skip to main content
research-article

Machine Learning for Identifying Group Trajectory Outliers

Authors Info & Claims
Published:06 January 2021Publication History
Skip Abstract Section

Abstract

Prior works on the trajectory outlier detection problem solely consider individual outliers. However, in real-world scenarios, trajectory outliers can often appear in groups, e.g., a group of bikes that deviates to the usual trajectory due to the maintenance of streets in the context of intelligent transportation. The current paper considers the Group Trajectory Outlier (GTO) problem and proposes three algorithms. The first and the second algorithms are extensions of the well-known DBSCAN and kNN algorithms, while the third one models the GTO problem as a feature selection problem. Furthermore, two different enhancements for the proposed algorithms are proposed. The first one is based on ensemble learning and computational intelligence, which allows for merging algorithms’ outputs to possibly improve the final result. The second is a general high-performance computing framework that deals with big trajectory databases, which we used for a GPU-based implementation. Experimental results on different real trajectory databases show the scalability of the proposed approaches.

References

  1. Fabrizio Angiulli, Stefano Basta, Stefano Lodi, and Claudio Sartori. 2016. GPU strategies for distance-based outlier detection. IEEE Transactions on Parallel and Distributed Systems 27, 11 (2016), 3256--3268.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and Jörg Sander. 2000. LOF: Identifying density-based local outliers. In ACM SIGMOD Record, Vol. 29. 93--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Marcus A. Brubaker, Andreas Geiger, and Raquel Urtasun. 2015. Map-based probabilistic visual self-localization. IEEE Transactions on Pattern Analysis and Machine Intelligence 38, 4 (2015), 652--665.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. José Camacho, Roberto Therón, José M García-Giménez, Gabriel Maciá-Fernández, and Pedro García-Teodoro. 2019. Group-wise principal component analysis for exploratory intrusion detection. IEEE Access 7 (2019), 113081--113093.Google ScholarGoogle ScholarCross RefCross Ref
  5. Gilles Celeux, Didier Chauveau, and Jean Diebolt. 1996. Stochastic versions of the EM algorithm: An experimental study in the mixture case. Journal of Statistical Computation and Simulation 55, 4 (1996), 287--314.Google ScholarGoogle ScholarCross RefCross Ref
  6. Raghavendra Chalapathy, Edward Toth, and Sanjay Chawla. 2018. Group anomaly detection using deep generative models. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 173--189.Google ScholarGoogle Scholar
  7. Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41, 3 (2009), 15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kaustav Das and Jeff Schneider. 2007. Detecting anomalous records in categorical datasets. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 220--229.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kaustav Das, Jeff Schneider, and Daniel B. Neill. 2008. Anomaly pattern detection in categorical datasets. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 169--176.Google ScholarGoogle Scholar
  10. Kalyanmoy Deb, Amrit Pratap, Sameer Agarwal, and TAMT Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6, 2 (2002), 182--197.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. David Dernoncourt, Blaise Hanczar, and Jean-Daniel Zucker. 2014. Analysis of feature selection stability on high dimension and small sample data. Computational Statistics 8 Data Analysis 71 (2014), 681--693.Google ScholarGoogle Scholar
  12. Youcef Djenouri, Asma Belhadi, Jerry Chun-Wei Lin, Djamel Djenouri, and Alberto Cano. 2019. A survey on urban traffic anomalies detection algorithms. IEEE Access 7 (2019), 12192--12205.Google ScholarGoogle ScholarCross RefCross Ref
