This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: Y_gKox1BIfgpPgAPaoJpEpD0PXcKRwKXb3WVBaEi6mY
Cover

Unveiling Path Signatures: A Key to Geometric Insights in Data

Written by @computational | Published on 2024/11/20

TL;DR
Path signatures, defined as iterated integrals, provide a rich representation of paths by capturing their geometric and topological properties. This transformative tool enhances data analysis, offering deep insights into sequential structures.

Authors:

(1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France;

(2) Marta Campi, CERIAH, Institut de l’Audition, Institut Pasteur, France;

(3) Gareth W. Peters, Department of Statistics & Applied Probability, University of California Santa Barbara, USA.

Abstract and 1. Introduction

2. Background & Preliminaries

2.1. Functional Isolation Forest

2.2. The Signature Method

3. Signature Isolation Forest Method

4. Numerical Experiments

4.1. Parameters Sensitivity Analysis

4.2. Advantages of (K-)SIF over FIF

4.3. Real-data Anomaly Detection Benchmark

5. Discussion & Conclusion, Impact Statements, and References

Appendix

A. Additional Information About the Signature

B. K-SIF and SIF Algorithms

C. Additional Numerical Experiments

2.2. The Signature Method

The signature of a path is a sequence of iterated integrals that captures important information about the path’s geometric and topological features (Lyons et al., 2007; Fermanian, 2021).

Furthermore, the signature of X is defined as the infinite collection of coordinate signature

One may refer to Lee and Oberhauser (2023) for an account of the untruncated kernel signature. See also Section A in the Appendix for further details about the signature and its properties.

This paper is available on arxiv under CC BY 4.0 DEED license.

[story continues]


Written by
@computational
Computational: We take random inputs, follow complex steps, and hope the output makes sense. And then blog about it.

Topics and
tags
non-linear-data-analysis|signature-isolation-forest|anomaly-detection|functional-data-analysis|advanced-ad-algorithms|rough-path-theory|functional-isolation-forest|k-sif-parameters
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: Y_gKox1BIfgpPgAPaoJpEpD0PXcKRwKXb3WVBaEi6mY