{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:18:07Z","timestamp":1768835887017,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T00:00:00Z","timestamp":1727049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T00:00:00Z","timestamp":1727049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007069","name":"Universit\u00e0 della Calabria","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007069","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Explainable AI refers to techniques by which the reasons underlying decisions taken by intelligent artifacts are single out and provided to users. Outlier detection is the task of individuating anomalous objects within a given data population they belong to. In this paper we propose a new technique to explain why a given data object has been singled out as anomalous. The explanation our technique returns also includes counterfactuals, each of which denotes a possible way to \u201crepair\u201d the outlier to make it an inlier. Thus, given in input a reference data population and an object deemed to be anomalous, the aim is to provide possible explanations for the anomaly of the input object, where an explanation consists of a subset of the features, called <jats:italic>choice<\/jats:italic>, and an associated set of changes to be applied, called <jats:italic>mask<\/jats:italic>, in order to make the object \u201cbehave normally\u201d. The paper presents a deep learning architecture exploiting a <jats:italic>features choice module<\/jats:italic> and <jats:italic>mask generation module<\/jats:italic> in order to learn both components of explanations. The learning procedure is guided by an <jats:italic>ad-hoc loss function<\/jats:italic> that simultaneously maximizes (minimizes, resp.) the isolation of the input outlier before applying the mask (resp., after the application of the mask returned by the mask generation module) within the subspace singled out by the features choice module, all that while also minimizing the number of features involved in the selected choice. We consider also the case in which a common explanation is required for a group of outliers provided together in input. We present experiments on both artificial and real data sets and a comparison with competitors validating the effectiveness of the proposed approach.<\/jats:p>","DOI":"10.1007\/s10994-024-06618-8","type":"journal-article","created":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T17:02:04Z","timestamp":1727110924000},"page":"7565-7589","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Explaining outliers and anomalous groups via subspace density contrastive loss"],"prefix":"10.1007","volume":"113","author":[{"given":"Fabrizio","family":"Angiulli","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Fassetti","sequence":"additional","affiliation":[]},{"given":"Simona","family":"Nistic\u00f2","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Palopoli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,23]]},"reference":[{"key":"6618_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M. A., & Zainal, A. (2016). Fraud detection system: A survey. Journal of Network and Computer Applications, 68, 90\u2013113.","journal-title":"Journal of Network and Computer Applications"},{"key":"6618_CR2","first-page":"1","volume":"112","author":"F Angiulli","year":"2022","unstructured":"Angiulli, F., Fassetti, F., & Ferragina, L. (2022). Latent o ut: An unsupervised deep anomaly detection approach exploiting latent space distribution. Machine Learning, 112, 1\u201327.","journal-title":"Machine Learning"},{"issue":"1","key":"6618_CR3","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s10618-016-0458-x","volume":"31","author":"F Angiulli","year":"2017","unstructured":"Angiulli, F., Fassetti, F., Manco, G., & Palopoli, L. (2017). Outlying property detection with numerical attributes. Data Mining and Knowledge Discovery, 31(1), 134\u2013163.","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"6618_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1508857.1508864","volume":"34","author":"F Angiulli","year":"2009","unstructured":"Angiulli, F., Fassetti, F., & Palopoli, L. (2009). Detecting outlying properties of exceptional objects. Acm Transactions on Database Systems (TODS), 34(1), 1\u201362.","journal-title":"Acm Transactions on Database Systems (TODS)"},{"key":"6618_CR5","doi-asserted-by":"crossref","unstructured":"Angiulli, F., Fassetti, F., Nistic\u00f3, S., & Palopoli, L. (2023). Counterfactuals explanations for outliers via subspaces density contrastive loss. In