QANet: Tensor Decomposition Approach for Query-based Anomaly Detection in Heterogeneous Information Networks

10/19/2018
by   Vahid Ranjbar, et al.
0

Complex networks have now become integral parts of modern information infrastructures. This paper proposes a user-centric method for detecting anomalies in heterogeneous information networks, in which nodes and/or edges might be from different types. In the proposed anomaly detection method, users interact directly with the system and anomalous entities can be detected through queries. Our approach is based on tensor decomposition and clustering methods. We also propose a network generation model to construct synthetic heterogeneous information network to test the performance of the proposed method. The proposed anomaly detection method is compared with state-of-the-art methods in both synthetic and real-world networks. Experimental results show that the proposed tensor-based method considerably outperforms the existing anomaly detection methods.

READ FULL TEXT

page 1

page 8

page 9

page 10

research
09/11/2019

Anomaly Detection with Inexact Labels

We propose a supervised anomaly detection method for data with inexact a...
research
04/20/2020

Network Anomaly Detection based on Tensor Decomposition

The problem of detecting anomalies in time series from network measureme...
research
06/03/2020

Anomaly Detection with Tensor Networks

Originating from condensed matter physics, tensor networks are compact r...
research
06/26/2021

Detecting anomalies in heterogeneous population-scale VAT networks

Anomaly detection in network science is the method to determine aberrant...
research
06/14/2020

Categorical anomaly detection in heterogeneous data using minimum description length clustering

Fast and effective unsupervised anomaly detection algorithms have been p...
research
07/02/2021

A Collective Anomaly Detection Method Over Bitcoin Network

The popularity and amazing attractiveness of cryptocurrencies, and espec...
research
01/06/2022

Distributed Online Anomaly Detection for Virtualized Network Slicing Environment

As the network slicing is one of the critical enablers in communication ...

Please sign up or login with your details

Forgot password? Click here to reset