Research on Anomaly Detection in Time Series: Exploring United States Exports and Imports Using Long Short-Term Memory
This survey aims to offer a thorough and organized overview of research on anomaly detection, which is a significant problem that has been studied in various fields and application areas. Some anomaly detection techniques have been tailored for specific domains, while others are more general. Anomaly detection involves identifying unusual patterns or events in a dataset, which is important for a wide range of applications including fraud detection and medical diagnosis. Not much research on anomaly detection techniques has been conducted in the field of economic and international trade. Therefore, this study attempts to analyse the time-series data of United Nations exports and imports for the period 1992 – 2022 using LSTM based anomaly detection algorithm. Deep learning, particularly LSTM networks, are becoming increasingly popular in anomaly detection tasks due to their ability to learn complex patterns in sequential data.
This paper presents a detailed explanation of LSTM architecture, including the role of input, forget, and output gates in processing input vectors and hidden states at each timestep. The LSTM based anomaly detection approach yields promising results by modelling small-term as well as long-term temporal dependencies.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
Aggarwal, S. (2023). Research on Anomaly Detection in Time Series: Exploring United States Exports and Imports Using Long Short-Term Memory. Journal of Research, Innovation and Technologies, Volume II, 2(4), 199-225. https://doi.org/10.57017/jorit.v2.2(4).06
Article’s history:
Received 7th of August, 2023; Revised 25th of August, 2023; Accepted for publication 25th of October, 2023; Available online: 1st of November, 2023. Published as article in Volume II, Issue 2(4).
[1] Agarwal, A., Dawson, S., McKee, D., Eugster, P., Tancreti, M., and Sundaram, V. (2017). Detecting abnormalities in IoT program executions through control-flow-based features. In Proceedings of the 2nd International Conference on Internet-of-Things Design and Implementation (pp. 339-340). https://doi.org/10.1145/3054977.3057312
[2] Aggarwal, C.C. (2013). Outlier Analysis. New York, NY: Springer. https://doi.org/10.1007/978-1-4614-6396-2
[3] Aggarwal, S. (2016). Determinants of money demand for India in presence of structural break: An empirical analysis. Business and Economic Horizons (BEH), Prague Development Center (PRADEC), 12(4), 173-177. https://ageconsearch.umn.edu/record/264618
[4] Aggarwal, S. (2017a). Smile curve and its linkages with global value chains. Journal of Economic Bibliography, 4(3). http://dx.doi.org/10.1453/jeb.v4i3.1434
[5] Aggarwal, S. (2017b). Sectoral Level Analysis of India’s Bilateral Trade over 2001-2015. MPRA Paper No 80099, University Library of Munich, Germany. Retrieved from https://mpra.ub.uni-muenchen.de/80099/ (Accessed on March 10, 2023)
[6] Aggarwal, S. (2020). Determinants of Intra-Industry Trade and Labour Market Adjustment: A Sectoral Analysis for India (Doctoral dissertation, Indian Institute of Foreign Trade).
[7] Aggarwal, S. (2023a). Machine Learning Algorithms, Perspectives, and Real - World Application: Empirical Evidence from United States Trade Data. International Journal of Science and Research, 12(3), 292-313. https://www.ijsr.net/getabstract.php?paperid=SR23305084601
[8] Aggarwal, S. (2023b). The empirical measurement and determinants of intra-industry trade for a developing country. MPRA Paper No. 117112, University Library of Munich, Germany.