International Conference on Discovery Science, pp 159\u2013173. Springer","DOI":"10.1007\/978-3-031-45275-8_11"},{"key":"6618_CR6","doi-asserted-by":"crossref","unstructured":"Angiulli, F., Fassetti, F., Nistic\u00f2, S., & Palopoli, L. (2022). Outlier explanation through masking models. In European Conference on Advances in Databases and Information Systems, pp 392\u2013406. Springer","DOI":"10.1007\/978-3-031-15740-0_28"},{"issue":"4","key":"6618_CR7","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1111\/coin.12156","volume":"34","author":"TR Bandaragoda","year":"2018","unstructured":"Bandaragoda, T. R., Ting, K. M., Albrecht, D., Liu, F. T., Zhu, Y., & Wells, J. R. (2018). Isolation-based anomaly detection using nearest-neighbor ensembles. Computational Intelligence, 34(4), 968\u2013998.","journal-title":"Computational Intelligence"},{"issue":"1","key":"6618_CR8","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys Tutorials, 16(1), 303\u2013336. https:\/\/doi.org\/10.1109\/SURV.2013.052213.00046","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"1","key":"6618_CR9","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1146\/annurev-psych-122414-033249","volume":"67","author":"RM Byrne","year":"2016","unstructured":"Byrne, R. M. (2016). Counterfactual thought. Annual Review of Psychology, 67(1), 135\u2013157.","journal-title":"Annual Review of Psychology"},{"issue":"5","key":"6618_CR10","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/TKDE.2010.235","volume":"24","author":"V Chandola","year":"2012","unstructured":"Chandola, V., Banerjee, A., & Kumar, V. (2012). Anomaly detection for discrete sequences: A survey. IEEE Transactions on Knowledge and Data Engineering, 24(5), 823\u2013839. https:\/\/doi.org\/10.1109\/TKDE.2010.235","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"6618_CR11","doi-asserted-by":"crossref","unstructured":"Dang, X.H., Assent, I., Ng, R.T., Zimek, A., & Schubert, E. (2014). Discriminative features for identifying and interpreting outliers. In 2014 IEEE 30th International Conference on Data Engineering, pp 88\u201399. IEEE","DOI":"10.1109\/ICDE.2014.6816642"},{"issue":"5","key":"6618_CR12","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1007\/s10618-014-0398-2","volume":"29","author":"L Duan","year":"2015","unstructured":"Duan, L., Tang, G., Pei, J., Bailey, J., Campbell, A., & Tang, C. (2015). Mining outlying aspects on numeric data. Data Mining and Knowledge Discovery, 29(5), 1116\u20131151.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6618_CR13","doi-asserted-by":"crossref","unstructured":"Duraj, A., & Chomatek, L. (2017). Supporting breast cancer diagnosis with multi-objective genetic algorithm for outlier detection. In International Conference on Diagnostics of Processes and Systems, pp 304\u2013315. Springer","DOI":"10.1007\/978-3-319-64474-5_25"},{"key":"6618_CR14","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., & Xu, X., et al. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd, vol. 96, pp 226\u2013231"},{"key":"6618_CR15","doi-asserted-by":"publisher","unstructured":"FRS., & Pearson, K. (1901). Liii. on lines and planes of closest fit to systems of points in space. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 2(11), 559\u2013572. https:\/\/doi.org\/10.1080\/14786440109462720","DOI":"10.1080\/14786440109462720"},{"key":"6618_CR16","first-page":"1","volume":"22","author":"R Guidotti","year":"2022","unstructured":"Guidotti, R. (2022). Counterfactual explanations and how to find them: Literature review and benchmarking. Data Mining and Knowledge Discovery, 22, 1\u201355.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6618_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, N., Eswaran, D., Shah, N., Akoglu, L., & Faloutsos, C. (2019). Beyond outlier detection: Lookout for pictorial explanation. In Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2018, Dublin, Ireland, September 10\u201314, 2018, Proceedings, Part I 18, pp 122\u2013138. Springer","DOI":"10.1007\/978-3-030-10925-7_8"},{"issue":"1","key":"6618_CR18","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.jbi.2012.08.004","volume":"46","author":"M Hauskrecht","year":"2013","unstructured":"Hauskrecht, M., Batal, I., Valko, M., Visweswaran, S., Cooper, G. F., & Clermont, G. (2013). Outlier detection for patient monitoring and alerting. Journal of Biomedical Informatics, 46(1), 47\u201355.","journal-title":"Journal of Biomedical Informatics"},{"key":"6618_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116429","volume":"193","author":"W