  13. John D. Eblen, Charles A. Phillips, Gary L. Rogers, and Michael A. Langston. 2012. The maximum clique enumeration problem: Algorithms, applications, and implementations. In BMC Bioinformatics, Vol. 13. BioMed Central, S5.Google ScholarGoogle Scholar
  14. Andries P. Engelbrecht. 2007. Computational Intelligence: An Introduction. John Wiley 8 Sons.Google ScholarGoogle ScholarCross RefCross Ref
  15. Martin Ester, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, et al. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of KDD. 226--231.Google ScholarGoogle Scholar
  16. Jinan Fan, Qianru Zhang, Jialei Zhu, Meng Zhang, Zhou Yang, and Hanxiang Cao. 2020. Robust deep auto-encoding Gaussian process regression for unsupervised anomaly detection. Neurocomputing 376 (2020), 180--190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Philippe Fournier-Viger, Antonio Gomariz, Ted Gueniche, Azadeh Soltani, Cheng-Wei Wu, and Vincent S. Tseng. 2014. SPMF: A Java open-source pattern mining library. The Journal of Machine Learning Research 15, 1 (2014), 3389--3393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yanjie Fu, Guannan Liu, Yong Ge, Pengyang Wang, Hengshu Zhu, Chunxiao Li, and Hui Xiong. 2018. Representing urban forms: A collective learning model with heterogeneous human mobility data. IEEE Transactions on Knowledge and Data Engineering 31, 3 (2018), 535--548.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, Jannite Yu, and Kuo Chu Lee. 2010. Top-eye: Top-k evolving trajectory outlier detection. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management. 1733--1736.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Stuart Geman and Donald Geman. 1987. Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images. In Readings in Computer Vision. Elsevier, 564--584.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Chong Yang Goh, Justin Dauwels, Nikola Mitrovic, Muhammad Tayyab Asif, Ali Oran, and Patrick Jaillet. 2012. Online map-matching based on hidden markov model for real-time traffic sensing applications. In 2012 15th International IEEE Conference on Intelligent Transportation Systems. IEEE, 776--781.Google ScholarGoogle ScholarCross RefCross Ref
  22. Baofeng Guo and Mark S. Nixon. 2008. Gait feature subset selection by mutual information. IEEE Transactions on Systems, MAN, and Cybernetics-part a: Systems and Humans 39, 1 (2008), 36--46.Google ScholarGoogle Scholar
  23. Tom Harris. 1993. A Kohonen SOM based, machine health monitoring system which enables diagnosis of faults not seen in the training set. In Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan), Vol. 1. IEEE, 947--950.Google ScholarGoogle ScholarCross RefCross Ref
  24. Xiaofei He, Deng Cai, and Partha Niyogi. 2006. Laplacian score for feature selection. In Advances in Neural Information Processing Systems. 507--514.Google ScholarGoogle Scholar
  25. Victoria Hodge and Jim Austin. 2004. A survey of outlier detection methodologies. Artificial Intelligence Review 22, 2 (2004), 85--126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Yi Huang, Dong Xu, and Feiping Nie. 2012. Semi-supervised dimension reduction using trace ratio criterion. IEEE Transactions on Neural Networks and Learning Systems 23, 3 (2012), 519--526.Google ScholarGoogle ScholarCross RefCross Ref
  27. Mohamed Amine Kafi, Yacine Challal, Djamel Djenouri, Abdelmadjid Bouabdallah, Lyes Khelladi, and Nadjib Badache. 2012. A study of wireless sensor network architectures and projects for traffic light monitoring. In Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies (ANT 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012 (Procedia Computer Science), Elhadi M. Shakshuki and Muhammad Younas (Eds.), Vol. 10. Elsevier, 543--552.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ramakrishnan Kannan, Hyenkyun Woo, Charu C. Aggarwal, and Haesun Park. 2017. Outlier detection for text data. In Proceedings of the 2017 SIAM International Conference on Data Mining. SIAM, 489--497.Google ScholarGoogle ScholarCross RefCross Ref
