Targeted collapse regularized autoencoder for anomaly detection: black hole at the center

Autoencoders have been extensively used in the development of recent anomaly detection techniques. The premise of their application is based on the notion that after training the autoencoder on normal training data, anomalous inputs will exhibit a significant reconstruction error. Consequently, this...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Ghafourian, Amin, Huanyi Shui, Upadhyay, Devesh, Gupta, Rajesh, Filev, Dimitar, Iman Soltani Bozchalooi
Format Paper
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 27.03.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Autoencoders have been extensively used in the development of recent anomaly detection techniques. The premise of their application is based on the notion that after training the autoencoder on normal training data, anomalous inputs will exhibit a significant reconstruction error. Consequently, this enables a clear differentiation between normal and anomalous samples. In practice, however, it is observed that autoencoders can generalize beyond the normal class and achieve a small reconstruction error on some of the anomalous samples. To improve the performance, various techniques propose additional components and more sophisticated training procedures. In this work, we propose a remarkably straightforward alternative: instead of adding neural network components, involved computations, and cumbersome training, we complement the reconstruction loss with a computationally light term that regulates the norm of representations in the latent space. The simplicity of our approach minimizes the requirement for hyperparameter tuning and customization for new applications which, paired with its permissive data modality constraint, enhances the potential for successful adoption across a broad range of applications. We test the method on various visual and tabular benchmarks and demonstrate that the technique matches and frequently outperforms more complex alternatives. We further demonstrate that implementing this idea in the context of state-of-the-art methods can further improve their performance. We also provide a theoretical analysis and numerical simulations that help demonstrate the underlying process that unfolds during training and how it helps with anomaly detection. This mitigates the black-box nature of autoencoder-based anomaly detection algorithms and offers an avenue for further investigation of advantages, fail cases, and potential new directions.
AbstractList Autoencoders have been extensively used in the development of recent anomaly detection techniques. The premise of their application is based on the notion that after training the autoencoder on normal training data, anomalous inputs will exhibit a significant reconstruction error. Consequently, this enables a clear differentiation between normal and anomalous samples. In practice, however, it is observed that autoencoders can generalize beyond the normal class and achieve a small reconstruction error on some of the anomalous samples. To improve the performance, various techniques propose additional components and more sophisticated training procedures. In this work, we propose a remarkably straightforward alternative: instead of adding neural network components, involved computations, and cumbersome training, we complement the reconstruction loss with a computationally light term that regulates the norm of representations in the latent space. The simplicity of our approach minimizes the requirement for hyperparameter tuning and customization for new applications which, paired with its permissive data modality constraint, enhances the potential for successful adoption across a broad range of applications. We test the method on various visual and tabular benchmarks and demonstrate that the technique matches and frequently outperforms more complex alternatives. We further demonstrate that implementing this idea in the context of state-of-the-art methods can further improve their performance. We also provide a theoretical analysis and numerical simulations that help demonstrate the underlying process that unfolds during training and how it helps with anomaly detection. This mitigates the black-box nature of autoencoder-based anomaly detection algorithms and offers an avenue for further investigation of advantages, fail cases, and potential new directions.
