| |||||||||||||||
ODDx3 2015 : KDD 2015 Workshop on Outlier Definition, Detection, and Description | |||||||||||||||
Link: http://outlier-analytics.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
KDD 2015 Workshop on Outlier Definition, Detection, and Description
-------------------------------------------------------------------------- CALL FOR RESEARCH PAPERS ODDx3 @ KDD 2015 Workshop on Outlier Definition, Detection, and Description will be held in conjunction with KDD 2015 August 10, 2015 in Sydney, Australia http://outlier-analytics.org -------------------------------------------------------------------------- The main goal of the ODD workshop is to bring together academics, industry and government researchers and practitioners to discuss and reflect on outlier mining challenges. The 1st ODD (2013) workshop focused on outlier detection and description, with particular emphasis on descriptive methods that could help make sense of the detected outliers. The 2nd ODD^2 (2014) workshop extended the focus areas to outlier detection and description under data diversity, with emphasis on challenges associated with mining outliers in heterogeneous data environments (graphs, text, streams, etc.). This year, we broaden the scope to also include the translation of real world applications to different outlier definitions. Our goal is to highlight challenges associated with (1) outlier mining by new theoretic models and efficient algorithms, (2) translating real world problems to one/multiple of these definitions, and (3) comparing these definitions in their detection quality for unknown outlier instances. In all, the 3rd ODDx3 aims to increase awareness of the community to the following challenges of outlier mining: What is an outlier/anomaly? How can we define an anomaly in heterogeneous data environments? How do different definitions translate to real world applications (spam, fraud, etc.)? How can real world scenarios help shape new anomaly definitions? How can we build descriptive detection methods? How could data visualization aid anomaly mining? CONFIRMED KEYNOTE SPEAKERS: --------------------------- We are proud to have Vipin Kumar and Xifeng Yan as our keynote speakers. Vipin Kumar is a William Norris Professor and Head of the Computer Science and Engineering Department at the University of Minnesota. Dr. Kumar's current research interests include data mining, high-performance computing, and their applications in Climate/Ecosystems and Biomedical domains. His research has resulted in the development of the concept of isoefficiency metric for evaluating the scalability of parallel algorithms, as well as highly efficient parallel algorithms and software for sparse matrix factorization (PSPASES) and graph partitioning (METIS, ParMetis, hMetis). He has authored over 300 research articles, and has coedited or coauthored 11 books including widely used text books ``Introduction to Parallel Computing'' and ``Introduction to Data Mining''. Dr. Kumar co-founded SIAM International Conference on Data Mining and served as a founding co-editor-in-chief of Journal of Statistical Analysis and Data Mining (an official journal of the American Statistical Association). Dr. Kumar is a Fellow of the ACM, IEEE and AAAS. Kumar's foundational research in data mining and its applications to scientific data was honored by the ACM SIGKDD 2012 Innovation Award, which is the highest award for technical excellence in the field of Knowledge Discovery and Data Mining (KDD). His h-index is 90. Xifeng Yan is an associate professor at the University of California at Santa Barbara. He holds the Venkatesh Narayanamurti Chair of Computer Science. He received his Ph.D. degree in Computer Science from the University of Illinois at Urbana-Champaign in 2006. He was a research staff member at the IBM T. J. Watson Research Center between 2006 and 2008. He has been working on modeling, managing, and mining graphs in information networks, computer systems, social media and bioinformatics. His works were extensively referenced, with over 9,000 citations per Google Scholar and thousands of software downloads. He received NSF CAREER Award, IBM Invention Achievement Award, ACM-SIGMOD Dissertation Runner-Up Award, and IEEE ICDM 10-year Highest Impact Paper Award. ODDx3 PANEL: "What is an anomaly?" --------------------------- This year, ODD includes a panel consisting of researchers from both academia and industry with expertise/experience in outlier mining and fraud detection. Despite its immense popularity, anomaly mining remains an extremely challenging task for many real world applications. For many practitioners, the task is poorly defined and