  29. Elmouatezbillah Karbab, Djamel Djenouri, Sahar Boulkaboul, and Antoine B. Bagula. 2015. Car park management with networked wireless sensors and active RFID. In IEEE International Conference on Electro/Information Technology, EIT 2015, Dekalb, IL, USA, May 21-23, 2015. IEEE, 373--378. DOI:https://doi.org/10.1109/EIT.2015.7293372Google ScholarGoogle ScholarCross RefCross Ref
  30. Kenji Kira and Larry A. Rendell. 1992. A practical approach to feature selection. In Machine Learning Proceedings 1992. Elsevier, 249--256.Google ScholarGoogle Scholar
  31. Xiangjie Kong, Ximeng Song, Feng Xia, Haochen Guo, Jinzhong Wang, and Amr Tolba. 2017. LoTAD: Long-term traffic anomaly detection based on crowdsourced bus trajectory data. World Wide Web (2017), 1--23.Google ScholarGoogle Scholar
  32. Christopher W. Landsea and James L. Franklin. 2013. Atlantic hurricane database uncertainty and presentation of a new database format. Monthly Weather Review 141, 10 (2013), 3576--3592.Google ScholarGoogle ScholarCross RefCross Ref
  33. Jae-Gil Lee, Jiawei Han, and Xiaolei Li. 2008. Trajectory outlier detection: A partition-and-detect framework. In Proc. of ICDE. 140--149.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Jae-Gil Lee, Jiawei Han, and Kyu-Young Whang. 2007. Trajectory clustering: A partition-and-group framework. In Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data. 593--604.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Huanhuan Li, Jingxian Liu, Kefeng Wu, Zaili Yang, Ryan Wen Liu, and Naixue Xiong. 2018. Spatio-temporal vessel trajectory clustering based on data mapping and density. IEEE Access (2018).Google ScholarGoogle Scholar
  36. Jundong Li, Kewei Cheng, Suhang Wang, Fred Morstatter, Robert P Trevino, Jiliang Tang, and Huan Liu. 2018. Feature selection: A data perspective. ACM Computing Surveys (CSUR) 50, 6 (2018), 94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Junli Li, Jifu Zhang, Ning Pang, and Xiao Qin. 2018. Weighted outlier detection of high-dimensional categorical data using feature grouping. IEEE Transactions on Systems, Man, and Cybernetics: Systems99 (2018), 1--14.Google ScholarGoogle Scholar
  38. Sheng Li, Ming Shao, and Yun Fu. 2018. Multi-view low-rank analysis with applications to outlier detection. ACM Transactions on Knowledge Discovery from Data (TKDD) 12, 3 (2018), 32.Google ScholarGoogle Scholar
  39. Wenjia Li, Houbing Song, and Feng Zeng. 2018. Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet of Things Journal 5, 2 (2018), 716--723.Google ScholarGoogle ScholarCross RefCross Ref
  40. Yang Li, Qixing Huang, Michael Kerber, Lin Zhang, and Leonidas Guibas. 2013. Large-scale joint map matching of GPS traces. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 214--223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Chuanren Liu, Hui Xiong, Yong Ge, Wei Geng, and Matt Perkins. 2012. A stochastic model for context-aware anomaly detection in indoor location traces. In 2012 IEEE 12th International Conference on Data Mining. IEEE, 449--458.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Yanchi Liu, Chuanren Liu, Nicholas Jing Yuan, Lian Duan, Yanjie Fu, Hui Xiong, Songhua Xu, and Junjie Wu. 2017. Intelligent bus routing with heterogeneous human mobility patterns. Knowledge and Information Systems 50, 2 (2017), 383--415.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Dennis Luxen and Christian Vetter. 2011. Real-time routing with OpenStreetMap data. In Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. 513--516.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Jiali Mao, Pengda Sun, Cheqing Jin, and Aoying Zhou. 2018. Outlier detection over distributed trajectory streams. In Proceedings of the 2018 SIAM International Conference on Data Mining. SIAM, 64--72.Google ScholarGoogle ScholarCross RefCross Ref
  45. Jiali Mao, Tao Wang, Cheqing Jin, and Aoying Zhou. 2017. Feature grouping-based outlier detection upon streaming trajectories. IEEE Transactions on Knowledge and Data Engineering 29, 12 (2017), 2696--2709.Google ScholarGoogle ScholarCross RefCross Ref
