Iterative anomaly detection

Yulei Wang, Bai Xue, Lin Wang, Hsiao Chi Li, Li Chien Lee, Chunyan Yu, Meiping Song, Sen Li, Chein I. Chang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Anomaly detection (AD) is designed to find targets that are spectrally distinct from their surrounding neighborhood. Unfortunately, commonly used anomaly detectors generally do not take into account its surrounding spatial information. This paper derives an iterative version of anomaly detection, iterative anomaly detection (IAD) to address this issue. Its idea is to use a Gaussian filter to capture spatial information of the anomaly detection map and then feeds back the Gaussian filtered AD map to create a new data cube. The whole process is repeated over again in an iterative manner. When IAD is terminated anomaly representatives are identified and can be used as desired target signatures to implement constrain energy minimization (CEM) so as to classify all detected anomalies. Accordingly, IAD can be considered as anomaly classification.

Original languageEnglish
Title of host publication2017 IEEE International Geoscience and Remote Sensing Symposium
Subtitle of host publicationInternational Cooperation for Global Awareness, IGARSS 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages586-589
Number of pages4
ISBN (Electronic)9781509049516
DOIs
Publication statusPublished - 2017 Dec 1
Event37th Annual IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2017 - Fort Worth, United States
Duration: 2017 Jul 232017 Jul 28

Publication series

NameInternational Geoscience and Remote Sensing Symposium (IGARSS)
Volume2017-July

Other

Other37th Annual IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2017
Country/TerritoryUnited States
CityFort Worth
Period17-07-2317-07-28

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • General Earth and Planetary Sciences

Fingerprint

Dive into the research topics of 'Iterative anomaly detection'. Together they form a unique fingerprint.

Cite this