Quantum algorithm for unsupervised anomaly detection
نویسندگان
چکیده
Anomaly detection, an important branch of machine learning, plays a critical role in fraud health care, intrusion military surveillance, etc. As one the most commonly used unsupervised anomaly detection algorithms, Local Outlier Factor algorithm (LOF algorithm) has been extensively studied. This contains three steps, i.e., determining k-distance neighborhood for each data point x, computing local reachability density and calculating outlier factor x to judge whether is abnormal. The LOF computationally expensive when processing big sets. Here we present quantum consisting parts corresponding classical algorithm. Specifically, determined by amplitude estimation minimum search; calculated parallel based on multiply-adder; obtained using estimation. It shown that our achieves exponential speedup dimension points polynomial number compared its counterpart. work demonstrates advantage detection.
منابع مشابه
Unsupervised Anomaly Detection
This paper describes work on the detection of anomalous material in text. We show several variants of an automatic technique for identifying an 'unusual' segment within a document, and consider texts which are unusual because of author, genre [Biber, 1998], topic or emotional tone. We evaluate the technique using many experiments over large document collections, created to contain randomly inse...
متن کاملA Bayesian Ensemble for Unsupervised Anomaly Detection
Methods for unsupervised anomaly detection suffer from the fact that the data is unlabeled, making it difficult to assess the optimality of detection algorithms. Ensemble learning has shown exceptional results in classification and clustering problems, but has not seen as much research in the context of outlier detection. Existing methods focus on combining output scores of individual detectors...
متن کاملUnsupervised Clustering Approach for Network Anomaly Detection
This paper describes the advantages of using the anomaly detection approach over the misuse detection technique in detecting unknown network intrusions or attacks. It also investigates the performance of various clustering algorithms when applied to anomaly detection. Five different clustering algorithms: k-Means, improved k-Means, k-Medoids, EM clustering and distance-based outlier detection a...
متن کاملNetwork Anomaly Detection Using Unsupervised Model
Most existing network intrusion detection systems use signature-based methods which depend on labeled training data. This training data is usually expensive to produce due to cost of laboratory set up, experienced or knowledge person and non availability of ready software tool. Above all, these methods have difficulty in detecting new or unknown types of attacks. Using unsupervised anomaly dete...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physica D: Nonlinear Phenomena
سال: 2023
ISSN: ['1872-8022', '0167-2789']
DOI: https://doi.org/10.1016/j.physa.2023.129018