Author Upadhyay, Devesh
Filev, Dimitar
Huanyi Shui
Ghafourian, Amin
Iman Soltani Bozchalooi
Gupta, Rajesh
Author_xml – sequence: 1
  givenname: Amin
  surname: Ghafourian
  fullname: Ghafourian, Amin
– sequence: 2
  fullname: Huanyi Shui
– sequence: 3
  givenname: Devesh
  surname: Upadhyay
  fullname: Upadhyay, Devesh
– sequence: 4
  givenname: Rajesh
  surname: Gupta
  fullname: Gupta, Rajesh
– sequence: 5
  givenname: Dimitar
  surname: Filev
  fullname: Filev, Dimitar
– sequence: 6
  fullname: Iman Soltani Bozchalooi
BookMark eNqNi00OgjAQRhujiajcYRLXJFjkR7dG4wHYuCJjGVCsHWzLQk8vCw_g6kvee99CTA0bmohAJskmKrZSzkXoXBfHscxymaZJIC4l2pY81aBYa-wdgaV20GjvnxHi4JmM4posNGwBDT9Rv6EeL8rf2ezhqlE94MaaAD34G4Ei48muxKxB7Sj87VKsT8fycI56y6-BnK86HqwZVSULWeyyPI_T5L_qC6-6RI8
ContentType Paper
Copyright 2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection (Proquest) (PQ_SDU_P3)
ProQuest Engineering Collection
Engineering Database
Access via ProQuest (Open Access)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle Publicly Available Content Database
Engineering Database
Technology Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest One Academic
Engineering Collection
DatabaseTitleList Publicly Available Content Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 2331-8422
Genre Working Paper/Pre-Print
GroupedDBID 8FE
8FG
ABJCF
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FRJ
HCIFZ
L6V
M7S
M~E
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
ID FETCH-proquest_journals_28289677053
IEDL.DBID 8FG
IngestDate Thu Oct 10 18:14:25 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-proquest_journals_28289677053
OpenAccessLink https://www.proquest.com/docview/2828967705?pq-origsite=%requestingapplication%
PQID 2828967705
PQPubID 2050157
ParticipantIDs proquest_journals_2828967705
PublicationCentury 2000
PublicationDate 20240327
PublicationDateYYYYMMDD 2024-03-27
PublicationDate_xml – month: 03
  year: 2024
  text: 20240327
  day: 27
PublicationDecade 2020
PublicationPlace Ithaca
PublicationPlace_xml – name: Ithaca
PublicationTitle arXiv.org
PublicationYear 2024
Publisher Cornell University Library, arXiv.org
Publisher_xml – name: Cornell University Library, arXiv.org
SSID ssj0002672553
Score 3.531589
SecondaryResourceType preprint
Snippet Autoencoders have been extensively used in the development of recent anomaly detection techniques. The premise of their application is based on the notion that...
SourceID proquest
SourceType Aggregation Database
SubjectTerms Algorithms
Anomalies
Neural networks
Reconstruction
Training
Title Targeted collapse regularized autoencoder for anomaly detection: black hole at the center
URI https://www.proquest.com/docview/2828967705
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1dS8MwFL3oiuCbn_gxR0Bfg22WNNUXQWkdwsaQCfNppGkCgrZd2j3og7_dJHT6IOyxKYR8ce-5J4ccgCttIbWkMsYRDzmmgiVYUK2wDAvKRSJz6tXu40k8eqFPczbvCLemk1WuY6IP1EUlHUd-7UuDmPOQ3dVL7Fyj3O1qZ6GxDUFEOHfFV5I9_nIsJOYWMQ__hVmfO7I9CKaiVmYftlR5ADtecimbQ3ideRG2KpDfi7pRyHhjePP2ZRvFqq3cI5OFMsgCSyTK6kO8f6JCtV49Vd6i3JFvyBncItEii-SQk1oqcwSXWTp7GOH1eBbdiWkWf_MbHkPPlv7qBJCgislEx858luZaCC2kjEIV3xBONGOn0N_U09nm3-ewS2yKdooqwvvQa81KXdgU2-YDv44DCO7TyfTZfo2_0x9ou4hy
link.rule.ids 783,787,12777,21400,33385,33756,43612,43817
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1NS8MwGH7RDdGbn_gxNaDXYNfmo3rxIM6q2_BQYZ5KmiYgzLam3UF_vUno9CDsmkDIF-_z5M2TPACX2lJqSSTDQx5wTASNsSBaYRkUhItY5sSr3SdTlrySpxmddQm3ppNVLmOiD9RFJV2O_MofDRjnAb2tP7FzjXK3q52Fxjr0SWSx2r0UHz385lhCxi1jjv6FWY8do23ov4hamR1YU-UubHjJpWz24C31ImxVIL8WdaOQ8cbw5v3bFopFW7lPJgtlkCWWSJTVh5h_oUK1Xj1V3qDcJd-QM7hFokWWySEntVRmHy5G9-ldgpf9ybod02R_44sOoGeP_uoQkCCKylgzZz5Lci2EFlIOA8WuQx5qSo9gsKql49XV57CZpJNxNn6cPp_AVmjh2qmrQj6AXmsW6tTCbZuf-Tn9AWJ3iIk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Targeted+collapse+regularized+autoencoder+for+anomaly+detection%3A+black+hole+at+the+center&rft.jtitle=arXiv.org&rft.au=Ghafourian%2C+Amin&rft.au=Huanyi+Shui&rft.au=Upadhyay%2C+Devesh&rft.au=Gupta%2C+Rajesh&rft.date=2024-03-27&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422