[9] Aggarwal, S., and Chakraborty, D. (2017). Determinants of India’s bilateral intra-industry trade over 2001–2015: Empirical results. South Asia Economic Journal, 18(2), 296–313. https://doi.org/10.1177/1391561417713127
[10] Aggarwal, S., and Chakraborty, D. (2019). Which factors influence India’s intra-industry trade? Empirical findings for select sectors. Global Business Review, 23(3), 729-755. https://doi.org/10.1177/0972150919868343
[11] Aggarwal, S., and Chakraborty, D. (2020a). Labour market adjustment and intra-industry trade: Empirical results from Indian manufacturing sectors. Journal of South Asian Development, 15(2), 238-269. https://doi.org/10.1177/0973174120954623
[12] Aggarwal, S., and Chakraborty, D. (2020b). Determinants of vertical intra-industry trade: Empirical evidence from Indian manufacturing sectors. Prajnan: Journal of Social and Management Sciences, 49(3), 221-252. https://www.nibmindia.org/documents/86/Sample_Article_Prajnan.pdf
[13] Aggarwal, S., and Chakraborty, D. (2020c). Is there any relationship between Marginal Intra-Industry Trade and Employment Change? Evidence from Indian Industries. Working Paper, No. EC-20-44, Indian Institute of Foreign Trade, Delhi.
[14] Aggarwal, S., Chakraborty, D., and Bhattacharyya, R. (2021). Determinants of Domestic Value Added in Exports: Empirical Evidence from India’s Manufacturing Sectors. Global Business Review. https://doi.org/10.1177/09721509211050138.
[15] Aggarwal, S., and Chakraborty, D. (2021). Which factors influence vertical intra-industry trade in India? Empirical results from panel data analysis. Working Paper, No. EC-21-54, Indian Institute of Foreign Trade, Delhi. Retrieved from http://cc.iift.ac.in/research/Docs/WP/EC-21-54.pdf Accessed on March 20, 2023.
[16] Aggarwal, S., and Chakraborty, D. (2022). Which Factors Influence India’s Bilateral Intra-Industry Trade? Cross-Country Empirical Estimates. Working Papers 2260, Indian Institute of Foreign Trade, Delhi.
[17] Aggarwal, S., Mondal, S., and Chakraborty, D. (2022). Efficiency Gain in Indian Manufacturing Sectors: Evidence from Domestic Value Addition in Exports. Empirical Economics Letters, 21(2): 69-83.
[18] Aggarwal, S., Chakraborty, D., and Banik, N. (2023). Does Difference in Environmental Standard Influence India’s Bilateral IIT Flows? Evidence from GMM Results. Journal of Emerging Market Finance, 22(1), 7–30. https://doi.org/10.1177/09726527221088412
[19] Ahmed, M., Mahmood, A. N., and Hu, J. (2014). Outlier Detection. In The state of the art in intrusion prevention and detection, 44, 3-21. New York, USA: CRC Press. https://doi.org/10.1201/b16390. ISBN: 9780429090578
[20] Albelwi, S., and Mahmood, A. (2017). A framework for designing the architectures of deep convolutional neural networks. Entropy, 19(6), 242. https://doi.org/10.3390/e19060242
[21] Anderson, J. E. (1979). A theoretical foundation for the gravity equation. The American Economic Review, 69(1), 106-116. https://www.jstor.org/stable/1802501
[22] Barnett, V., and Lewis, T. (1994). Outliers in statistical data, 3(1). John Wiley and sons, New York. https://doi.org/10.1016/0169-2070(95)00625-7
[23] Batarseh, F., Gopinath, M., Nalluru, G., and Beckman, J. (2019). Application of machine learning in forecasting international trade trends. https://doi.org/10.48550/arXiv.1910.03112
[24] Beckman, R. J., and Cook, R. D. (1983). Outlier………. s. Technometrics, 25(2), 119-149. 10.1080/00401706.1983.10487840
[25] Bengio, Y., Courville, A., and Vincent, P. (2013). Representation learning: A review and new perspectives. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(8), 1798-1828. 10.1109/TPAMI.2013.50
