Abstract
It has been shown that unsupervised outlier detection methods can be adapted to the one-class classification problem (Janssens and Postma, in: Proceedings of the 18th annual Belgian-Dutch on machine learning, pp 56–64, 2009; Janssens et al. in: Proceedings of the 2009 ICMLA international conference on machine learning and applications, IEEE Computer Society, pp 147–153, 2009. https://doi.org/10.1109/ICMLA.2009.16). In this paper, we focus on the comparison of one-class classification algorithms with such adapted unsupervised outlier detection methods, improving on previous comparison studies in several important aspects. We study a number of one-class classification and unsupervised outlier detection methods in a rigorous experimental setup, comparing them on a large number of datasets with different characteristics, using different performance measures. In contrast to previous comparison studies, where the models (algorithms, parameters) are selected by using examples from both classes (outlier and inlier), here we also study and compare different approaches for model selection in the absence of examples from the outlier class, which is more realistic for practical applications since labeled outliers are rarely available. Our results showed that, overall, SVDD and GMM are top-performers, regardless of whether the ground truth is used for parameter selection or not. However, in specific application scenarios, other methods exhibited better performance. Combining one-class classifiers into ensembles showed better performance than individual methods in terms of accuracy, as long as the ensemble members are properly selected.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
Outlier detection is one of the central tasks of data mining. This task is aimed at identifying observations that deviate substantially from the remaining data. Many definitions of outlier exist in the literature (Zimek and Filzmoser 2018). One of the most cited ones is Hawkins’ definition (Hawkins 1980), which refers to an outlier as “an observation which deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism”. Detecting such patterns is important because they might represent extraordinary behaviors that deserve special attention. In the literature, there are different names to refer to the task of detecting such extraordinary patterns, e.g., anomaly detection, novelty detection, noise detection, deviation detection, or exception mining (Zimek and Filzmoser 2018). Although sometimes these terms are used interchangeably, the name given to such a pattern usually depends on the application scenario. The range of real-world applications is diverse and includes, e.g., intrusion detection (Kwon et al. 2019), fraud detection (Adewumi and Akinyelu 2017), video surveillance (Chong and Tay 2017), industrial anomalies detection (Ramotsoela et al. 2018), medical anomaly detection (Litjens et al. 2017; Alaverdyan et al. 2020), trend detection (Schubert et al. 2015), and bot detection (Rodríguez-Ruiz et al. 2020; Bezerra et al. 2019). Further real-world applications have been discussed, e.g., by Pimentel et al. (2014), Chandola et al. (2009), and Chalapathy and Chawla (2019).
Outlier detection algorithms can be categorized into supervised, semi-supervised, and unsupervised techniques (Han et al. 2011). Supervised techniques can be seen as a special case of binary classification, when there are enough observations labeled as inliers and outliers available to train a classifier. Due to the natural imbalance between inliers and outliers, techniques for imbalanced classification can be used to train these classifiers (Aggarwal 2013). In semi-supervised outlier detection there are not enough (or no) outlier observations available to sufficiently describe the outlier class, due to the rarity of outliers. In this scenario, also referred to as “novelty detection”, the model is typically obtained using one-class classification techniques (Pimentel et al. 2014; Khan and Madden 2014). When no labeled data are available, we can use unsupervised techniques that do not assume any prior knowledge about which observations are outliers and which are inliers (Tan et al. 2005).
In this paper, we focus on one-class classification methods and unsupervised outlier detection methods adapted to the problem of novelty detection. Following the approach proposed by Janssens and Postma (2009), unsupervised outlier detection methods can be extended to use inlier class information to be applicable also in the semi-supervised setting. Janssens et al. (2009) performed a comparative study between 3 methods proposed for one-class classification [kNN Data Description (de Ridder et al. 1998), Parzen Windows (Parzen 1962) and SVDD (Tax and Duin 2004)] and 2 methods originally proposed for unsupervised outlier detection [LOF (Breunig et al. 2000) and LOCI (Papadimitriou et al. 2003)] extended to the one-class classification scenario. The authors concluded that LOF and SVDD were the top two performers and that their difference in performance was not statistically significant.
In our previous, preliminary study (Swersky et al. 2016), we performed a more comprehensive investigation than Janssens et al. (2009), using a more rigorous experimental setup, comparing the methods on a larger number of datasets with different characteristics, and using different performance measures. Our experiments led to conclusions that do not fully agree with those reported by Janssens et al. (2009). In particular, we could not confirm the same set of methods as performing best among the methods included in Janssens et al. (2009). We also identified some methods as top-performers in our experiments that were not included in their study.
In this paper, which is a major extension of our preliminary publication (Swersky et al. 2016), we aim to step forward and provide a more comprehensive study by making the following additional contributions:
-
We increase the number of base datasets used in the evaluation from 30 to 50. The introduction of these new datasets allows us to draw stronger conclusions (from a statistical point of view) and study new scenarios, such as scenarios involving local outliers (as opposed to outlier vs. inlier classes only), low and high dimensional data spaces, as well as smaller and larger sample sizes.
-
We include 4 additional well-known algorithms in the comparison: Isolation Forest (iForest) (Liu et al. 2008, 2012), Gaussian Mixture Model (GMM) (Bishop 2007), Subspace Outlier Degree (SOD) (Kriegel et al. 2009), and Deep SVDD (Ruff et al. 2018). Some of these algorithms are shown to be among the top performers in specific application scenarios.
-
In addition to ROC AUC and AjustedPrec@n used in our previous study, we also use the Matthews Correlation Coefficient (MCC) (Matthews 1975) to measure the performance of the methods. While ROC AUC and AjustedPrec@n evaluate the rankings produced by the methods, MCC evaluates the labelings.
-
In contrast to our previous study, where we only selected the models (algorithms, parameters) based on the ground truth by using examples from both classes (outlier and inlier), here we also study and compare different approaches for model selection in the absence of examples for the outlier class. The study of these approaches is very important from a practical perspective, since representative examples of outliers are often not available in real-world applications of one-class classification.
-
We consider ensembles of one-class classifiers (Tax and Duin 2001a; Krawczyk and Cyganek 2017; Hempstalk et al. 2008; Krawczyk and Woźniak 2014) in our extended study. In particular, while in the one-class classification literature only score-based strategies for building ensembles have been used, here we adopt a rank-based approach to build the ensembles. Rank-based strategies avoid the score normalization procedure required by score-based strategies, which can be notoriously problematic and challenging (Kriegel et al. 2011; Gao and Tan 2006; Azami et al. 2017).
-
Finally, while most OCC ensemble approaches in the literature use ground truth (label) information to select ensemble members, here we explore base model selection both with and without ground truth information. To the best of our knowledge, this is the first work on one-class classification that allows selection of ensemble members to be performed without the requirement of ground truth information.
With these additional contributions, we aim to answer the following research questions:
-
Among all the methods studied (7 algorithms proposed for one-class classification and 7 originally proposed for unsupervised outlier detection extended to one-class classification), how do they perform in different scenarios, namely, single/multiple source-class inliers, global/local outliers, low/high dimensional data spaces, and smaller/larger sample sizes? Is there any algorithm capable of consistently performing well in most scenarios?
-
Given that labeled outliers are rarely available in practical applications, how well do the studied model selection methods perform in the absence of labeled outliers? Is there any method capable of consistently selecting good models/parameters in each of the different (or in most) scenarios? Do they work equally well for tuning the parameter values of the different algorithms studied?
-
Given that a single model cannot capture all the aspects involved in the one-class classification problem, is combining one-class classifiers into ensembles an effective way to improve the performance and robustness of the results? How to effectively guide the selection of the base members of the ensembles in a practical manner?
The remainder of this paper is organized as follows. In Sect. 2, we discuss related work. In Sects. 3 and 4, we provide the reader with relevant background on one-class classification, unsupervised outlier detection, and model selection. We describe the setup of the experiments in Sect. 5 and discuss the results in Sect. 6. We summarize and conclude the paper in Sect. 7. Additionally, we provide Supplementary Material. Section 1 in the Supplementary Material provides the full description of all the methods compared in the experiments. In Section 2 in the Supplementary Material, we provide the detailed results of the experiments.
2 Related work
2.1 One-class classification versus unsupervised outlier detection
Both unsupervised outlier detection and one-class classification were first studied in the field of statistics (Barnett and Lewis 1994; Markou and Singh 2003). The one-class classification scenario generally is an easier task, because training data for one class is available. While in the one-class classification setting one can estimate the probability density function (pdf) or other models without the presence of outliers in the dataset, in the unsupervised outlier detection setting one must deal with possible outliers while estimating the pdf or other models. Given the differences between these two settings, the corresponding methods cannot be compared in a straightforward way.
In the literature, there have been limited attempts to establish connections between, or compare the performance of, both categories of methods. One attempt to compare one-class classification and unsupervised outlier detection methods was reported by Hido et al. (2008). In that work, the authors compared their proposed outlier detection algorithm against other approaches, including supervised, semi-supervised and unsupervised outlier detection techniques. The comparison, however, was not entirely unbiased; for instance, the supervised and semi-supervised algorithms were trained with the best parameters selected using cross-validation, while only 3 different arbitrary values for LOF’s parameter were tested.
Janssens and Postma (2009) proposed a methodological framework to make unsupervised outlier detection algorithms work in a one-class classification setup and thus make them comparable to algorithms specifically designed for this task. The authors, however, only assessed the performance of two unsupervised methods, namely, LOF and LOCI. In a follow-up work (Janssens et al. 2009), the same framework was applied to LOF and LOCI, but this time these methods were also compared against three methods specifically designed for one-class classification. The authors concluded that LOF and SVDD were the top two performers with an identical average performance rank, although there were particular scenarios where each method could outperform the other.
Although Janssens’ proposal compares the methods in a fair setup, their experimental design was restricted to controlled experiments, where the performance of the algorithms is compared based on the selection of their parameters using a previously labeled dataset with representative examples from both classes. However, in practical applications where ground truth information is missing (or very limited) for a given class, it is difficult to select the best parameter(s), as only labeled examples of one of the classes are available.
2.2 Semi-supervised model selection for one-class classification
The one-class classification model parameters typically determine how tightly the model should fit around the data, i.e., how complex the model should be. The more complex the model, the more flexible and tighter it fits the inlier class. Higher model complexity, however, comes at the price of overfitting risk, where the model may adapt to the specific instances from the inlier class, resulting in a high variance model. On the other hand, a model that is too simple can have high bias and lead to underfitting. Although suitable values for model parameters can lead to better fitting trade-offs, how to set these values is often not intuitive and the decision is typically left to the user. The selection of parameter values, however, has a major influence on the final performance of the models. In one-class classification, these parameters determine the trade-off between false positives and false negatives (Ruff et al. 2020; Juszczak 2006), such that poor parameter choices lead to poor trade-offs and, accordingly, limited classification performances.
In order to assist users to select the best parameterization for a given one-class classifier in real-world applications, some works in the literature have designed model selection methods for one-class classification that deal with the absence of representative examples for the outlier class. These works can be broadly categorized into methods designed for one specific type of algorithm (Duin 1976; Tax and Müller 2004; Xiao et al. 2015; Ghafoori et al. 2016), which aim to select the best value(s) for the parameter(s) of a given algorithm (e.g., the cross-validated likelihood (Smyth 2000) that can be used to select parameters for GMM); and methods designed for the selection of both the best algorithm and its parameterization (Tax and Duin 2001b; Wang et al. 2018). In this paper, we focus on the latter category of methods to select the best parameterization for different types of one-class classifiers.