under-specified as existing definitions and solutions have been often too simplistic and do not directly correspond to the needs of modern applications. The first goal of the panel is to have experts from various domains (or researchers who heavily collaborate with such) to describe the kind of anomaly problems they are facing with in the real world. The second goal is then to try to tie existing definitions in the literature to those encountered in the real world, and if no appropriate definitions exist, try to brainstorm possible new formulations. PANELISTS (tentative) - Tina Eliassi-Rad (Rutgers) (malware & fraud detection) - Ted E. Senator (Leidos) (insider threat detection) - Jimeng Sun (Georgia Tech.) (outliers in medical data) - Weng-Keen Wong (Oregon State U.) (outbreak detection) TOPICS OF INTEREST --------------------------- Topics of interests for the proposed workshop include, but are not limited to: interleaved detection and description of outliers description models for given outliers pattern and local information based outlier description ensemble methods for outlier detection and description novel outlier models for complex anomalies outlier detection methods for complex anomalies in heterogeneous datasets multi-view outlier ensembles over multiple data sources comparative studies on outlier detection identification of outlier rules supervised and unsupervised outlier detection statistical and information-theoretic outlier detection and description distance-based models for outlier ranking density-based models for local outlier ranking subspace outlier mining in high dimensional data community outlier mining in graph data anytime outlier mining in stream data contrast mining and causality analysis visualizations for outlier mining results visual analytics for interactive detection and evaluation of outliers human-in-the-loop modeling and learning Application areas of interest include, but are not limited to: Fraud detection, and data logs Health surveillance, and other sensor databases Video surveillance, and other streaming databases Customer analysis, and other transactional data sources Process logs, and other sequential or ordered data Social networks, and other graph databases We encourage submissions describing innovative work in related fields that address the issue of data diversity in outlier mining. SUBMISSION GUIDELINES --------------------------- We invite submission of unpublished original research papers that are not under review elsewhere. All papers will be peer reviewed. If accepted, at least one of the authors must attend the workshop to present their work. The submitted papers must be written in English and formatted according to the ACM Proceedings Template (Tighter Alternate style) available at: http://www.acm.org/sigs/publications/proceedings-templates The maximum length of papers is 10 pages in this format. We also invite vision papers and descriptions of work-in-progress or case studies on benchmark data as short paper submissions of up to 4 pages. The papers should be in PDF format and submitted via EasyChair submission site https://www.easychair.org/conferences/?conf=odd15kdd Accepted papers will be included in the KDD 2015 Digital Proceedings, and made available in the ACM Digital Library. If you are considering submitting to the workshop and have questions regarding the workshop scope or need further information, please do not hesitate to contact the organizers at odd15kdd (at) outlier-analytics.org. IMPORTANT DATES --------------------------- Extended submission deadline: June 12, 2015, 23:59 PST Acceptance notification: June 30, 2015, 23:59 PST Camera-ready deadline: July 10, 2015, 23:59 PST Workshop day: August 10, 2015 PROGRAM COMMITTEE (tentative) --------------------------- Fabrizio Angiulli (University of Calabria) Ira Assent (Aarhus University) Arindam Banerjee (University of Minnesota) Albert Bifet (University of Waikato) Petko Bogdanov (SUNY Albany) Rajmonda Caceres (MIT Lincoln Laboratory) Varun Chandola (SUNY Buffalo) Polo Chau (Georgia Tech) Sanjay Chawla (University of Syndey) Tina Eliassi-Rad (Rutgers) Christos Faloutsos (Carnegie Mellon University) Jing Gao (SUNY Buffalo) Manish Gupta (Microsoft) Daniel B. Neill (Carnegie Mellon University) Joerg Sander (University of Alberta) Hanghang Tong (Arozina State) Ye Wang (Ohio State University) Arthur Zimek (Ludwig-Maximilians-Universitdt Munchen) ORGANIZERS --------------------------- Leman Akoglu (Stony Brook University) Sanjay Chawla (University of Sydney) Emmanuel Muller (Karlsruhe Institute of Technology) Ted E. Senator (Leidos--previously SAIC) Contact us at: odd15kdd (at) outlier-analytics.org |
|