Hilal","year":"2021","unstructured":"Hilal, W., Gadsden, S. A., & Yawney, J. (2021). A review of anomaly detection techniques and applications in financial fraud. Expert Systems with Applications, 193, 116429.","journal-title":"Expert Systems with Applications"},{"issue":"9","key":"6618_CR20","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.envsoft.2009.08.010","volume":"25","author":"DJ Hill","year":"2010","unstructured":"Hill, D. J., & Minsker, B. S. (2010). Anomaly detection in streaming environmental sensor data: A data-driven modeling approach. Environmental Modelling & Software, 25(9), 1014\u20131022.","journal-title":"Environmental Modelling & Software"},{"key":"6618_CR21","doi-asserted-by":"crossref","unstructured":"Keller, F., Muller, E., & Bohm, K. (2012). Hics: High contrast subspaces for density-based outlier ranking. In 2012 IEEE 28th International Conference on Data Engineering, pp 1037\u20131048. IEEE","DOI":"10.1109\/ICDE.2012.88"},{"key":"6618_CR22","doi-asserted-by":"crossref","unstructured":"Kriegel, H.-P., Kr\u00f6ger, P., Schubert, E., & Zimek, A. (2009). Outlier detection in axis-parallel subspaces of high dimensional data. In Pacific-asia Conference on Knowledge Discovery and Data Mining, pp 831\u2013838. Springer","DOI":"10.1007\/978-3-642-01307-2_86"},{"key":"6618_CR23","doi-asserted-by":"crossref","unstructured":"Kruegel, C., & Vigna, G. (2003). Anomaly detection of web-based attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 251\u2013261","DOI":"10.1145\/948109.948144"},{"key":"6618_CR24","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1016\/j.scitotenv.2019.02.085","volume":"664","author":"C Leigh","year":"2019","unstructured":"Leigh, C., Alsibai, O., Hyndman, R. J., Kandanaarachchi, S., King, O. C., McGree, J. M., Neelamraju, C., Strauss, J., Talagala, P. D., Turner, R. D., et al. (2019). A framework for automated anomaly detection in high frequency water-quality data from in situ sensors. Science of the Total Environment, 664, 885\u2013898.","journal-title":"Science of the Total Environment"},{"key":"6618_CR25","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., & Zhou, Z.-H. (2008). Isolation forest. In 2008 Eighth IEEE International Conference on Data Mining, pp 413\u2013422. IEEE","DOI":"10.1109\/ICDM.2008.17"},{"key":"6618_CR26","doi-asserted-by":"crossref","unstructured":"Liu, N., Shin, D., & Hu, X. (2018). Contextual outlier interpretation. In Proceedings of the 27th International Joint Conference on Artificial Intelligence, pp 2461\u20132467","DOI":"10.24963\/ijcai.2018\/341"},{"key":"6618_CR27","doi-asserted-by":"publisher","first-page":"1444","DOI":"10.1007\/s10618-018-0585-7","volume":"32","author":"M Macha","year":"2018","unstructured":"Macha, M., & Akoglu, L. (2018). Explaining anomalies in groups with characterizing subspace rules. Data Mining and Knowledge Discovery, 32, 1444\u20131480.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6618_CR28","doi-asserted-by":"crossref","unstructured":"Micenkov\u00e1, B., Ng, R.T., Dang, X.-H., & Assent, I. (2013). Explaining outliers by subspace separability. In 2013 IEEE 13th International Conference on Data Mining, pp 518\u2013527. IEEE","DOI":"10.1109\/ICDM.2013.132"},{"key":"6618_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108227","volume":"121","author":"T Mokoena","year":"2022","unstructured":"Mokoena, T., Celik, T., & Marivate, V. (2022). Why is this an anomaly? Explaining anomalies using sequential explanations. Pattern Recognition, 121, 108227.","journal-title":"Pattern Recognition"},{"key":"6618_CR30","doi-asserted-by":"crossref","unstructured":"Narayanan, V., & Bobba, R.B. (2018). Learning based anomaly detection for industrial arm applications. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, pp 13\u201323","DOI":"10.1145\/3264888.3264894"},{"key":"6618_CR31","doi-asserted-by":"publisher","DOI":"10.1145\/3439950","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., & Hengel, A. V. D. (2021). Deep learning for anomaly detection: A review. ACM Computing Surveys. https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Computing Surveys"},{"issue":"5","key":"6618_CR32","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1007\/s00778-021-00721-1","volume":"31","author":"E Panjei","year":"2022","unstructured":"Panjei, E., Gruenwald, L., Leal, E., Nguyen, C., & Silvia, S. (2022). A survey on outlier explanations. The VLDB Journal, 31(5), 977\u20131008.","journal-title":"The VLDB Journal"},{"key":"6618_CR33","unstructured":"Rayana, S. (2016). ODDS