2.3 Ensembles
Several models have been proposed to solve the one-class classification problem. However, a single model cannot capture all the aspects involved in the one-class classification problem and, therefore, may fail in particular application scenarios. A possible approach to bypassing the selection of a single model and avoiding the selection of the weakest model, is to rely on an ensemble of multiple models in order to obtain more stable and accurate results. Ensemble methods have been studied for a variety of tasks, including ensembles for classification (Rokach 2010; Galar et al. 2012), regression (Mendes-Moreira et al. 2012), clustering (Zhou 2012; Strehl and Ghosh 2002), unsupervised outlier detection (Zimek et al. 2013a; Aggarwal and Sathe 2017), and one-class classification (Tax and Duin 2001a; Krawczyk and Cyganek 2017; Hempstalk et al. 2008; Krawczyk and Woźniak 2014).
There are two key properties that ensemble members for one-class classification should have: diversity and accuracy. Combining several but similar models would not add much information to a combined classifier. Similarly, combining diverse but very inaccurate classifiers could produce a weak ensemble.
There are typically two ways to introduce diversity into the ensembles. The first way is to build the ensemble using models with different biases (e.g. combining GMM, SVDD, and ANN) (Tax and Duin 2001a; Hempstalk et al. 2008). The second way is to build the ensemble using the same base model, but with different views of the data (e.g. using subsampling or subspaces) (Krawczyk and Cyganek 2017; Krawczyk et al. 2013).
To select accurate one-class classifiers, one typically must select both a method as well as the values for its parameters. In the literature, there have been two common approaches to select parameters for one-class classifiers, based on the relative comparison of the respective candidate models by measuring their accuracy using (a) examples from both classes, i.e., both ground truth inliers and ground truth outliers, or (b) by using only ground truth examples from the inlier class plus artificially generated outliers.
When building ensembles of one-class classifiers, the common approach in the literature is to use ground truth examples from both classes to select the ensemble members (Tax and Duin 2001a; Hempstalk et al. 2008), or to not perform a selection at all and instead use a set of fixed classifiers/parameters (Zhang et al. 2011). Here in this study we explore different approaches to perform ensemble member selection, first using both ground truth inliers and outliers, and then using ground truth inliers and artificially generated outliers only. To the best of our knowledge, this is the first work on one-class classification that selects the ensemble members using criteria that do not rely on the availability of ground truth examples from the outlier class.
Once one guarantees that the ensemble members are accurate and diverse enough, a third central question is how to combine them. A common approach is to combine the classification outcomes produced by multiple classifiers on some collection of test data. In general, these strategies can be divided into score-based strategies and rank-based strategies. Score-based strategies combine in some way the output scores associated with the test observations and produced from different classifiers to generate a new, consensus output score for each observation. One difficulty with this strategy is that the output domains of the different classifiers may vary. For example, one classifier might output a probability, while another might output a distance or a density measure. In order to combine the classifiers, some normalization procedure must be applied to the scores (Aggarwal and Sathe 2017; Kriegel et al. 2011). Most if not all works in the one-class classification literature rely on score-based strategies. The common approach is to transform the classifier output into posterior probabilities (Tax and Duin 2001a; Hempstalk et al. 2008) and combine them using different approaches that range from averaging the estimated posterior probabilities to more sophisticated combinations, such as voting or products (Tax and Duin 2001a; Zhang et al. 2011; Krawczyk et al. 2013; Krawczyk and Cyganek 2017; Spinosa and de Leon Ferreira de Carvalho 2005). Rank-based strategies, in contrast to the score-based strategies, ignore the actual scores and combine the rankings of the classifier outputs instead. Surprisingly, this type of strategy has not received much attention in the literature on ensembles of one-class classification, although it has been widely used in clustering (Jaskowiak et al. 2016) and unsupervised outlier detection (Zimek et al. 2013a, 2014). In this paper, we also investigate the use of a rank-based strategy for building ensembles of one-class classifiers.
3 Outlier detection and one-class classification
3.1 One-class classification
Unlike in the traditional supervised classification setting, in one-class classification (Tax 2001) we are only provided with observations from one class and our model must then classify new observations as belonging to this class or not.
In order to keep terminology consistent, we will refer to observations belonging to the provided class as inliers, and observations not belonging to this class as outliers.
One-class classifiers can be categorized into density methods, boundary methods, reconstruction methods, and deep learning methods.
3.1.1 Density methods
The density methods estimate the parameters for some probability density function (pdf) of the inlier class, given by the training data (Fig. 1a), and threshold this density. The new instances are classified using the threshold of the pdf. Since the training set usually contains only inliers, the pdf can be estimated without being affected by possible outliers. If outliers/noise occur in the training set, one can estimate the pdf using robust estimators (Huber and Ronchetti 2009). The drawback, however, is that estimating densities is not an easy problem. There are two approaches to estimate densities:
-
Parametric The parametric approaches assume a parametric data distribution, such as Gaussian or Poisson distribution, and discordancy tests are used to test new instances (Hawkins 1980; Barnett and Lewis 1994). The disadvantage of this approach is that the parametric distribution is generally not known a priori, and assuming a particular distribution for the data may impose a very restrictive model, resulting in a large bias when the assumption is violated.
-
Non-parametric Non-parametric models do not assume any distribution, resulting in very flexible models. The disadvantage, however, is that it requires a sufficiently large sample of inliers to produce a good estimation. Depending, e.g., on the dimensionality of the problem, the number of instances required to sufficiently represent the underlying distribution can become very large, possibly impractical to obtain in a real-world setting.
Despite the difficulties in estimating densities, the density methods often outperform the others when the assumptions are satisfied (see Sect. 6). Commonly used density methods for one-class classification are the Gaussian density (Bishop 2007) and Gaussian Mixture Model (Bishop 2007) (parametric), as well as Parzen density estimation (Parzen 1962) (non-parametric).
3.1.2 Boundary methods
Similarly to the non-parametric density methods, boundary methods do not make any assumption about the data distribution, but instead of using a large number of observations (e.g. a large sample) to estimate the class density, they address the problem in a different, possibly simpler way. The boundary methods define a boundary around the training data, such that new instances that fall within the boundary are classified as inliers, while instances falling outside the boundary are classified as outliers (Fig. 1d). Since we are only interested in defining this boundary, it is not necessary to obtain a large sample to fully represent the inlier class. Another advantage of defining this boundary is that the threshold to classify new instances does not need to be set explicitly. On the other hand, the decision boundary can be quite sensitive to outliers/noise that might occur in the training set. Another disadvantage is that boundary methods also tend to be sensitive to the scaling of the feature space coordinates.
Because of their simplicity and effectiveness, boundary methods are quite popular. However, these methods can be highly computationally demanding due to the optimization problem that they require to solve. Boundary methods include the well-known Support Vector Data Description (SVDD) (Tax and Duin 2004) and Linear Programming (LP) (Pekalska et al. 2002) algorithms.
3.1.3 Reconstruction methods
Reconstruction methods compute a compact representation of the training set while attempting to preserve most of the information of the data. There are usually two ways to compute this compact representation of the data. One way is by clustering the dataset to represent it by a few prototypes. The other way is by projecting the data to represent it by a few dimensions. In this representation of the data, the noise contribution is usually reduced when compared to the original data, which makes these methods naturally more robust to noise, in contrast to the boundary methods. Once the compact representation has been obtained, new instances can then be reconstructed in the original data space through this representation. The reconstruction error, the difference between the original instance and the reconstructed instance, indicates the resemblance of a new instance to the original training distribution. In case of a representation by prototypes, the reconstruction error is measured as the distance of the original instance to the closest prototype. In representations by projection, the reconstruction error is measured as the distance of the original instance to its reconstructed (mapped) version. The new instances are classified using a threshold in the reconstruction error. Outliers should be more difficult to reconstruct than true inliers, and their reconstruction error is expected to be high. Reconstruction methods include approaches such as auto-encoder networks (Tax 2001; Goodfellow et al. 2016; González and Dasgupta 2002).
3.1.4 Deep learning methods
In recent years, deep learning methods (LeCun et al. 2015; Goodfellow et al. 2016) have shown tremendous abilities in learning representations on large and complex data, such as image and text. These methods utilize model architectures with multiple processing layers to learn data representations with multiple levels of abstraction. Deep (multi-layered) neural networks are especially well-suited for this task (Fig. 1g). In one-class classification, we can categorize the deep learning approaches (Ruff et al. 2018, 2020; Pang et al. 2022) into mixed and fully deep (or end-to-end). In mixed approaches, the methods leverage deep learning only in part of the pipeline. Usually, off-the-shelf deep learning methods (Simonyan and Zisserman 2015; Krizhevsky et al. 2017) are applied for feature extraction in a preceding step, and these features are then fed into classical one-class classification methods, such as SVDD; or the other way around, after (classic) feature extraction, deep learning methods are applied to learn the representation of normality, for example, using deep autoencoders (Hinton and Salakhutdinov 2006; Vincent et al. 2010) or Generative Adversarial Networks (GAN) (Schlegl et al. 2017; Goodfellow et al. 2014; Liu et al. 2020). Fully deep approaches, on the other hand, employ deep learning in an end-to-end fashion (Ruff et al. 2018, 2020; Perera and Patel 2019).
3.2 Unsupervised outlier detection
In unsupervised outlier detection, we are provided with a set of unlabeled observations and are tasked with determining whether an observation is an inlier or an outlier. In this scenario, an outlier may be defined as an observation that deviates from other observations in some significant way, as determined by the chosen method. Unsupervised outlier detection methods are generally categorized as global or local methods (Schubert et al. 2014). With global methods, a given statistic of interest is compared between each observation and the entire dataset. If the observation’s statistic is extreme in some sense (sufficiently low or high), it is considered an outlier. In contrast, local methods compare the statistic associated to an observation to that of its neighbors only, rather than the entire dataset. There is a variety of approaches for unsupervised outlier detection, including density-based, distance-based, cluster-based, angle-based, and subspace methods.
3.2.1 Density-based methods
Density-based methods assume that outliers will appear in a region of low density (Fig. 1b), often according to some non-parametric measure of density, while inliers will appear in dense regions (Fig. 1c). Note that differently from the one-class classification density methods, density-based methods for unsupervised outlier detection calculate the point-wise density of each observation, rather than a density function for the entire inlier class. Density-based methods include LOF (Breunig et al. 2000) and LOCI (Papadimitriou et al. 2003).
3.2.2 Distance-based methods
Distance-based techniques assume that outliers are observations that are far away from their nearest neighbors (Fig. 1e), while inliers are close to their nearest neighbors (Fig. 1f). There are different (dis)similarity measures that can be used to measure distance. While for numeric continuous attributes the Euclidean distance is the most usual [in which case these methods can also be seen as density-based (Zimek and Filzmoser 2018)], for categorical attributes the simple matching coefficient is one of the most common choices (Tan et al. 2005). A classic distance-based method is the kNN outlier algorithm (Ramaswamy et al. 2000).
3.2.3 Cluster-based methods
Cluster-based methods use data clustering in order to detect outliers. The intuition behind these methods is that observations that do not fit well into clusters can be considered outliers (Fig. 1j). An example is GLOSH, which is based on the HDBSCAN* clustering hierarchy (Campello et al. 2015).
