posted by user: lemanakoglu || 5032 views || tracked by 12 users: [display]

ODDx3 2015 : KDD 2015 Workshop on Outlier Definition, Detection, and Description

FacebookTwitterLinkedInGoogle

Link: http://outlier-analytics.org
 
When Aug 10, 2015 - Aug 10, 2015
Where Sydney, Australia
Submission Deadline Jun 5, 2015
Notification Due Jun 30, 2015
Final Version Due Jul 10, 2015
Categories    data mining   anomaly mining   data exploration   fraud detection
 

Call For Papers

KDD 2015 Workshop on Outlier Definition, Detection, and Description
--------------------------------------------------------------------------
CALL FOR RESEARCH PAPERS
ODDx3 @ KDD 2015
Workshop on Outlier Definition, Detection, and Description
will be held in conjunction with KDD 2015
August 10, 2015 in Sydney, Australia

http://outlier-analytics.org
--------------------------------------------------------------------------

The main goal of the ODD workshop is to bring together academics, industry and government researchers and practitioners to discuss and reflect on outlier mining challenges. The 1st ODD (2013) workshop focused on outlier detection and description, with particular emphasis on descriptive methods that could help make sense of the detected outliers. The 2nd ODD^2 (2014) workshop extended the focus areas to outlier detection and description under data diversity, with emphasis on challenges associated with mining outliers in heterogeneous data environments (graphs, text, streams, etc.).

This year, we broaden the scope to also include the translation of real world applications to different outlier definitions. Our goal is to highlight challenges associated with (1) outlier mining by new theoretic models and efficient algorithms, (2) translating real world problems to one/multiple of these definitions, and (3) comparing these definitions in their detection quality for unknown outlier instances. In all, the 3rd ODDx3 aims to increase awareness of the community to the following challenges of outlier mining:

What is an outlier/anomaly?
How can we define an anomaly in heterogeneous data environments?
How do different definitions translate to real world applications (spam, fraud, etc.)?
How can real world scenarios help shape new anomaly definitions?
How can we build descriptive detection methods?
How could data visualization aid anomaly mining?


CONFIRMED KEYNOTE SPEAKERS:
---------------------------
We are proud to have Vipin Kumar and Xifeng Yan as our keynote speakers.

Vipin Kumar is a William Norris Professor and Head of the Computer Science and Engineering Department at the University of Minnesota. Dr. Kumar's current research interests include data mining, high-performance computing, and their applications in Climate/Ecosystems and Biomedical domains. His research has resulted in the development of the concept of isoefficiency metric for evaluating the scalability of parallel algorithms, as well as highly efficient parallel algorithms and software for sparse matrix factorization (PSPASES) and graph partitioning (METIS, ParMetis, hMetis). He has authored over 300 research articles, and has coedited or coauthored 11 books including widely used text books ``Introduction to Parallel Computing'' and ``Introduction to Data Mining''. Dr. Kumar co-founded SIAM International Conference on Data Mining and served as a founding co-editor-in-chief of Journal of Statistical Analysis and Data Mining (an official journal of the American Statistical Association). Dr. Kumar is a Fellow of the ACM, IEEE and AAAS. Kumar's foundational research in data mining and its applications to scientific data was honored by the ACM SIGKDD 2012 Innovation Award, which is the highest award for technical excellence in the field of Knowledge Discovery and Data Mining (KDD). His h-index is 90.

Xifeng Yan is an associate professor at the University of California at Santa Barbara. He holds the Venkatesh Narayanamurti Chair of Computer Science. He received his Ph.D. degree in Computer Science from the University of Illinois at Urbana-Champaign in 2006. He was a research staff member at the IBM T. J. Watson Research Center between 2006 and 2008. He has been working on modeling, managing, and mining graphs in information networks, computer systems, social media and bioinformatics. His works were extensively referenced, with over 9,000 citations per Google Scholar and thousands of software downloads. He received NSF CAREER Award, IBM Invention Achievement Award, ACM-SIGMOD Dissertation Runner-Up Award, and IEEE ICDM 10-year Highest Impact Paper Award.


ODDx3 PANEL: "What is an anomaly?"
---------------------------
This year, ODD includes a panel consisting of researchers from both academia and industry with expertise/experience in outlier mining and fraud detection.

Despite its immense popularity, anomaly mining remains an extremely challenging task for many real world applications. For many practitioners, the task is poorly defined and under-specified as existing definitions and solutions have been often too simplistic and do not directly correspond to the needs of modern applications.

The first goal of the panel is to have experts from various domains (or researchers who heavily collaborate with such) to describe the kind of anomaly problems they are facing with in the real world. The second goal is then to try to tie existing definitions in the literature to those encountered in the real world, and if no appropriate definitions exist, try to brainstorm possible new formulations.

