Transactions on Knowledge and Data Engineering
Volume26
Issue number3
DOIs
StatePublished - Mar 2014
Externally publishedYes

Keywords

  • Knowledge representation formalisms and methods
  • artificial intelligence
  • computing methodologies
  • knowledge base management
  • knowledge representation formalisms and methods

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Discovering the top-k unexplained sequences in time-stamped observation data'. Together they form a unique fingerprint.

Cite this