3.2.4 Angle-based methods
Angle-based methods represent each observation of the dataset as a point in Euclidean space, which restricts these methods to numeric datasets. The intuition behind these methods is that by measuring the variance in the angles between an observation and other observations, we can determine whether or not an observation is an outlier. If the variance is high (Fig. 1l), this may suggest that the observation is surrounded by other observations (in a cluster), while a low variance (Fig. 1k) may suggest that the observation is far away from other observations (an outlier). Using the angle of the points as additional information, rather than a measure based on distance only, tends to make these methods more robust when applied to high-dimensional datasets. The seminal method of this category is ABOD (Kriegel et al. 2008).
3.2.5 Subspace methods
Since too many irrelevant (noise) dimensions in a dataset can easily mask outliers, subspace outlier detection methods use only the most relevant attributes that make the outliers easier to detect (see Fig. 1h, i) (Zimek et al. 2012). However, finding the right subspace where an outlier deviates from the remainder of the data is not trivial, particularly because searching for every possible subspace using brute-force is not feasible, and the right subspace may vary from outlier to outlier. An example of a subspace method is SOD (Kriegel et al. 2009).
3.3 Adapting unsupervised outlier detection methods to the one-class classification setting
A commonality among unsupervised outlier detection methods is that they compute a certain outlier score for each instance. To adapt an unsupervised outlier detection method to one-class classification, the general strategy is as follows: First run the unsupervised method on the (one-class) training data, pre-computing the scores for each inlier (Fig. 2a). Then compute the score for a new instance to be classified (Fig. 2b), possibly using other pre-computed quantities (e.g., densities or distances to nearest neighbors) related to instances in the training data. Then, in order to classify the new instance, compare its score with the pre-computed scores for the inliers. In the case of the example in Fig. 2, the new instance is classified as outlier, as its score is higher than any pre-computed scores for the inliers. In order to make the adapted algorithms more robust against noise or possible outliers in the training set, it is possible to exclude a top-scoring fraction \(\alpha \) of the training set, which in practice is equivalent to establishing a score threshold. In this case, a new instance will be considered an outlier if it has a score higher than the scores in the training set, excluding the top \(\alpha \) scores.
There are two important aspects related to the use of pre-computed quantities that involve training data when computing the outlier score for a new observation to be classified. First, when classifying multiple observations, there is no need to recompute these quantities over and over again for each new observation, since they relate solely to the training data (inlier class model) and can thus be pre-computed, which makes computations faster. Second and more importantly, using pre-computed quantities regarding the observations in the training data assures that the model is by no means affected by new observations to be classified. This is a basic principle of one-class classification, i.e., unlabeled observations should not affect the pre-computed inlier class model, since they may be outliers. For example, suppose that a certain algorithm operates by comparing the density of a new observation to be classified against the densities of its nearest neighbors among the known inliers (training data). In this case, the densities of the inliers should be pre-computed, not to be affected by the presence of the unlabeled observation being currently assessed; otherwise, each unlabeled observation would affect the model in a different way, which means that different observations would be classified by different models/criteria.
When classifying multiple observations, it is also recommended that the classification procedure described above be performed independently for each observation. This way, different unlabeled observations will not affect each other’s assessment. The reason we only classify one observation at a time instead of multiple observations at once is because we make no assumptions about the nature of each observation in relation to the combined dataset as a whole. It is possible that observations to be classified, while outliers in the sense that they do not belong to the inlier class, may be grouped together in such a way that an unsupervised method would not detect them as outliers.
4 Model selection for one-class classification
Model selection methods for one-class classification rely on classification performance to guide the search for the best model (parameterization/algorithm). These methods search for the best model, such that some measure of classification performance is optimized. In most one-class classification problems, we are not only interested in models that have a small overall classification error, but also in what type of instances are misclassified. Due to the inherent imbalance of the outlier class, it is trivial to think of cases where a model can exhibit a small overall error, while it misclassifies a high proportion of outliers. In one-class classification problems, where misclassifying outliers as inliers is particularly critical (e.g., in fraud detection), we are also interested in the minimization of the error in the outlier class. Therefore, the error of a one-class classification model, in general, can be expressed as:
where \(\epsilon _i\) is the inlier rejection rate, i.e., the rate of inliers classified as outliers (false positives), and \(\epsilon _o\) is the outlier acceptance rate, the rate of outliers classified as belonging to the inlier class (false negatives). The convex combination parameter \(\beta \) controls the trade-off between the importance of outlier acceptance (\(\epsilon _o\)) and inlier rejection (\(\epsilon _i\)). For \(\beta = 0.5\) both errors are equally treated. If estimates of \(\epsilon _i\) and \(\epsilon _o\) are available, we can estimate classification error for multiple candidate models and point out which one is better in relative terms. The problem, however, is that in one-class classification only instances of the inlier class are available during the training phase. Therefore, only \(\epsilon _i\) can be directly estimated on the training set, which can be achieved by using traditional supervised techniques such as cross-validation or holdout (Han et al. 2011; Tan et al. 2005). The expected error on the outlier class (\(\epsilon _o\)), in turn, can only be estimated by making additional assumptions. In the next section, we present three methods capable of estimating the classification error and, therefore, performing model selection for one-class classification in the absence of training observations from the outlier class.
4.1 Methods for model selection
4.1.1 Uniform object generation
Uniform object generation (Tax and Duin 2001b) assumes that the outlier class is uniformly distributed in the input space. The method fits the smallest enclosing hypersphere around the training set, computed by a linear SVDD algorithm (Tax and Duin 2004), then it generates a set Q of uniformly distributed outliers inside of it (Fig. 3b). The rate of generated outliers that are classified as inliers by a given one-class classifier is the estimate of the error of that classifier on the outlier class (\(\epsilon _o\)). The idea behind this approach is that when the volume covered by the classification model under evaluation is minimized, the chances that it will accept outliers is also minimized. As pointed out by the authors themselves (Tax and Duin 2001b), a drawback of this method is that in high dimensional feature spaces the procedure becomes computationally inefficient. The reason is that it requires an exponentially large number of artificially generated outliers to minimally cover the space so as to get a confident estimate of the volume of the classifier. For instance, given 100,000 uniformly distributed artificial data objects (observations), this method has been deemed accurate only up to 15–20 dimensions, depending on the data distribution (Juszczak 2006).
In order to estimate the error on the inlier class (\(\epsilon _i\)), the authors propose to use cross-validation, since the labels for inlier class data objects are available.
4.1.2 Self-adaptive data shifting (SDS)
SDS (Wang et al. 2018) relies on an Edge Pattern Detection (EPD) algorithm to find the edges of the data, i.e., the instances in the border of the class. After the EDP algorithm finds the edge patterns (Fig. 4a), for a given neighborhood and a threshold value to distinguish the edge patterns from other observations, the corresponding instances are used to generate pseudo outliers. The pseudo outliers are generated by shifting these instances along the direction of the negative estimated data density gradient (Fig. 4b). In addition to the pseudo outliers, the SDS method also generates pseudo inliers by shifting each instance of the dataset along the positive direction of the data density gradient (Fig. 4b). After generating pseudo instances for both classes, the one-class classification model uses the original data for training and the generated data as the testing set to estimate \(\epsilon _i\) and \(\epsilon _o\). Note that in contrast to Uniform Object Generation, SDS does not use the true inliers to estimate \(\epsilon _i\), therefore, the synthetic dataset generated by SDS (Fig. 4b) does not contain true inliers. The main weakness of this method is the performance of the EDP algorithm in high dimensional spaces. High dimensional datasets tend to become sparse, and the EDP algorithm begins to see every instance as an edge pattern.
4.1.3 Data perturbation
Data Perturbation (Marques 2019) adds a small, randomized amount of noise to each attribute value of all observations. The underlying premise of this method is that when a perturbation is applied to the data, the borderline observations can be affected enough to become outliers. The tighter the fit of the model to the data, the higher the number of observations close to the decision boundary. Therefore, the models with a tighter fit should result in a larger number of observations that become outliers after the perturbation. This perturbation is implemented by adding to each instance an attribute-wise noise component independently sampled from \({\mathcal {N}}(0, \sigma )\), where \(\sigma \) corresponds to the value whereby a fraction of 50% of the data is rejected by a linear SVDD. Similarly to Uniform Object Generation, the error on the inlier class (\(\epsilon _i\)) is estimated using cross-validation and the error on the outlier class (\(\epsilon _o\)) is estimated as the rate of generated outliers (perturbed observations, Fig. 5b) classified as inliers. In order to make the results more robust, the process of data perturbation can be applied multiple times to generate m different instances of the dataset. According to the experiments reported in Marques 2019, this method performed consistently well on synthetic datasets, but not so well in real-world scenarios involving a multi-modal inlier class with clusters of very different sizes/dispersion, or in scenarios involving small sample sizes.
4.2 Time complexity for model selection
The computational complexity of the one-class classification algorithms can be analyzed in terms of the two different sub-tasks involved, namely, the training time \({\mathcal {O}}(f_{ tr }(N))\) and the testing (or consultation) time \({\mathcal {O}}(f_{ te }(M))\), as a function of the training set size (N) and the test set size (M), respectively. Once a classifier is trained, we can divide the process of error evaluation into three phases: the generation of data objects that we use to estimate \(\epsilon _i\) and/or \(\epsilon _o\), the estimation of \(\epsilon _i\) and the estimation of \(\epsilon _o\). The phase of object generation for Data Perturbation and Uniform Object Generation involves the training of a linear SVDD, which can be efficiently computed in linear time (\({\mathcal {O}}(N)\)) (Joachims 2006; Erfani et al. 2015).Footnote 1 SDS, in turn, needs to compute the kNNs for each object, which has a worst case complexity of \({\mathcal {O}}(N^2)\), although it can often be computed more efficiently with the use of suitable indexing structures.
The estimation of \(\epsilon _i\) by Data Perturbation and Uniform Object Generation, both of which use k-fold cross-validation on the true inliers, takes \({\mathcal {O}}\Big (k\cdot \Big (f_{ tr }\Big (\frac{(k-1)\cdot N}{k}\Big ) + f_{ te } \Big (\frac{N}{k}\Big )\Big )\Big )\). SDS uses the artificially generated data to estimate both \(\epsilon _i\) and \(\epsilon _o\) in \({\mathcal {O}}(f_{ te }(N))\) time. Notice that the runtime for estimation of \(\epsilon _o\) in all methods depends on the testing time over the number of objects generated, since the classifier has to test each of these objects. However, each method generates a different amount of objects: Data Perturbation generates an amount proportional to (and not smaller than) the size of the dataset (N); SDS generates an amount less or equal to N; Uniform Objects generates a user-defined number of objects (Q) that does not depend on the size of the dataset, but the number that is required for good performance grows fast with increasing dimensionality (Désir et al. 2013; Tax and Duin 2001b; Juszczak 2006). In Table 1, we summarize the complexity of the methods.
5 Experimental setup
5.1 Algorithms
We compare and evaluate 7 one-class classification algorithms, namely, Gaussian Mixture Model (GMM), Parzen Window (PW), Support Vector Data Description (SVDD), Linear Programming (LP), k-Nearest Neighbor Data Description (which we call here \(\hbox {kNN}_{\textit{local}}\)), Auto-Encoder, and Deep SVDD (DSVDD) against 7 unsupervised outlier detection algorithms adapted to one-class classification, namely, k-Nearest Neighbors (hereafter referred to as \(\hbox {kNN}_{\textit{global}}\)), Local Outlier Factor (LOF), Local Correlation Integral (LOCI), Global–Local Outlier Scores from Hierarchies (GLOSH), Isolation Forest (iForest), Angle-Based Outlier Detection (ABOD), and Subspace Outlier Degree (SOD). The full description of all compared methods, including their asymptotic computational complexities, is given in Section 1 in the Supplementary Material.