library. http:\/\/odds.cs.stonybrook.edu"},{"key":"6618_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2020.104869","volume":"134","author":"S Russo","year":"2020","unstructured":"Russo, S., L\u00fcrig, M., Hao, W., Matthews, B., & Villez, K. (2020). Active learning for anomaly detection in environmental data. Environmental Modelling & Software, 134, 104869.","journal-title":"Environmental Modelling & Software"},{"key":"6618_CR35","doi-asserted-by":"crossref","unstructured":"Samariya, D., Aryal, S., Ting, K.M., & Ma, J. (2020). A new effective and efficient measure for outlying aspect mining. In International Conference on Web Information Systems Engineering, pp 463\u2013474. Springer","DOI":"10.1007\/978-3-030-62008-0_32"},{"key":"6618_CR36","unstructured":"Samariya, D., Ma, J., & Aryal, S. (2020). A comprehensive survey on outlying aspect mining methods. arXiv preprint arXiv:2005.02637"},{"key":"6618_CR37","doi-asserted-by":"publisher","DOI":"10.1201\/9781315140919","volume-title":"Density Estimation for Statistics and Data Analysis","author":"BW Silverman","year":"2018","unstructured":"Silverman, B. W. (2018). Density Estimation for Statistics and Data Analysis. England: Routledge."},{"issue":"2","key":"6618_CR38","first-page":"211","volume":"6","author":"I Steinwart","year":"2005","unstructured":"Steinwart, I., Hush, D., & Scovel, C. (2005). A classification framework for anomaly detection. Journal of Machine Learning Research, 6(2), 211.","journal-title":"Journal of Machine Learning Research"},{"issue":"6","key":"6618_CR39","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1007\/s10618-016-0453-2","volume":"30","author":"NX Vinh","year":"2016","unstructured":"Vinh, N. X., Chan, J., Romano, S., Bailey, J., Leckie, C., Ramamohanarao, K., & Pei, J. (2016). Discovering outlying aspects in large datasets. Data Mining and Knowledge Discovery, 30(6), 1520\u20131555.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6618_CR40","doi-asserted-by":"crossref","unstructured":"Vinh, N.X., Chan, J., Bailey, J., Leckie, C., Ramamohanarao, K., & Pei, J. (2015). Scalable outlying-inlying aspects discovery via feature ranking. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp 422\u2013434. Springer","DOI":"10.1007\/978-3-319-18032-8_33"},{"key":"6618_CR41","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.patrec.2018.12.020","volume":"122","author":"JR Wells","year":"2019","unstructured":"Wells, J. R., & Ting, K. M. (2019). A new simple and efficient density estimator that enables fast systematic search. Pattern Recognition Letters, 122, 92\u201398.","journal-title":"Pattern Recognition Letters"},{"key":"6618_CR42","doi-asserted-by":"crossref","unstructured":"Xu, H., Chen, W., Zhao, N., Li, Z., Bu, J., Li, Z., Liu, Y., Zhao, Y., Pei, D., & Feng, Y., et al. (2018). Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications. In Proceedings of the 2018 World Wide Web Conference, pp 187\u2013196","DOI":"10.1145\/3178876.3185996"},{"key":"6618_CR43","doi-asserted-by":"publisher","unstructured":"Xu, H., Wang, Y., Jian, S., Huang, Z., Wang, Y., Liu, N., & Li, F. (2021). Beyond outlier detection: Outlier interpretation by attention-guided triplet deviation network. In Proceedings of the Web Conference 2021. WWW \u201921, pp 1328\u20131339. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3442381.3449868 .","DOI":"10.1145\/3442381.3449868"},{"key":"6618_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, J., Lou, M., Ling, T.W., & Wang, H. (2004). Hos-miner: A system for detecting outlying subspaces of high-dimensional data. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB\u201904), pp 1265\u20131268. Morgan Kaufmann Publishers Inc.","DOI":"10.1016\/B978-012088469-8\/50123-6"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-024-06618-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-024-06618-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-024-06618-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T21:12:31Z","timestamp":1729199551000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-024-06618-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,23]]},"references-count":44,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["6618"],"URL":"https:\/\/doi.org\/10.1007\/s10994-024-06618-8","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,23]]},"assertion":[{"value":"28 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflicts to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not Applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The current version of the code is available at","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}