We are working on anomaly detection, where we want to quantify the influence of a subset of attributes (or features) for making a data set anomalous.
Let us consider an illustrative example as follows.
We have an anomalous data set D having N attributes and M instances. Now, we execute some deterministic anomaly detection algorithm to retrieve the anomalous instances from D. Let us consider that this algorithm has retrieved Q (Q