The parameters of the methods were varied in the following ranges: \(k = 2, 4, 6, \ldots , 50\) for LOF, \(\hbox {KNN}_{\textit{global}}\), \(\hbox {KNN}_{\textit{local}}\), and SOD; \(M_{\textit{clSize}} = M_{\textit{pts}} = 2, 4, 6, \ldots , 50\) for GLOSH; l = k and the coefficient for the expected variance along the attributes = 0.8 for SOD (as suggested by the authors); number of hidden units = \( 2, 4, 6, \ldots , 50\) for Deep SVDD and for the Auto-Encoder with scaled conjugate gradient backpropagation training algorithm (Møller 1993); number of Gaussians = \( 1, 2, 3, \ldots , 25\) for GMM; h varying from the largest distance in the dataset to the smallest nearest neighbor distance (into 25 equally spaced values) for PW, LP, and SVDD, as common practice in the literature (Liu et al. 2012; Tax and Müller 2004); fraction of the dataset \(\varphi = 0.1, 0.25, 0.5, 0.75, 1\) for LOCI and iForest; number of iTrees = 10, 25, 50, 75, 100 for iForest. Also, all the methods were allowed to misclassify a fraction of the training set \( \alpha = 0, 0.05, 0.1, 0.15\) during the model training, as discussed in Sect. 3.3. The ranges of parameters used for each method are summarized in Table 2.
5.2 Datasets
We use different collections of previously published, real and synthetic benchmarking datasets to evaluate the results of our experiments. For experiments on synthetic data, we adopt a collection of benchmarking datasets from the literature (Zimek et al. 2013b, 2014) to evaluate the methods’ performance to detect local outliers. This collection has been designed and used to evaluate outlier detection methods. Specifically, we use the set of 30 datasets referred to as “batch1” (Zimek et al. 2013b, 2014), which vary in dimensionality d (\(d \in [20, \dots , 40]\)), in the number of classes c (\(c \in [2, \dots , 10]\)), and for each class \(c_i\) independently in the number of points \(n_{c_i}\) (\(n_{c_i} \in [600, \dots , 1000]\)). For each class, the points are generated following a Gaussian model with randomly selected parameters that are attribute-wise independent. The points that have a Mahalanobis distance to their class center larger than the theoretical 0.975 quantile of the \(\chi ^2_d\) distribution were labeled as (local) outliers.
For experiments on real data, we use 31 real-world datasets from the UCI Machine Learning Repository (Dheeru and Karra Taniskidou 2017) as pre-processed for one-class classification and made available by Tax (2001), namely: Abalone, Arrhythmia, Balance-scale, Ball-bearing, Biomed, Breast, Cancer, Colon, Delft1x3, Delft2x2, Delft3x2, Delft5x1, Delft5x3, Diabetes, Ecoli, Glass, Heart, Hepatitis, Housing, Imports, Ionosphere, Iris, Liver, Satellite, Sonar, Spectf, Survival, Vehicle, Vowels, Waveform, and Wine.
In addition, we also include the datasets CellCycle-237 and YeastGalactose, made public by Yeung et al. (2001, 2003)), and 20 other real-world multi-class datasets from the UCI Machine Learning Repository (Dheeru and Karra Taniskidou 2017), namely: Artificial Characters, Cardiotocography, Car Evaluation, CNAE-9, Dermatology, Solar Flare, Hayes-Roth, LED Display, Lung Cancer, Multiple Features, Optical Recognition, Page Blocks, Seeds, Semeion, Soybean, Synthetic Control, Texture, User Knowledge Modeling, Vertebra Column, and Zoo. Properties of these datasets are presented in Tables 2 and 3 in the Supplementary Material, where we describe the number of features, the number of objects in each class, and the total number of objects in the datasets.
We report only a single, aggregated result (the average) for the 5 Delft datasets, and we also report only the average result for the 30 synthetic datasets, since both sets contain variants obtained from a single source. This way, in total we report results corresponding to 50 independent dataset sources. Finally, due to the inability of some algorithms to deal with replicated observations, duplicates are removed from the datasets where they are present.
All the source codes and datasets used in the experiments are publicly available in a repository at https://github.com/homarques/occ.
5.3 Experimental scenarios
In order to consider fundamentally distinct one-class classification scenarios, we perform different types of experiments. Regarding the labeling of datasets, i.e., the labeling of observations into inliers and outliers, two major types of experiments were carried out. In the first type of experiment (Type I), we follow the only approach taken by Janssens et al. (2009), where multi-class datasets are transformed into one-class datasets by re-labeling one of the classes as inliers, while the remaining classes are labeled as outliers. Except for datasets where only a single inlier class has been pre-defined as such in the data repository (Tax 2001)—e.g., Ecoli—we repeat the procedure as many times as there are classes in the dataset, each time labeling a different class as inliers. Among the resulting binary (e.g. inlier/outlier) datasets, those for which none of the methods were able to reach a classification performance of at least 0.5 as measured by ROC AUC were discarded (e.g., the Arrhythmia dataset with class 2 as inliers). By the above procedure, the initial 50 multi-class independent datasets yield 200 Type I one-class classification datasets.
For the second type of experiment (Type II), we reverse the inlier and outlier classes obtained in the first type of experiment for datasets that have more than 2 possible inlier classes. This type of experiment models the important situations where the inlier class is more likely multi-modal as it combines 2 or more classes of the original dataset. Note that Type II experiments are only different from Type I (and, as such, they are only reported) for datasets with 3 or more classes. Accordingly, results for Type II experiments are only available for a subset of the datasets used in Type I experiments. More precisely, the initial 50 multi-class independent datasets yield 157 Type II one-class classification datasets. Figure 6 shows an example of Type I and II experiments w.r.t. the labeling of a given multi-class dataset.
In addition to Type I and Type II experiments, we also evaluate the behavior of the methods in other scenarios. In the third type of experiments (Type III), we use the collection of 30 synthetic datasets to evaluate the methods’ performance to detect the local outliers as originally labeled in those datasets (e.g., observations in the vicinity/tails of normally distributed classes—see Sect. 5.2).
In the fourth type of experiments (Type IV), we use datasets with high dimensionality to assess the performance of the methods in high dimensional spaces. Finally, we use datasets with larger sample sizes in the fifth type of experiments (Type V) to evaluate the performance of the methods when information for training becomes sufficiently large. We define “high dimensionality” and “larger sample size” based on the distribution of dimensionalities and sample sizes of the datasets, as shown in Fig. 7. The 31 one-class classification datasets with dimensionality higher than 200 were considered high dimensional datasets, and the 13 one-class classification datasets with a sample size of more than 600 were considered to have larger sample sizes. These thresholds are indicated by the vertical red lines in Fig. 7. For Types IV and V experiments, we consider only the scenario of single source-class inliers (Type I experiments). Therefore, we can see these experiments as a subset of the first type of experiments. We adopted the separation of these two additional scenarios, as it is known that there are methods designed specifically for high dimensionality [e.g., ABOD (Kriegel et al. 2008)], and others that require a sufficiently large sample for good performance [e.g., Parzen Window (Parzen 1962)]. Therefore, we can evaluate these methods where they are supposed to perform best.
5.4 Evaluation measures
For the evaluation of the experiments, we use three well-known classification measures (Baldi et al. 2000; Désir et al. 2013; Wang et al. 2018; Campos et al. 2016): Area Under the ROC Curve (ROC AUC), Adjusted Precision-at-n (AdjustedPrec@n), and Matthews Correlation Coefficient (MCC).
5.4.1 MCC
Matthews Correlation Coefficient (MCC) (Matthews 1975) is a discrete version of Pearson’s correlation coefficient (Kirch 2008) between the ground truth and the predicted labels. MCC ranges from \(-1\) (all predictions are wrong) to \(+1\) (perfect classification). A value of 0 indicates that either predictions are completely random or the classifier always predicts only one of the classes. MCC can also be calculated from a contingency table as:
where TP (True Positives) is the number of true outliers correctly classified, TN (True Negatives) is the number of true inliers correctly classified, FN (False Negatives) is the number of true outliers that have been misclassified and FP (False Positives) is the number of true inliers that have been misclassified.
Unlike other classification measures that are also suitable for class imbalance problems (e.g. recall, precision, and \(F_1\) score), MCC does not require to define which class is underrepresented. This is convenient in our experimental setup because in Type I experiments (Fig. 6a) the inlier class tends to have fewer instances than the outlier class, whereas in Type II experiments (Fig. 6b) it is the other way around.
5.4.2 ROC AUC
In one-class classification and unsupervised outlier detection, the output of the algorithms is usually a real-valued score, and the quantities TP, TN, FP and FN depend on how a threshold is selected. Generally, there is a trade-off between the amount of false positives and the amount of false negatives produced by an algorithm. The Receiver Operating Characteristic (ROC) curve shows, for all possible threshold choices, the true positive rate \({\text {TPR}} = \frac{{\text {TP}}}{{\text {TP}}+{\text {FN}}}\) versus the false positive rate \({\text {FPR}} = \frac{{\text {FP}}}{{\text {FP}}+{\text {TN}}}\). As TPR and FPR normalize the number of true and false positives, respectively, ROC inherently adjusts for the imbalance of class sizes.
The performance of a classifier as represented by a ROC curve can be summarized by a single value by computing the area under this curve (ROC AUC). The ROC AUC value ranges between 0 and 1. A perfect ranking of the instances (in which all outliers are ranked ahead of any inliers) results in a ROC AUC value of 1, whereas an inverted perfect ranking produces a value of 0. The expected value for a random ranking of the instances is a ROC AUC value of 0.5.
5.4.3 AdjustedPrec@n
As stated above, most one-class classification and unsupervised outlier detection algorithms output real-valued scores. Precision-at-n (prec@n) measures the fraction of true outliers among the top n outlier scores in a test set:
where O is the set of true outliers and n is typically defined as the cardinality of this set (i.e., \(n = |O |\), case in which \({\text {prec@n}} \in [0,1]\)). To compare prec@n values across datasets with different numbers of outliers, one has to adjust prec@n by chance, as discussed in Campos et al. (2016). This gives rise to the AjustedPrec@n measure used in our experiments, in which the perfect ranking produces a value of 1, while a random ranking has an expected value of 0. The AjustedPrec@n in a test set can be computed as follows:
where M is size of the test set and \(|O |\) is number of true outliers in the test set.
5.4.4 ROC AUC versus MCC versus AdjustedPrec@n
ROC AUC takes the entire ranking of real-valued outlier scores into account, without the need to select a particular threshold to label the observations as outliers or inliers. A high ROC AUC score indicates that, in the overall ranking, outliers are more likely to be ranked ahead of inliers. For the boundary methods, for example, it only means that the inliers are closer to the described boundary than the outliers; it does not necessarily mean that the boundary descriptor is accurately classifying the observations. Figure 8 shows an example of a boundary descriptor that achieves ROC AUC = 1, i.e., a perfect ranking of the outlier scorings. However, the boundary descriptor of the classifier imposes a suboptimal threshold on the ranking, resulting in a large fraction of inliers misclassified. MCC, on the other hand, evaluates the classifier performance based on a binary outlier/inlier labeling, which is automatically provided by some one-class classification models,Footnote 2 or, alternatively, it can be obtained by applying an arbitrary user-defined threshold to the produced scores. In the latter case, incorrectly defining such a threshold may lead to poor evaluations. For AdjustedPrec@n, setting the cardinality of the top n scores as the number of true outliers in the test data (e.g. \(n = |O |\)) can be seen as an implicit choice of threshold, which is sensible when ground truth information is available; however, in real-world one-class classification tasks the number of outliers is usually unknown. Therefore, we argue that one cannot rely solely on ROC AUC, MCC, or AdjustedPrec@n for quality assessment of models; rather, ROC AUC, MCC, and AdjustedPrec@n complement each other by revealing different aspects of the quality of a solution, which are all relevant in practice.