[26] Bhattacharya, K., Mukherjee, G., Manna, S.S. (2007). The International Trade Network. In: Chatterjee, A., Chakrabarti, B.K. (eds) Econophysics of Markets and Business Networks. New Economic Windows. Springer, Milano. https://doi.org/10.1007/978-88-470-0665-2_10
[27] Boukerche, A., Zheng, L., and Alfandi, O. (2020). Outlier detection: Methods, models, and classification. ACM Computing Surveys (CSUR), 53(3), 1-37. https://doi.org/10.1145/3381028
[28] Callado, A., Kamienski, C., Szabó, G., Gero, B. P., Kelner, J., Fernandes, S., & Sadok, D. (2009). A survey on Internet traffic identification. IEEE Communications Surveys & Tutorials, 11(3), 37-52. 10.1109/SURV.2009.090304
[29] Chalapathy, R., and Chawla, S. (2019). Deep learning for anomaly detection: A survey. https://doi.org/10.48550/arXiv.1901.03407
[30] Chandola, V., Banerjee, A., and Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1-58. https://doi.org/10.1145/1541880.1541882
[31] Charitou, C., Garcez, A. D. A., and Dragicevic, S. (2020). Semi-supervised GANs for fraud detection. International Joint Conference on Neural Networks (IJCNN) Glasgow, UK, pp. 1-8. IEEE. https://doi.org/10.1109/IJCNN48605.2020.9206844
[32] Teng, H.S., Chen, K., & Lu, S.C. (1990). Adaptive real-time anomaly detection using inductively generated sequential patterns. Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 278-284. https://www.cs.unc.edu/~jeffay/courses/nidsS05/ai/Teng-AdaptiveRTAnomaly-SnP90.pdf
[33] Chen, J., Shen, Y., and Ali, R. (2018). Credit card fraud detection using sparse autoencoder and generative adversarial network. IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (pp. 1054-1059). https://ieeexplore.ieee.org/document/8614815
[34] Fiore, U., De Santis, A., Perla, F., Zanetti, P., & Palmieri, F. (2019). Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Information Sciences, 479, 448-455. https://doi.org/10.1016/j.ins.2017.12.030
[35] Fu, K., Cheng, D., Tu, Y., and Zhang, L. (2016). Credit Card Fraud Detection Using Convolutional Neural Networks. In: Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M., Liu, D. (eds) Neural Information Processing. ICONIP 2016. Lecture Notes in Computer Science, Vol 9949. Springer, Cham. https://doi.org/10.1007/978-3-319-46675-0_53
[36] Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., and Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2), 18-28. https://doi.org/10.1016/j.cose.2008.08.003
[37] Gers, F. A., Schmidhuber, J., and Cummins, F. (2000). Learning to forget: Continual prediction with LSTM. Neural Computation, 12(10), 2451-2471. https://doi.org/10.1162/089976600300015015
[38] Ghoddusi, H., Creamer, G. G., and Rafizadeh, N. (2019). Machine learning in energy economics and finance: A review. Energy Economics, 81, 709-727. https://doi.org/10.1016/j.eneco.2019.05.006
[39] Ghosh, S., and Reilly, D. L. (1994). Credit card fraud detection with a neural-network. In System Sciences, 1994. Proceedings of the Twenty-Seventh Hawaii International Conference, Vol. 3, pp. 621-630. IEEE. https://ieeexplore.ieee.org/abstract/document/323314
[40] Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2014). Generative adversarial nets. https://doi.org/10.48550/arXiv.1406.2661
[41] Gopinath, M., Batarseh, F. A., and Beckman, J. (2020). Machine learning in gravity models: An application to agricultural trade, No. w27151. National Bureau of Economic Research.https://www.nber.org/system/files/ working_papers/w27151/w27151.pdf
[42] Gupta, M., Gao, J., Aggarwal, C. C., and Han, J. (2013). Outlier detection for temporal data: A survey. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2250-2267. https://ieeexplore.ieee.org/ document/6684530
[43] Hawkins, D. M. (1980). Identification of Outliers (Vol. 11). Heidelberg, Germany: Springer.