PANELISTS (tentative)
- Tina Eliassi-Rad (Rutgers) (malware & fraud detection)
- Ted E. Senator (Leidos) (insider threat detection)
- Jimeng Sun (Georgia Tech.) (outliers in medical data)
- Weng-Keen Wong (Oregon State U.) (outbreak detection)


TOPICS OF INTEREST
---------------------------
Topics of interests for the proposed workshop include, but are not limited to:

 interleaved detection and description of outliers
 description models for given outliers
 pattern and local information based outlier description
 ensemble methods for outlier detection and description
 novel outlier models for complex anomalies
 outlier detection methods for complex anomalies in heterogeneous datasets
 multi-view outlier ensembles over multiple data sources
 comparative studies on outlier detection
 identification of outlier rules
 supervised and unsupervised outlier detection
 statistical and information-theoretic outlier detection and description
 distance-based models for outlier ranking
 density-based models for local outlier ranking
 subspace outlier mining in high dimensional data
 community outlier mining in graph data
 anytime outlier mining in stream data
 contrast mining and causality analysis
 visualizations for outlier mining results
 visual analytics for interactive detection and evaluation of outliers
 human-in-the-loop modeling and learning

Application areas of interest include, but are not limited to:

 Fraud detection, and data logs
 Health surveillance, and other sensor databases
 Video surveillance, and other streaming databases
 Customer analysis, and other transactional data sources
 Process logs, and other sequential or ordered data
 Social networks, and other graph databases

We encourage submissions describing innovative work in related fields that address the issue of data diversity in outlier mining.

SUBMISSION GUIDELINES
---------------------------
We invite submission of unpublished original research papers that are not under review elsewhere. All papers will be peer reviewed. If accepted, at least one of the authors must attend the workshop to present their work. The submitted papers must be written in English and formatted according to the ACM Proceedings Template (Tighter Alternate style) available at:
http://www.acm.org/sigs/publications/proceedings-templates

The maximum length of papers is 10 pages in this format. We also invite vision papers and descriptions of work-in-progress or case studies on benchmark data as short paper submissions of up to 4 pages.

The papers should be in PDF format and submitted via EasyChair submission site
https://www.easychair.org/conferences/?conf=odd15kdd

Accepted papers will be included in the KDD 2015 Digital Proceedings, and made available in the ACM Digital Library.

If you are considering submitting to the workshop and have questions regarding the workshop scope or need further information, please do not hesitate to contact the organizers at odd15kdd (at) outlier-analytics.org.


IMPORTANT DATES
---------------------------
Extended submission deadline: June 12, 2015, 23:59 PST
Acceptance notification: June 30, 2015, 23:59 PST
Camera-ready deadline: July 10, 2015, 23:59 PST
Workshop day: August 10, 2015


PROGRAM COMMITTEE (tentative)
---------------------------
Fabrizio Angiulli (University of Calabria)
Ira Assent (Aarhus University)
Arindam Banerjee (University of Minnesota)
Albert Bifet (University of Waikato)
Petko Bogdanov (SUNY Albany)
Rajmonda Caceres (MIT Lincoln Laboratory)
Varun Chandola (SUNY Buffalo)
Polo Chau (Georgia Tech)
Sanjay Chawla (University of Syndey)
Tina Eliassi-Rad (Rutgers)
Christos Faloutsos (Carnegie Mellon University)
Jing Gao (SUNY Buffalo)
Manish Gupta (Microsoft)
Daniel B. Neill (Carnegie Mellon University)
Joerg Sander (University of Alberta)
Hanghang Tong (Arozina State)
Ye Wang (Ohio State University)
Arthur Zimek (Ludwig-Maximilians-Universitdt Munchen)

ORGANIZERS
---------------------------
Leman Akoglu (Stony Brook University)
Sanjay Chawla (University of Sydney)
Emmanuel Muller (Karlsruhe Institute of Technology)
Ted E. Senator (Leidos--previously SAIC)

Contact us at:
odd15kdd (at) outlier-analytics.org

Related Resources

KDD 2024   30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
ECAI 2024   27th European Conference on Artificial Intelligence
DS 2024   Discovery Science 2024
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
TAL-ALD 2024   Special issue of the journal Traitement Automatique des Langues (TAL) Abusive Language Detection : Linguistic Resources, Methods and Applications
AIM@EPIA 2024   Artificial Intelligence in Medicine
DIMVA 2024   21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment
ICDM 2024   IEEE International Conference on Data Mining
SI AID 2024   SPECIAL ISSUE on Adaptive Intrusion Detection System using Machine Learning in Wireless Sensor Networks
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex