AD — Anomaly Detection

RecSys for MAD: backtesting results

RecSys AD

As a final review of our experiment, we performed a backtesting analysis — sort of, since we are in a non-supervised learning setup. Here we present the main outcomes with an attempt to statistically inspect the resulting top anomalies.

Universal Anomaly Score

RecSys AD

In this post we show some examples of anomaly rank results, highlighting the need for transformation of such values that makes the score interpretable in a universal way, overcoming the specific scale and shape of each RecSys outcome.

Evaluation of a RecSys as Anomaly Detector

RecSys AD

Using a RecSys as an anomaly detector undermines the possibility of a supervised-learning approach, so traditional mean average precision metrics are not enough. But even before that, we had to face a fitting convergence evaluation problem.

Anomaly detection with HTM: an interesting case study

ADTS AD

In this last blog post of the ADTS series we will show an interesting example of anomaly detected on the MTA market data series.

Anomaly detection with HTM: a real world example

ADTS AD

In this blog post of the ADTS series we will show an application of an HTM network on a real-time series.

Anomaly detection with HTM: Anomaly Score and Anomaly Likelihood

ADTS AD

In this blog post we will show how to use an HTM network to solve an anomaly detection problem.

Hierarchical Temporal Memory (HTM)

ADTS AD

In this blog post we will present a short overview of the Hierarchical Temporal Memory theory.

Anomaly Detection in Time Series

ADTS AD

In this blog post series, we will present a real-time anomaly detection tool based on the Hierarchical Temporal Memory (HTM) network. In this first post we will briefly describe the problem of anomaly detection in time series.

Market Abuse, Recommendation Systems and Anomaly Detection

RecSys AD MA

As the first thread of our blog, we start with a rather ambitious project: applying Recommendation Systems techniques to create an anomaly detection tool. The approach is quite general, but here we will tell you specifically about our first experiment in the Market Abuse field. In this first post of the series we will briefly describe the terms of the matter.