[44] He, H., Wang, J., Graco, W., and Hawkins, S. (1997). Application of neural networks to detection of medical fraud. Expert systems with Applications, 13(4), 329-336. https://doi.org/10.1016/S0957-4174(97)00045-6
[45] Heryadi, Y., and Warnars, H. L. H. S. (2017). Learning temporal representation of transaction amount for fraudulent transaction recognition using CNN, Stacked LSTM, and CNN-LSTM. In 2017 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) (pp. 84-89). https://ieeexplore.ieee.org/document/8311689
[46] Hochreiter, S., and Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735-1780. https://doi.org/10.1162/neco.1997.9.8.1735
[47] Hodge, V., Austin, J. A. 2004. Survey of Outlier Detection Methodologies. Artificial Intelligence Review, 22, 85–126. https://doi.org/10.1023/B:AIRE.0000045502.10941.a9
[48] Javaid, A., Niyaz, Q., Sun, W., and Alam, M. A. (2016). A deep learning approach for network intrusion detection system, In: proceedings of the 9th EAI International Conference on bio-inspired information and communications technologies (formerly BIONETICS). https://doi.org/10.4108/eai.3-12-2015.2262516
[49] Jurgovsky, J., Granitzer, M., Ziegler, K., Calabretto, S., Portier, P. E., He-Guelton, L., and Caelen, O. (2018). Sequence classification for credit-card fraud detection. Expert Systems with Applications, 100, 234-245. https://doi.org/10.1016/j.eswa.2018.01.037.
[50] Kazemi, Z., and Zarrabi, H. (2017, December). Using deep networks for fraud detection in the credit card transactions. IEEE 4th International Conference on Knowledge-based Engineering and Innovation (KBEI) (pp. 0630-0633). Tehran, Iran. https://ieeexplore.ieee.org/document/8324876
[51] Khan, A. U. S., Akhtar, N., and Qureshi, M. N. (2014). Real-time credit-card fraud detection using artificial neural network tuned by simulated annealing algorithm. In Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, ITC (pp. 113-121). https://eecs.csuohio.edu/ ~sschung/CIS601/RealTimeFraudDetectionNNAnealing.pdf
[52] Krizhevsky, A., Sutskever, I., and Hinton, G. E. (2012). ImageNet Classification with Deep Convolutional Networks. 25th Advances in Neural Information Processing Systems. Grenada, Spain. https://doi.org/10.1145/3065386
[53] Kucharski, D., Kleczek, P., Jaworek-Korjakowska, J., Dyduch, G., & Gorgon, M. (2020). Semi-supervised nests of melanocytes segmentation method using convolutional autoencoders. Sensors, 20(6), 1546. https://doi.org/10.3390/s20061546
[54] LeCun, Y., and Bengio, Y. (1995). Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, 3361(10). https://nyuscholars.nyu.edu/en/publications/convolutional-networks-for-images-speech-and-time-series
[55] LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278-2324. https://ieeexplore.ieee.org/document/726791
[56] Lin, J., Keogh, E., Fu, A., & Van Herle, H. (2005). Approximations to magic: Finding unusual medical time series. In 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05) (pp. 329-334). IEEE. https://ieeexplore.ieee.org/document/1467711
[57] Maes, S., Tuyls, K., Vanschoenwinkel, B., & Manderick, B. (2002). Credit card fraud detection using Bayesian and neural networks. In Proceedings of the 1st International NAISO congress on neuro fuzzy technologies, Vol. 261, p. 270.
[58] Malhotra, P., Vig, L., Shroff, G., & Agarwal, P. (2015). Long Short Term Memory Networks for Anomaly Detection in Time Series. In ESANN (Vol. 2015, p. 89). ISBN 978-287587014-8. http://www.i6doc.com/en/
[59] Markou, M., and Singh, S. (2003a). Novelty detection: A review - part 1: Statistical approaches. Signal Processing, 83(12), 2481-2497. https://doi.org/10.1016/j.sigpro.2003.07.018
[60] Markou, M., and Singh, S. (2003b). Novelty detection: A review - part 2: Neural network-based approaches. Signal Processing, 83(12), 2499-2521. https://doi.org/10.1016/j.sigpro.2003.07.019
[61] Michelucci, U. (2018). Feedforward neural networks. Applied Deep Learning: A Case-Based Approach to Understanding Deep Neural Networks, 83-136. https://doi.org/10.1007/978-1-4842-3790-8_3
[62] Miljković, D. (2010). Review of novelty detection methods. In The 33rd International Convention MIPRO (pp. 593-598). IEEE. https://doi.org/10.1016/j.sigpro.2013.12.026
[63] Mirza, M., and Osindero, S. (2014). Conditional generative adversarial nets. https://doi.org/10.48550/arXiv.1411.1784
[64] Monken, A., Haberkorn, F., Gopinath, M., Freeman, L., and Batarseh, F. A. (2021). Graph neural networks for modeling causality in international trade. In The International FLAIRS Conference Proceedings (Vol. 34). https://doi.org/10.32473/flairs.v34i1.128485
[65] Nag, B., Chakraborty, D., and Aggarwal, S. (2021). India's Act East Policy: RCEP Negotiations and Beyond. Working Paper, No. EC-21-01, Indian Institute of Foreign Trade, Delhi.