5.4.5 Friedman test
The Friedman test (Friedman 1937) is a non-parametric statistical test that ranks the algorithms based on their relative performance on each dataset, from best to worst, and checks for statistically significant differences between the ranks. The null hypothesis states that the average ranks of the compared algorithms are not significantly different. The Friedman statistic is given by:
which can be shown to follow a \(\chi ^2\) distribution with \(v - 1\) degrees of freedom when \(n_d\) and v are big enough (as a rule of thumb, \(n_d > 10\) and \(v > 5\)), where v is the number of classifiers (algorithms being compared) and \(n_d\) is the number of datasets (sample size for the test). \(R_j\) is the average rank of classifier j taken over all datasets. For small values of \(n_d\) or v, the approximation by the chi-square distribution becomes poor and the p-value should be obtained from tables specially prepared for the Friedman test (Demsar 2006). If the null-hypothesis is rejected, i.e., the p-value is significant, one can proceed with a post-hoc test.
5.4.6 Neményi test
The post-hoc Neményi test (Neményi 1963) is a pairwise test used to check whether there is a significant difference in performances between two algorithms. The performance of two algorithms is significantly different when the difference between their average ranks is greater than or equal to the critical difference CD:
where \(q_\alpha \) is the tabulated critical value for the test at the specified significance level (Neményi 1963). Note that the critical difference can be reduced by increasing the number of datasets \(n_d\) or by decreasing the number of algorithms v. In the data mining and machine learning literature, results of the Friedman–Neményi tests are often visually represented by means of critical difference diagrams (Demsar 2006), which will be used later in this paper to summarize our results.
5.5 Model selection
In order to evaluate a method’s performance on a one-class classification dataset, we first split the dataset (which, for the sake of external evaluation, contains both inlier and outlier ground truth labels) into 2 stratified subsets, such that the distribution of outliers and inliers remains as close as possible to the entire dataset: one subset containing 20% of the observations (test set) and the other containing the remaining 80% of the data (training set). Then, using the training subset with 80% of the data, we apply four different model selection procedures in order to select the best model (parameters/algorithms) from the collection of candidates under evaluation.
The first model selection procedure, which is the most commonly used approach when evaluating one-class classifiers in the literature, initially uses 10-fold cross-validation to select the algorithm’s parameter(s) that result in the best ROC AUC value on the training dataset.Footnote 3 Since this procedure uses both inliers and outliers (labeled as such) in the training dataset, the latter of which are usually not available in real-world applications of one-class classification problems, this approach represents an optimistic evaluation based on an ideal scenario where the optimal algorithm parameter(s) is supposed to be determined in a traditional, fully supervised way. Because by definition this is not a realistic supposition when it comes to semi-supervised (one-class) learning applications, we also consider three additional model selection procedures. For these additional procedures, we select the best model without using any outliers from the training set.
The three approaches to select models in the absence of examples for the outlier class are Perturbation (Marques 2019), Uniform Objects (Tax and Duin 2001b), and SDS (Wang et al. 2018), which have been described in Sect. 4. For Perturbation, we generate m = 10 “perturbed” datasets in order to estimate \(\epsilon _o\). For Uniform Objects, we estimate \(\epsilon _o\) using \(Q = 100{,}000\) uniformly distributed artificial data objects [the same amount used by the authors (Tax and Duin 2001b)]. For SDS, the neighborhood size and the threshold value used by the EDP algorithm were fixed as \(\lceil 5\, \text {log}_{10} \, N \rceil \) and 0.1, respectively, as suggested by the authors (Wang et al. 2018). We use 10-fold cross-validation (excluding outliers) to estimate \(\epsilon _i\) for Uniform Objects and Perturbation (Tax and Duin 2001b; Marques 2019).
After parameter selection, the subset containing 20% of the data (test set) is used to measure the performance of the resulting algorithms, i.e., the different candidate models as configured with parameter value(s) selected by the four procedures described above and, then, trained using all and only the inliers from the training set.
In order to get more reliable results, the whole procedure is repeated 30 times, and the resulting ROC AUC values are aggregated and reported. In addition to ROC AUC values, we also report the MCC and AdjustedPrec@n on the test sets (described in Sect. 5.4).
5.6 Ensemble
In order to investigate how the results from different one-class classifiers as combined into an ensemble can compare against the use of single classifiers, we adopt a rank-based combination strategy. The main advantage of using a rank-based combination strategy as opposed to a score-based combination strategy is that there is no need to normalize the outlier scorings coming from the different classifiers. Score normalization is a complex problem (Kriegel et al. 2011; Platt 2000; Gao and Tan 2006), particularly when the goal is to make scores from different algorithms comparable in a statistically meaningful way by taking not only their scales into account but also their distributions. Here we circumvent this problem by using Reciprocal Rank Fusion (RRF) (Cormack et al. 2009), which is a ranking combination method based on the intuition that higher ranks are more important for the overall ranking, whereas the importance of lower ranked observations should vanish as it would if an exponential function was used.Footnote 4 The results reported in this study can be seen as a lower bound in terms of the achievable performance of potential ensembles. The resulting, rank-based combined “outlier score” of an observation according to the RRF method is given by:
where \({\mathcal {R}}\) is the set of rankings \(\tau \) produced by the different classifiers (ensemble members), \(\tau (s)\) is the rank of observation s from a given classifier, and \(\epsilon \) is a user-defined parameter. We use \(\epsilon = 60\) as suggested by Cormack et al. (2009), which can mitigate the impact of abnormal classifier rankings.
6 Results
6.1 Comparison of algorithms under optimistic parameter tuning
In the following, we describe the comparison results of the different one-class classification algorithms when their parameters are set by using the first model selection approach described in Sect. 5.5 (namely, supervised cross-validation), in which not only inliers, but also outliers, are supposed to be available in the training data. As previously discussed, this represents an “optimistic” setup, which is typically not doable in practical applications; yet, it has been the standard setup adopted so far in the literature on one-class classification. The overall ranking results are summarized by critical difference diagrams (Demsar 2006) presented throughout the remainder of this section. Detailed results for all experiments are provided in Section 2 in the Supplementary Material.
6.1.1 Type I: Single source-class inliers
Figure 9 shows the average ranks of the methods obtained by the Friedman test over all Type I experiments with respect to ROC AUC, AdjustedPrec@n, and MCC. When looking at ROC AUC and AdjustedPrec@n, one can see SVDD, GMM, and LP, in this order, at the top, among which statistical difference is observed (as indicated by the absence of critical difference bars) only between SVDD and LP for ROC AUC. The average ROC AUC for GMM, SVDD, and LP were 0.87, 0.85, and 0.83 (see Table 3), respectively, while the average AdjustedPrec@n values were 0.59, 0.56, and 0.53 (see Table 4). Notice that although SVDD has the best average rank, GMM has the best average ROC AUC/AdjustedPrec@n values due to poor performances of SVDD on certain individual datasets, such as e.g. Cardiotocography, where GMM obtains a ROC AUC value of 0.98 and an AdjustedPrec@n value of 0.91, whereas SVDD achieves only a ROC AUC value of 0.65 and an AdjustedPrec@n value of 0.14 (for the detailed results for each dataset, refer to Tables 4 and 8 in the Supplementary Material). This indicates that although SVDD was the best overall performer, there are particular application scenarios where even a highly effective algorithm such as SVDD may under-perform (no free lunch). When looking at MCC, the overall picture is very different: the boundary-based methods SVDD and LP, two of the top performers with respect to ROC AUC and AdjustedPrec@n, are the two worst performers with respect to MCC. This suggests that although the outlier rankings produced by these algorithms are good, the decision boundary leads to a misclassification of many observations, such as in the example shown in Fig. 8. For MCC, the neighbourhood-based outlier detection algorithms performed better, without statistical difference observed between GLOSH, LOF, \(\hbox {KNN}_{\textit{global}}\), and SOD, in this order, at the top, with average MCC values of 0.49, 0.49, 0.47, and 0.49 (see Table 5), respectively.
6.1.2 Type II: Multiple source-class inliers
Figure 10 shows the average ranks of the methods over all Type II experiments with respect to ROC AUC, AdjustedPrec@n, and MCC. When comparing Type I experiments in Fig. 9 and Type II experiments in Fig. 10, it can be seen that in Type II experiments, which correspond to application scenarios possibly involving multi-modal target classes (inliers), the relative performance of the neighborhood-based outlier detection methods improves, most noticeably the local density-based methods such as LOF and GLOSH, in particular when the statistical significance of the differences in ranks (or lack thereof) are considered. Specifically, in Type II experiments, LOF, GLOSH, and \(\hbox {KNN}_{\textit{global}}\) join SVDD, LP, and GMM at the top performing group (among which there is no critical difference observed between the methods) with respect to ROC AUC and AdjustedPrec@n. They also remain in the top performing group with respect to MCC, for which the performance of SVDD and LP is once again low. When comparing the average values of the evaluation measures (rather than ranks) between Type I and Type II experiments, the boundary-based and neighborhood-based outlier detection methods tend to remain more stable than other methods, such as GMM, iForest, and ABOD, for which e.g. the average ROC AUC decreased, respectively, from 0.87, 0.83, and 0.8 in Type I experiments to 0.83, 0.75, and 0.72 in Type II experiments (see Table 3 for summarized results and in Section 2 in the Supplementary Material for full details on all experiments).
6.1.3 Type III: Local outliers
Figure 11 shows the average ranks of the methods over all Type III experiments with respect to ROC AUC, AdjustedPrec@n, and MCC. In Type III experiments, which correspond to application scenarios involving local outliers as observations in the vicinity/tail of clusters of inliers (here consisting of truncated multivariate Normal distributions), GMM, LOF, SVDD and GLOSH are the top performers, in this order, with no statistical difference observed between their ranks with respect to ROC AUC and AdjustedPrec@n. The relative performance of SVDD as measured by MCC is once again much lower. The fact that GMM outperforms the other methods in every measure can be explained by the fact that the synthetic datasets used in this type of experiment consist of mixtures of Gaussians, which matches the underlying assumption behind GMM models. The good performance of the (non-parametric) LOF and GLOSH models, in turn, can be explained by the fact that these models were specifically designed to detect local outliers. From this perspective, the relative performance of \(\hbox {KNN}_{\textit{global}}\) (global method), as expected, has noticeably dropped in Type III experiments as compared to Type I and Type II experiments. It is interesting to note that the outlier detection algorithms SOD (local on subspaces) and ABOD (global), especially designed for high dimensional data, are among the worst performers in this type of scenario involving local outliers, irrespective of the evaluation measure considered.