[66] Noble, C. C., and Cook, D. J. (2003). Graph-based anomaly detection. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 631-636). https://eecs.wsu.edu/~cook/pubs/kdd03.pdf
[67] Nguyen, T. T., and Armitage, G. (2008). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10(4), 56-76. https://ieeexplore.ieee.org/document/ 4738466
[68] O'Shea, K., and Nash, R. (2015). An introduction to convolutional neural networks. https://doi.org/10.48550/arXiv.1511.08458
[69] Panford-Quainoo, K., Kigali, R., Bose, A. J., & Defferrard, M. (2020). Bilateral Trade Modelling with Graph Neural Networks. In ICLR Workshop on Practical ML for Developing Countries.
[70] Park, J. (2018). RNN based time-series anomaly detector model implemented in Pytorch. https://github. com/chickenbestlover/RNN-Time-series-Anomaly-Detection
[71] Patcha, A., and Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448-3470. https://doi.org/10.1016/j.comnet.2007.02.001
[72] Paula, E. L., Ladeira, M., Carvalho, R. N., Marzagao, T. (2016). Deep learning anomaly detection as support fraud investigation in Brazilian exports and anti-money laundering. In 2016, 15th IEEE International conference on machine learning and applications (ICMLA) (pp. 954-960). https://ieeexplore.ieee.org/document/7838276
[73] Peng, H. K., and Mărculescu, R. (2015). Multi-scale compositionality: identifying the compositional structures of social dynamics using deep learning. PLOS ONE, 10(4), e0118309. https://doi.org/10.1371/journal.pone.0118309
[74] Pimentel, M. A., Clifton, D. A., Clifton, L., and Tarassenko, L. (2014). A review of novelty detection. Signal Processing, 99, 215-249. https://doi.org/10.1016/j.sigpro.2013.12.026
[75] Pourhabibi, T., Ong, K. L., Kam, B. H., and Boo, Y. L. (2020). Fraud detection: A systematic literature review of graph-based anomaly detection approaches. Decision Support Systems, 133, 113303. https://doi.org/10.1016/j.dss.2020.113303
[76] Pumsirirat, A., and Liu, Y. (2018). Credit card fraud detection using deep learning based on auto-encoder and restricted Boltzmann machine. International Journal of Advanced Computer Science and Applications, 9(1), 18-25.http://dx.doi.org/10.14569/IJACSA.2018.090103
[77] Rosseeuw, P. J., & Leroy, A. M. (1987). Robust Regression and Outlier Detection. John Willey & Sons. Inc., New York. ISBN 0471-85233-3. https://onlinelibrary.wiley.com/doi/pdf/10.1002/0471725382.fmatter
[78] S. 1558 – AIIA (2020). Artificial Intelligence Initiative Act. U.S. Congressional Senate Committee on Commerce, Science, and Transportation.
[79] Saunders, R., and Gero, J. S. (2000). The importance of being emergent. In Proceedings of Artificial Intelligence in Design. https://www.researchgate.net/profile/Rob-Saunders-3/publication/2574847_The_ Importance_Of_Being_Emergent/links/0deec537598aeb6fef000000/The-Importance-Of-Being-Emergent.pdf
[80] Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., and Stiller, B. (2010). An overview of IP flow-based intrusion detection. IEEE Communications Surveys and Tutorials, 12(3), 343-356. https://ieeexplore.ieee.org/ document/5455789
[81] Sun, B., Yu, F., Wu, K., Xiao, Y., and Leung, V. C. (2006). Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Transactions on Vehicular Technology, 55(4), 1385-1396. https://ieeexplore.ieee.org/abstract/document/1658433
[82] Sun, B., Osborne, L., Xiao, Y., and Guizani, S. (2007a). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56-63. https://ieeexplore.ieee.org/ document/4396943
[83] Sun, B., Xiao, Y., and Wang, R. (2007b). Detection of fraudulent usage in wireless networks. IEEE Transactions on Vehicular Technology, 56(6), 3912-3923. https://ieeexplore.ieee.org/document/4356991
[84] Sun, B., Wu, K., Xiao, Y., and Wang, R. (2007c). Integration of mobility and intrusion detection for wireless ad hoc networks. International Journal of Communication Systems, 20(6), 695-721. https://doi.org/10.1002/dac.853
[85] Tanaka, F. H., and Aranha, C. (2019). Data Augmentation Using GANs. https://doi.org/10.48550/arXiv.1904.09135
[86] United States Central Bureau (undated). U.S. International Trade in Goods and Services. Available at: https://www.census.gov/foreign-trade/statistics/historical/index.html (accessed March 01, 2023).
[87] United Nations Conference on Trade and Development (2019). World Investment Report, Geneva: WTO.
[88] United Nations Conference on Trade and Development (2022). Trade and Development Report, Geneva: WTO.
[89] Wang, C., Wang, Y., Ye, Z., Yan, L., Cai, W., & Pan, S. (2018). Credit card fraud detection based on whale algorithm optimized BP neural network. 13th International Conference on Computer Science & Education (ICCSE) (pp. 1-4). https://ieeexplore.ieee.org/abstract/document/8468855
[90] Wang, X., Du, Y., Lin, S., Cui, P., Shen, Y., & Yang, Y. (2020). adVAE: A self-adversarial variational autoencoder with Gaussian anomaly prior knowledge for anomaly detection. Knowledge-Based Systems, 190, 105187. https://doi.org/10.1016/j.knosys.2019.105187
[91] Wiese, B., and Omlin, C. (2009). Credit card transactions, fraud detection, and machine learning: Modelling time with LSTM recurrent neural networks (pp. 231-268). Springer Berlin Heidelberg. http://hdl.handle.net/11394/9590
[92] Wohl, I., and Kennedy, J. (2018). Neural network analysis of international trade. US International Trade Commission: Washington, DC, USA.
[93] World Trade Organisation (2011). Trade patterns and global value chains in East Asia: From trade in goods to trade in tasks. In collaboration with institute of developing economies (IDE) and Japan external trade organization (JETRO). WTO.
[94] World Trade Organisation (2015). International Trade Statistics 2015. Available at: www.wto.org/statistics (Accessed on September 5, 2022).
[95] Xiong, H., Pandey, G., Steinbach, M., and Kumar, V. (2006). Enhancing data analysis with noise removal. IEEE Transactions on Knowledge and Data Engineering, 18(3), 304-319. https://ieeexplore.ieee.org/document/1583581
[96] Yu, Y., Si, X., Hu, C., & Zhang, J. (2019). A review of recurrent neural networks: LSTM cells and network architectures. Neural Computation, 31(7), 1235-1270. https://doi.org/10.1162/neco_a_01199
[97] Zhang, W., Yang, Q., and Geng, Y. (2009). A survey of anomaly detection methods in networks. International Symposium on Computer Network and Multimedia Technology (pp. 1-3). https://ieeexplore.ieee.org/document/5374676
[98] Zimek, A., Schubert, E., & Kriegel, H. P. (2012). A survey on unsupervised outlier detection in high‐dimensional numerical data. Statistical Analysis and Data Mining: The ASA Data Science Journal, 5(5), 363-387. https://doi.org/10.1002/sam.11161