6.1.4 Type IV: High-dimensional datasets
Figure 12 shows the average ranks of the methods over all Type IV experiments, involving high-dimensional datasets, with respect to ROC AUC, AdjustedPrec@n, and MCC. When comparing these results with Type I experiments in Fig. 9, a noticeable difference can be observed with respect to SOD: while it was only the 9th best performer in Type I experiments with respect to ROC AUC, its relative performance in the high-dimensional scenario rises significantly and it is now the second best with respect to ROC AUC and the best with respect to MCC. The reason for the increased performance of this method is probably associated with the fact that it has been designed to detect outliers in subspaces of higher dimensional spaces. The other method especially designed for high-dimensional datasets, ABOD, only gains slightly in relative performance. However, this relative performance gain is more related to the drop in performance of methods such as Parzen and LP than due to its own improvement (bear in mind, however, that ABOD has no parameters to tune, which may have given the other methods an advantage when setting them up for the evaluation). The LP method works in the similarity space, and the decrease in its performance might be related to the similarity measure used, namely, the Euclidean distance, which is well-known to suffer from the adverse effects of the “curse of dimensionality” in high dimensions. For Parzen, the sample size required to produce a suitable density estimate depends critically on the dimensionality of the space, which might be the reason behind the decrease in its performance.
6.1.5 Type V: Larger sample size
Figure 13 shows the average ranks of the methods over all Type V experiments, involving larger datasets, with respect to ROC AUC, AdjustedPrec@n, and MCC. When comparing these results with Type I experiments in Fig. 9, a noticeable difference can be observed with respect to iForest: while it was one of the worst performers in Type I experiments, especially with respect to ROC AUC and AdjustedPrec@n, its performance in the larger sample size scenario increases significantly and now it is the top performer with respect to all our measures. This improvement is likely due to the sampling procedure performed by the algorithm to build the iTrees, which requires larger amounts of observations for better performance. This conjecture is in line with the observations by the original authors (Liu et al. 2008, 2012); they also noticed that their method performs better when the dataset is sufficiently large (in the case of their experiments, for a sample size larger than 1000). It is worth remarking, however, that there is no statistically significant difference between any methods in this set of experiments, while noting the small number of the datasets used in this experiment (only 13 datasets had a sample size large enough to be included). Although none of the methods worsened their performance when compared to the experiments involving all datasets (ABOD and SOD maintained the same performance), iForest was the one that exhibited the most noticeable performance gain, rising from 0.83 ROC AUC in the scenario involving all the datasets to 0.89 when only datasets with larger sample sizes are used (see Table 3).
6.2 Model selection and comparison of algorithms under practical parameter tuning
The parameter tuning procedure used for the experiments reported in Sect. 6.1 were (as usual in the literature) based on labeled datasets containing both inliers and outliers. While the outliers were not used directly when training the algorithms, they were used to select the algorithms’ optimal parameters by assessing their cross-validated ROC AUC results. As such, the results should be interpreted as comparing the full potential of the different methods should their optimal parameter values be known. However, as previously discussed, unlike controlled experiments such as those conducted in Sect. 6.1, in practical applications of one-class classification this type of supervised model/parameter selection is not very realistic because there may be only a very small amount of outliers available, if any, which will not allow for a proper cross-validation procedure to be carried out. In real applications, parameter selection must be performed using truly one-class model selection methods, such as those described in Sect. 4.1.
In this section, we evaluate the performance of the model selection methods described in Sect. 4.1, namely, SDS, Perturbation, and Uniform Objects, for selecting the best parameter for the different one-class classifiers, which will be compared under this more realistic scenario. In order to avoid clutter and make the critical difference diagrams cleaner, here we only present results for the overall top performers with statistical significance according to the experiments reported in Sect. 6.1. The complete collection of results, including the full critical difference diagrams, can be found in Section 2 in the Supplementary Material.
Figure 14 shows the average ranks of the methods with the parameters selected by the respective model selection methods over all Type I experiments (single source-class inliers) with respect to ROC AUC, AdjustedPrec@n, and MCC. By looking at ROC AUC and AdjustedPrec@n, one can see that, when equipped with parameters selected by SDS, the GMM, SVDD, and LP models are placed at the top performing group, similarly to the experiments of Sect. 6.1, but now without using any ground truth information about outliers. In contrast, the parameters selected by Perturbation and Uniform Objects make LP and SVDD some of the worst performers, which suggests that these model selection methods may not work well to select parameters for boundary models. When looking at MCC, the overall picture is similar to the optimistic scenario in Sect. 6.1 in that the performance of the boundary models deteriorates significantly, irrespective of the model selection method used. Overall, we can see a clear trend in the models when evaluated using MCC: models selected by SDS (except boundary models) are clustered at the top whereas models selected by Uniform Objects are clustered at the bottom.
The overall picture is similar for the other different scenarios, namely, Type II (multiple source-class inliers), Type III (local outliers), Type IV (high-dimensional datasets), and Type V (larger sample size) experiments. Models selected by SDS usually perform the best, whereas those selected by Uniform Objects tend to comparatively underperform, although there are some occasional inversions. The main conclusions about which methods perform better in each of these scenarios would also not change when selecting the parameters under the practical parameter tuning, which does not use any ground truth information about outliers (the complete collection of results is available in Section 2 in the Supplementary Material).
6.3 Comparison of individual algorithms versus the ensemble approach
As one can see from the results in Sects. 6.1 and 6.2, a single one-class classification algorithm/model cannot outperform the others in every single scenario, and some of them may perform poorly in particular application scenarios. A possible approach to bypassing the selection and use of a single model, whose performance is expected to vary across different datasets, is to rely on an ensemble of multiple models in order to obtain more stable and accurate results.
In this section, we perform three different experiments involving an ensemble: (1) initially, we combine the outputs (outlier scorings as converted into ranks) of all the models evaluated in the experiments shown in Sect. 6.1, using the rank-based ensemble strategy (RRF) described in Sect. 5.6; (2) we then performed a preliminary, controlled experiment where we guided the selection of a subset of base models to be combined into the ensemble using ROC AUC; (3) finally, we performed a more realistic experiment where we select the base members for the ensemble using, in lieu of ROC AUC, the practical model selection methods described in Sect. 4.1, namely, SDS, Perturbation, and Uniform Objects.
6.3.1 Ensemble without selection of base models
We show the results of our first experiment in Fig. 15, which summarizes the comparison between the resulting ensemble (combining all the individual models) against every individual model. Notice that this experiment and results involve the “optimistic” approach for model selection (parameter tuning) adopted in Sect. 6.1. Also, notice that MCC has not been displayed as it cannot be straightforwardly computed in a meaningful way for the ensemble: while MCC computation requires a binary inlier/outlier classification output, the ensemble just combines the multiple rankings of outlier scores produced by the different models, each of which adopts a different decision boundary/threshold to perform classifications, and these classifications cannot be combined by the ensemble using the rank-based strategy adopted here.
When comparing the performance of the individual methods against the ensemble in Fig. 15, one can see that although the ensemble appears among the top performers, SVDD and GMM perform on average as well as the ensemble, with no statistical difference. Hence, from a computational standpoint, SVDD and GMM might be preferred as they exhibit good overall performance while requiring training of a single model. On the other hand, one advantage of the ensemble approach is that by combining multiple results it can reduce the variance of the individual performances across different applications. For example, we have 6 occurrences of values below 0.7 of ROC AUC for SVDD and GMM, in contrast to only 3 for the ensemble (see Table 6). In addition, we will show below that the performance of the ensemble can be further improved by proper selection of ensemble members.
6.3.2 Optimistic selection of base models
As previously discussed in Sect. 2.3, there are two key properties that an ensemble should have: diversity and accuracy. Although combining all available models can increase diversity, some of the individual models may not be accurate enough to positively contribute to the combined result as ensemble members. To confirm this hypothesis, we initially performed a preliminary, controlled experiment where we combined into the ensemble only the base models that exhibited ROC AUC values higher than the average across all models. The result is displayed in Fig. 16, which displays a noticeable gain in performance for the ensemble (even though there is still no statistical difference in the ranks when compared to SVDD and GMM). When comparing the evaluation measures for the ensemble approach without and with selection of ensemble members, there is an increase of average ROC AUC from 0.87 to 0.89 and also an increase of average AdjustedPrec@n from 0.58 to 0.64.
6.3.3 Practical selection of base models
The aforementioned improvement in ensemble performance, however, may not be achievable in practical applications of one-class classification as it requires outliers for selection of base members using ROC AUC. As an attempt to overcome this limitation, we performed additional experiments where we select base members for the ensemble using, in lieu of ROC AUC, the practical model selection methods described in Sect. 4.1, namely, SDS, Perturbation, and Uniform Objects. These methods were used to select the best parameter(s) for each model in Sect. 6.2, and now they are used again to also select the best of those models/results (i.e., those above average) to be combined into the ensemble.
Figure 17 displays the results. Similarly to our preliminary, controlled experiment, the ensemble is consistently a top performer irrespective of the evaluation measure considered, and also irrespective of the model selection method used to select ensemble members and their parameters. For SDS, the individual models GMM, SVDD, LP, and \(\hbox {KNN}_{\textit{global}}\) are overall competitive against the ensemble, with no statistically significant difference observed between their average ranks. In the case of Perturbation, only GMM and \(\hbox {KNN}_{\textit{global}}\) are overall statistically comparable to the ensemble. Here it is worth noticing that, as previously discussed, Perturbation did not perform well in selecting parameters for boundary models, so the statistical difference observed between the ensemble and these particular models is at least in part explained by the poor performance of these individual models when equipped with parameters selected by Perturbation. As for the Uniform Objects method, depending on the evaluation measure considered there is a number of individual models exhibiting no statistically significant difference from the ensemble, namely, GMM, \(\hbox {KNN}_{\textit{global}}\), SOD, LOCI, and GLOSH. Once again, it is worth noticing that the statistically significant difference between the ensemble and the boundary methods LP and SVDD is likely due to the same reason explained above for Perturbation.
Overall, when comparing ensemble combinations using the different model selection methods to select ensemble members and their parameters (Fig. 18), ensembles built based on SDS usually perform best, while those using Uniform Objects usually have the worst performance, in agreement with our previous results involving model selection experiments in Sect. 6.2.
7 Conclusion
In this paper, we performed and reported a comprehensive comparison of one-class classification algorithms/models as well as unsupervised outlier detection methods extended to the one-class classification scenario. These methods were evaluated over a large number of datasets, measuring performance with respect to ROC AUC, AdjustedPrec@n, and MCC in different experimental settings. We also evaluated the use of three model selection techniques for one-class classification to select models and their parameters when only labeled observations of the inlier class are available. Finally, we studied how an ensemble of one-class classifiers compares against individual based models, particularly when selecting ensemble members by using one-class model selection methods.
Regarding the studied models, a noticeable result is that methods specifically designed for one-class classification usually perform better in the scenarios studied. More specifically, GMM and SVDD appear among the top performers in most scenarios, and as such they can be sensible choices when there is very little or no information about the characteristics of the particular application scenario in hand. However, in specific scenarios unsupervised outlier detection methods can become very competitive and appear among the top performers, for example: locally sensitive density-based outlier detection methods such as GLOSH and LOF in scenarios with local outliers as well as in scenarios with a possibly multi-modal target class of inliers; SOD for scenarios involving high-dimensional datasets; and iForest for large datasets. These conclusions contrast to the previous comparison study by Janssens et al. (2009), which evaluated only the scenario of Single Source-Class Inliers. The authors reported SVDD, LOF, and \(\hbox {kNN}_{\textit{local}}\) as the top-performers. We, however, could only confirm the top performance of SVDD. In addition, SVDD only appears as a top performer when considering the problem of outlier/inlier ranking (as assessed by ROC AUC and AdjustedPrec@n), but not the binary outlier/inlier classification problem (as assessed by MCC). This result may suggest that the classification threshold imposed by this algorithm is not necessarily suitable despite the quality of the model in terms of ranking outliers above inliers.
It is also important to acknowledge that we do not evaluate the algorithms in all possible application scenarios. Therefore, although some methods did not perform well in any of the scenarios comprised in our benchmark, they might perform well in other scenarios. For example, deep-learning methods have been shown to be effective on large and complex datasets in specialised domains (Ruff et al. 2018, 2020), which are not considered here. In the scenarios studied here, the traditional algorithms have shown to be more effective. This conclusion is in agreement with Ruff et al. (2020), who also reported the advantage of shallow over deep approaches in tabular data.
Regarding the practical model selection methods, the most noticeable result is that SDS appears to be the top choice regardless of the scenario or measure, consistently selecting the best models in the scenarios studied, while Uniform Objects consistently performed the worst. This finding extends the conclusion of Wang et al. (2018), who reported SDS as the top-performer among the methods studied for hyperparameter selection of OCSVM (Schölkopf et al. 2001). In our more comprehensive comparative study, we also confirmed the top performance of SDS (if not in first, very close and without statistical difference with respect to the first) when selecting parameters for the 14 different algorithms studied on the 5 different application scenarios considered, as well as when guiding the selection of ensemble members.
When comparing the practical parameter tuning against the optimistic one (which uses ground-truth labels from both classes), we can see that the same methods are placed similarly at the top performing group, regardless of the tuning approach adopted. This suggests that effective model selection can be achieved in practice in the absence of outliers in the training dataset. Another important conclusion regarding the model selection methods is the ineffectiveness of Perturbation and Uniform Objects when selecting parameters for boundary methods such as SVDD and LP.
Finally, the ensemble approach has proven a robust and effective choice when compared to individual classifiers. Our most important conclusion regarding ensembles is that a guided selection of base members is effective to enhance performance, and it can be achieved in practice by using model selection techniques for one-class classification. In agreement with the conclusions above regarding model selection, ensembles built based on SDS usually perform best, with statistical significance when compared to Uniform Objects.
Although the ensemble approach has proven a robust and effective choice, in the context of ensembles, we only investigate how to select accurate one-class classifiers. There are two other central questions to build good ensembles: How to introduce diversity into the ensembles and how to combine the results. Therefore, two interesting directions for future research are: (1) a comprehensive comparative study of different score-based and rank-based combination strategies; (2) a comprehensive study of a different strategy to introduce diversity, for example, using the same base model (e.g., GMM and/or SVDD), but with different variations of the data (e.g., subsampling and/or subspaces).
Availability of data, material, and code
We made publicly available all the codes and datasets used at https://github.com/homarques/occ.
Notes
Note that only the linear SVDD can be efficiently computed in \({\mathcal {O}}(N)\); if other kernels were to be adopted, the SVDD computation would be \({\mathcal {O}}(N^3)\).
Note that although the unsupervised outlier detection algorithms usually do not provide this threshold, when they are applied to the framework for one-class classification discussed in Sect. 3.3 this threshold is provided as a by-product of an arbitrary choice of \(\alpha \).
In the case of parameter(s) that result in the same ROC AUC value, we select the parameter(s) that result in the best MCC value. If the tie persists, we look at AdjustedPrec@n.
It is beyond the scope of this paper to investigate/compare different score-based or rank-based combination strategies. We use RRF because it has been shown before as one of the top-performers for ensemble combinations (Jaskowiak et al. 2016).
References
Adewumi AO, Akinyelu AA (2017) A survey of machine-learning and nature-inspired based credit card fraud detection techniques. Int J Syst Assur Eng Manag 8(2s):937–953. https://doi.org/10.1007/s13198-016-0551-y
Aggarwal CC (2013) Outlier analysis. Springer. https://doi.org/10.1007/978-1-4614-6396-2
Aggarwal CC, Sathe S (2017) Outlier ensembles—an introduction. Springer. https://doi.org/10.1007/978-3-319-54765-7
Alaverdyan Z, Jung J, Bouet R et al (2020) Regularized siamese neural network for unsupervised outlier detection on brain multiparametric magnetic resonance imaging: application to epilepsy lesion screening. Medical Image Anal. https://doi.org/10.1016/j.media.2019.101618
Azami ME, Lartizien C, Canu S (2017) Converting SVDD scores into probability estimates: application to outlier detection. Neurocomputing 268:64–75. https://doi.org/10.1016/j.neucom.2017.01.103
Baldi P, Brunak S, Chauvin Y et al (2000) Assessing the accuracy of prediction algorithms for classification: an overview. Bioinform 16(5):412–424. https://doi.org/10.1093/bioinformatics/16.5.412
Barnett V, Lewis T (1994) Outliers in statistical data, 3rd edn. Wiley
Bezerra VH, da Costa VGT, Junior SB et al (2019) IoTDS: a one-class classification approach to detect botnets in internet of things devices. Sensors 19(14):3188. https://doi.org/10.3390/s19143188
Bishop CM (2007) Pattern recognition and machine learning, 5th edn. Springer
Breunig MM, Kriegel H, Ng RT et al (2000) LOF: identifying density-based local outliers. In: Proceedings of the 2000 SIGMOD international conference on management of data. ACM, pp 93–104. https://doi.org/10.1145/342009.335388
Campello RJGB, Moulavi D, Zimek A et al (2015) Hierarchical density estimates for data clustering, visualization, and outlier detection. ACM Trans Knowl Discov Data 10(1):5:1-5:51. https://doi.org/10.1145/2733381
Campos GO, Zimek A, Sander J et al (2016) On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min Knowl Discov 30(4):891–927. https://doi.org/10.1007/s10618-015-0444-8
Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: a survey. CoRR arXiv:1901.03407
Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15:1-15:58. https://doi.org/10.1145/1541880.1541882
Chong YS, Tay YH (2017) Abnormal event detection in videos using spatiotemporal autoencoder. In: Proceedings of the 14th ISNN international symposium on neural networks, advances in neural networks. Springer, pp 189–196. https://doi.org/10.1007/978-3-319-59081-3_23
Cormack GV, Clarke CLA, Büttcher S (2009) Reciprocal rank fusion outperforms condorcet and individual rank learning methods. In: Proceedings of the 32nd SIGIR international conference on research and development in information retrieval. ACM, pp 758–75., https://doi.org/10.1145/1571941.1572114
de Ridder D, Tax DMJ, Duin RPW (1998) An experimental comparison of one-class classification methods. In: Proceedings of the 4th ASCI advanced school for computing and imaging, pp 213–218
Demsar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1–30
Désir C, Bernard S, Petitjean C et al (2013) One class random forests. Pattern Recognit 46(12):3490–3506. https://doi.org/10.1016/j.patcog.2013.05.022
Dheeru D, Karra Taniskidou E (2017) UCI machine learning repository. http://archive.ics.uci.edu/ml
Duin RPW (1976) On the choice of smoothing parameters for Parzen estimators of probability density functions. IEEE Trans Comput 25(11):1175–1179. https://doi.org/10.1109/TC.1976.1674577
Erfani SM, Baktashmotlagh M, Rajasegarar S et al (2015) R1SVM: a randomised nonlinear approach to large-scale anomaly detection. In: Proceedings of the 29th AAAI conference on artificial intelligence. AAAI Press, pp 432–438
Friedman M (1937) The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J Am Stat Assoc 32(200):675–701. https://doi.org/10.1080/01621459.1937.10503522
Galar M, Fernández A, Tartas EB et al (2012) A review on ensembles for the class imbalance problem: bagging-, boosting-, and hybrid-based approaches. IEEE Trans Syst Man Cybern 42(4):463–484. https://doi.org/10.1109/TSMCC.2011.2161285
Gao J, Tan P (2006) Converting output scores from outlier detection algorithms into probability estimates. In: Proceedings of the 6th ICDM international conference on data mining. IEEE Computer Society, pp 212–221. https://doi.org/10.1109/ICDM.2006.43
Ghafoori Z, Rajasegarar S, Erfani SM et al (2016) Unsupervised parameter estimation for one-class support vector machines. In: Proceedings of the 20th PAKDD Pacific-Asia conference on knowledge discovery and data mining, advances in knowledge discovery and data mining. Springer, pp 183–195. https://doi.org/10.1007/978-3-319-31750-2_15
González F, Dasgupta D (2002) Neuro-immune and self-organizing map approaches to anomaly detection: a comparison. In: Proceedings of the 1st ICARIS international conference on artificial immune system, pp 203–211
Goodfellow IJ, Pouget-Abadie J, Mirza M et al (2014) Generative adversarial nets. In: Proceedings of the 27th NIPS international conference on neural information processing systems, advances in neural information processing systems, pp 2672–2680
Goodfellow IJ, Bengio Y, Courville AC (2016) Deep learning. MIT Press
Han J, Kamber M, Pei J (2011) Data mining: concepts and techniques, 3rd edn. Morgan Kaufmann
Hawkins DM (1980) Identification of outliers. Chapman & Hall
Hempstalk K, Frank E, Witten IH (2008) One-class classification by combining density and class probability estimation. In: Proceedings of the ECML/PKDD Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 505–519. https://doi.org/10.1007/978-3-540-87479-9_51
Hido S, Tsuboi Y, Kashima H et al (2008) Inlier-based outlier detection via direct density ratio estimation. In: Proceedings of the 8th ICDM international conference on data mining. IEEE Computer Society, pp 223–232. https://doi.org/10.1109/ICDM.2008.49
Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504–507. https://doi.org/10.1126/science.1127647
Huber PJ, Ronchetti EM (2009) Robust statistics, 2nd edn. Wiley
Janssens JHM, Postma EO (2009) One-class classification with LOF and LOCI: an empirical comparison. In: Proceedings of the 18th annual Belgian-Dutch on machine learning, pp 56–64
Janssens JHM, Flesch I, Postma EO (2009) Outlier detection with one-class classifiers from ML and KDD. In: Proceedings of the 2009 ICMLA international conference on machine learning and applications. IEEE Computer Society, pp 147–153. https://doi.org/10.1109/ICMLA.2009.16
Jaskowiak PA, Moulavi D, Furtado ACS et al (2016) On strategies for building effective ensembles of relative clustering validity criteria. Knowl Inf Syst 47(2):329–354. https://doi.org/10.1007/s10115-015-0851-6
Joachims T (2006) Training linear SVMs in linear time. In: Proceedings of the 12th SIGKDD international conference on knowledge discovery and data mining. ACM, pp 217–226. https://doi.org/10.1145/1150402.1150429
Juszczak P (2006) Learning to recognise: a study on one-class classification and active learning. Ph.D. thesis, Delft University of Technology
Khan SS, Madden MG (2014) One-class classification: taxonomy of study and review of techniques. Knowl Eng Rev 29(3):345–374. https://doi.org/10.1017/S026988891300043X
Kirch W (2008) Pearson’s correlation coefficient. In: Kirch W (ed) Encyclopedia of public health. Springer, pp 1090–1091. https://doi.org/10.1007/978-1-4020-5614-7_2569
Krawczyk B, Cyganek B (2017) Selecting locally specialised classifiers for one-class classification ensembles. Pattern Anal Appl 20(2):427–439. https://doi.org/10.1007/s10044-015-0505-z
Krawczyk B, Woźniak M (2014) Diversity measures for one-class classifier ensembles. Neurocomputing 126:36–44. https://doi.org/10.1016/j.neucom.2013.01.053
Krawczyk B, Schaefer G, Wozniak M (2013) Combining one-class classifiers for imbalanced classification of breast thermogram features. In: Proceedings of the 2013 4th CIMI international workshop on computational intelligence in medical imaging. IEEE, pp 36–41. https://doi.org/10.1109/CIMI.2013.6583855
Kriegel H, Schubert M, Zimek A (2008) Angle-based outlier detection in high-dimensional data. In: Proceedings of the 14th SIGKDD international conference on knowledge discovery and data mining. ACM, pp 444–452. https://doi.org/10.1145/1401890.1401946
Kriegel H, Kröger P, Schubert E et al (2009) Outlier detection in axis-parallel subspaces of high dimensional data. In: Proceedings of the 13th PAKDD Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 831–838. https://doi.org/10.1007/978-3-642-01307-2_86
Kriegel H, Kröger P, Schubert E et al (2011) Interpreting and unifying outlier scores. In: Proceedings of the 11th SDM international conference on data mining. SIAM, pp 13–24. https://doi.org/10.1137/1.9781611972818.2
Krizhevsky A, Sutskever I, Hinton GE (2017) Imagenet classification with deep convolutional neural networks. Commun ACM 60(6):84–90. https://doi.org/10.1145/3065386
Kwon D, Kim H, Kim J et al (2019) A survey of deep learning-based network anomaly detection. Clust Comput 22(Suppl 1):949–961. https://doi.org/10.1007/s10586-017-1117-8
LeCun Y, Bengio Y, Hinton GE (2015) Deep learning. Nature 521(7553):436–444. https://doi.org/10.1038/nature14539
Litjens G, Kooi T, Bejnordi BE et al (2017) A survey on deep learning in medical image analysis. Med Image Anal 42:60–88. https://doi.org/10.1016/j.media.2017.07.005
Liu FT, Ting KM, Zhou Z (2008) Isolation forest. In: Proceedings of the 8th ICDM international conference on data mining. IEEE Computer Society, pp 413–422. https://doi.org/10.1109/ICDM.2008.17
Liu FT, Ting KM, Zhou Z (2012) Isolation-based anomaly detection. ACM Trans Knowl Discov Data 6(1):31–339. https://doi.org/10.1145/2133360.2133363
Liu Y, Li Z, Zhou C et al (2020) Generative adversarial active learning for unsupervised outlier detection. IEEE Trans Knowl Data Eng 32(8):1517–1528. https://doi.org/10.1109/TKDE.2019.2905606
Markou M, Singh S (2003) Novelty detection: a review—part 1: statistical approaches. Signal Process 83(12):2481–2497. https://doi.org/10.1016/j.sigpro.2003.07.018
Marques HO (2019) Evaluation and model selection for unsupervised outlier detection and one-class classification. Ph.D. thesis, University of São Paulo. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-07012020-105601
Matthews BW (1975) Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochim Biophys Acta (BBA) Protein Struct 405(2):442–451. https://doi.org/10.1016/0005-2795(75)90109-9
Mendes-Moreira J, Soares C, Jorge AM et al (2012) Ensemble approaches for regression: a survey. ACM Comput Surv 45(1):10:1-10:40. https://doi.org/10.1145/2379776.2379786
Møller MF (1993) A scaled conjugate gradient algorithm for fast supervised learning. Neural Netw 6(4):525–533. https://doi.org/10.1016/S0893-6080(05)80056-5
Neményi P (1963) Distribution-free multiple comparisons. Ph.D. thesis, Princeton University
Pang G, Shen C, Cao L et al (2022) Deep learning for anomaly detection: a review. ACM Comput Surv 54(2):38:1-38:38. https://doi.org/10.1145/3439950
Papadimitriou S, Kitagawa H, Gibbons PB et al (2003) LOCI: fast outlier detection using the local correlation integral. In: Proceedings of the 19th ICDE international conference on data engineering. IEEE Computer Society, pp 315–326. https://doi.org/10.1109/ICDE.2003.1260802
Parzen E (1962) On estimation of a probability density function and mode. Ann Math Stat 33(3):1065–1076
Pekalska E, Tax DMJ, Duin RPW (2002) One-class LP classifiers for dissimilarity representations. In: Proceedings of the 15th NIPS international conference on neural information processing systems, advances in neural information processing systems. MIT Press, pp 761–768
Perera P, Patel VM (2019) Learning deep features for one-class classification. IEEE Trans Image Process 28(11):5450–5463. https://doi.org/10.1109/TIP.2019.2917862
Pimentel MAF, Clifton DA, Clifton LA et al (2014) A review of novelty detection. Signal Process 99:215–249. https://doi.org/10.1016/j.sigpro.2013.12.026
Platt JC (2000) Probabilities for SV machines. In: Smola AJ, Bartlett P, Schölkopf B et al (eds) Advances in large-margin classifiers. MIT Press, pp 61–74. https://doi.org/10.7551/mitpress/1113.003.0008
Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large data sets. In: Proceedings of the 2000 SIGMOD international conference on management of data. ACM, pp 427–438. https://doi.org/10.1145/342009.335437
Ramotsoela DT, Abu-Mahfouz AM, Hancke GP (2018) A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study. Sensors 18(8):2491. https://doi.org/10.3390/s18082491
Rodríguez-Ruiz J, Mata-Sánchez JI, Monroy R et al (2020) A one-class classification approach for bot detection on twitter. Comput Secur 91(101):715. https://doi.org/10.1016/j.cose.2020.101715
Rokach L (2010) Ensemble-based classifiers. Artif Intell Rev 33(1–2):1–39. https://doi.org/10.1007/s10462-009-9124-7
Ruff L, Görnitz N, Deecke L et al (2018) Deep one-class classification. In: Proceedings of the 35th ICML international conference on machine learning. PMLR, pp 4390–4399
Ruff L, Vandermeulen RA, Görnitz N et al (2020) Deep semi-supervised anomaly detection. In: Proceedings of the 8th ICLR international conference on learning representations. OpenReview.net
Schlegl T, Seeböck P, Waldstein SM et al (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Proceedings of the 25th IPMI international conference on information processing in medical imaging. Springer, pp 146–157. https://doi.org/10.1007/978-3-319-59050-9_12
Schölkopf B, Platt JC, Shawe-Taylor J et al (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443–1471. https://doi.org/10.1162/089976601750264965
Schubert E, Zimek A, Kriegel H (2014) Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min Knowl Discov 28(1):190–237. https://doi.org/10.1007/s10618-012-0300-z
Schubert E, Weiler M, Zimek A (2015) Outlier detection and trend detection: two sides of the same coin. In: ICDMW international conference on data mining workshop. IEEE Computer Society, pp 40–46. https://doi.org/10.1109/ICDMW.2015.79
Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: Proceedings of the 3rd ICLR international conference on learning representations
Smyth P (2000) Model selection for probabilistic clustering using cross-validated likelihood. Stat Comput 10(1):63–72. https://doi.org/10.1023/A:1008940618127
Spinosa EJ, de Leon Ferreira de Carvalho ACP (2005) Combining one-class classifiers for robust novelty detection in gene expression data. In: Proceedings of the 2005 BSB Brazilian symposium on bioinformatics, advances in bioinformatics and computational biology. Springer, pp 54–64. https://doi.org/10.1007/11532323_7
Strehl A, Ghosh J (2002) Cluster ensembles—a knowledge reuse framework for combining multiple partitions. J Mach Learn Res 3:583–617
Swersky L, Marques HO, Sander J et al (2016) On the evaluation of outlier detection and one-class classification methods. In: Proceedings of the 2016 DSAA international conference on data science and advanced analytics. IEEE, pp 1–10. https://doi.org/10.1109/DSAA.2016.8
Tan PN, Steinbach M, Kumar V (2005) Introduction to data mining. Addison Wesley
Tax DMJ (2001) One-class classification. Ph.D. thesis, Delft University of Technology
Tax DMJ, Duin RPW (2001a) Combining one-class classifiers. In: Proceedings of the 2nd MCS international workshop on multiple classifier systems. Springer, pp 299–308. https://doi.org/10.1007/3-540-48219-9_30
Tax DMJ, Duin RPW (2001b) Uniform object generation for optimizing one-class classifiers. J Mach Learn Res 2:155–173
Tax DMJ, Duin RPW (2004) Support vector data description. Mach Learn 54(1):45–66. https://doi.org/10.1023/B:MACH.0000008084.60811.49
Tax DMJ, Müller K (2004) A consistency-based model selection for one-class classification. In: Proceedings of the 17th ICPR international conference on pattern recognition. IEEE Computer Society, pp 363–366. https://doi.org/10.1109/ICPR.2004.1334542
Vincent P, Larochelle H, Lajoie I et al (2010) Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J Mach Learn Res 11:3371–3408. https://doi.org/10.5555/1756006.1953039
Wang S, Liu Q, Zhu E et al (2018) Hyperparameter selection of one-class support vector machine by self-adaptive data shifting. Pattern Recognit 74:198–211. https://doi.org/10.1016/j.patcog.2017.09.012
Xiao Y, Wang H, Xu W (2015) Parameter selection of Gaussian kernel for one-class SVM. IEEE Trans Cybern 45(5):927–939. https://doi.org/10.1109/TCYB.2014.2340433
Yeung KY, Fraley C, Murua A et al (2001) Model-based clustering and data transformations for gene expression data. Bioinformatics 17(10):977–987. https://doi.org/10.1093/bioinformatics/17.10.977
Yeung KY, Medvedovic M, Bumgarner RE (2003) Clustering gene-expression data with repeated measurements. Genome Biol 4(5):1–17. https://doi.org/10.1186/gb-2003-4-5-r34
Zhang J, Lu J, Zhang G (2011) Combining one class classification models for avian influenza outbreaks. In: Proceedings of the 2011 MCDM symposium on computational intelligence in multicriteria decision-making. IEEE, pp 190–196. https://doi.org/10.1109/SMDCM.2011.5949278
Zhou ZH (2012) Ensemble methods: foundations and algorithms. Chapman & Hall
Zimek A, Filzmoser P (2018) There and back again: outlier detection between statistical reasoning and data mining algorithms. WIREs Data Mining Knowl Discov. https://doi.org/10.1002/widm.1280
Zimek A, Schubert E, Kriegel H (2012) A survey on unsupervised outlier detection in high-dimensional numerical data. Stat Anal Data Min 5(5):363–387. https://doi.org/10.1002/sam.11161
Zimek A, Campello RJGB, Sander J (2013a) Ensembles for unsupervised outlier detection: challenges and research questions a position paper. SIGKDD Explor 15(1):11–22. https://doi.org/10.1145/2594473.2594476
Zimek A, Gaudet M, Campello RJGB et al (2013b) Subsampling for efficient and effective unsupervised outlier detection ensembles. In: Proceedings of the 19th SIGKDD international conference on knowledge discovery and data mining. ACM, pp 428–436. https://doi.org/10.1145/2487575.2487676
Zimek A, Campello RJGB, Sander J (2014) Data perturbation for outlier detection ensembles. In: Proceedings of the 2014 SSDBM conference on scientific and statistical database management. ACM, pp 13:1–13:12. https://doi.org/10.1145/2618243.2618257
Funding
Open access funding provided by Royal Danish Library. This work has partly been funded by NSERC Canada and the Independent Research Fund Denmark in the project “Reliable Outlier Detection”.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflict of interest to declare that are relevant to the content of this article.
Additional information
Responsible editor: Nikolaj Tatti.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Below is the link to the electronic supplementary material.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Marques, H.O., Swersky, L., Sander, J. et al. On the evaluation of outlier detection and one-class classification: a comparative study of algorithms, model selection, and ensembles. Data Min Knowl Disc 37, 1473–1517 (2023). https://doi.org/10.1007/s10618-023-00931-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10618-023-00931-x