  46. Takumi Matsumoto, Yuya Sasaki, and Makoto Onizuka. 2019. Data slice search for local outlier view detection: A case study in fashion EC. In EDBT/ICDT Workshops.Google ScholarGoogle Scholar
  47. Natwar Modani and Kuntal Dey. 2008. Large maximal cliques enumeration in sparse graphs. In Proceedings of the 17th ACM Conference on Information and Knowledge Management. ACM, 1377--1378.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Andrew Moore and Weng-Keen Wong. 2003. Optimal reinsertion: A new search operator for accelerated and more accurate Bayesian network structure learning. In ICML, Vol. 3. 552--559.Google ScholarGoogle Scholar
  49. Feiping Nie, Shiming Xiang, Yangqing Jia, Changshui Zhang, and Shuicheng Yan. 2008. Trace ratio criterion for feature selection. In AAAI, Vol. 2. 671--676.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Hanchuan Peng, Fuhui Long, and Chris Ding. 2005. Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis 8 Machine Intelligence8 (2005), 1226--1238.Google ScholarGoogle Scholar
  51. Anatolii Prokhorchuk, Justin Dauwels, and Patrick Jaillet. 2019. Estimating travel time distributions by bayesian network inference. IEEE Transactions on Intelligent Transportation Systems (2019).Google ScholarGoogle ScholarCross RefCross Ref
  52. Sridhar Ramaswamy, Rajeev Rastogi, and Kyuseok Shim. 2000. Efficient algorithms for mining outliers from large data sets. In ACM SIGMOD Record, Vol. 29. 427--438.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Kai-Quan Shen, Chong-Jin Ong, Xiao-Ping Li, Zheng Hui, and Einar PV Wilder-Smith. 2007. A feature selection method for multilevel mental fatigue EEG classification. IEEE Transactions on Biomedical Engineering 54, 7 (2007), 1231--1237.Google ScholarGoogle ScholarCross RefCross Ref
  54. Hossein Soleimani and David J. Miller. 2016. ATD: Anomalous topic discovery in high dimensional discrete data. IEEE Transactions on Knowledge and Data Engineering 28, 9 (2016), 2267--2280.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Chenfei Sun, Zhongmin Yan, Qingzhong Li, Yongqing Zheng, Xudong Lu, and Lizhen Cui. 2019. Abnormal group-based joint medical fraud detection. IEEE Access 7 (2019), 13589--13596.Google ScholarGoogle ScholarCross RefCross Ref
  56. Guanting Tang, Jian Pei, James Bailey, and Guozhu Dong. 2015. Mining multidimensional contextual outliers from categorical relational data. Intelligent Data Analysis 19, 5 (2015), 1171--1192.Google ScholarGoogle ScholarCross RefCross Ref
  57. Kevin Toohey and Matt Duckham. 2015. Trajectory similarity measures. Sigspatial Special 7, 1 (2015), 43--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Edward Toth and Sanjay Chawla. 2018. Group deviation detection methods: A survey. ACM Computing Surveys (CSUR) 51, 4 (2018), 77.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Md Zia Uddin. 2019. A wearable sensor-based activity prediction system to facilitate edge computing in smart healthcare system. J. Parallel and Distrib. Comput. 123 (2019), 46--53.Google ScholarGoogle ScholarCross RefCross Ref
  60. Thé Van Luong, Nouredine Melab, and El-Ghazali Talbi. 2013. GPU computing for parallel local search metaheuristic algorithms. IEEE Trans. Comput. 62, 1 (2013), 173--185.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Jan N. van Rijn, Geoffrey Holmes, Bernhard Pfahringer, and Joaquin Vanschoren. 2018. The online performance estimation framework: Heterogeneous ensemble learning for data streams. Machine Learning 107, 1 (2018), 149--176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. José R. Vázquez-Canteli, Stepan Ulyanin, Jérôme Kämpf, and Zoltán Nagy. 2019. Fusing TensorFlow with building energy simulation for intelligent energy management in smart cities. Sustainable Cities and Society 45 (2019), 243--257.Google ScholarGoogle ScholarCross RefCross Ref
  63. Pengfei Wang, Yanjie Fu, Guannan Liu, Wenqing Hu, and Charu Aggarwal. 2017. Human mobility synchronization and trip purpose detection with mixture of hawkes processes. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 495--503.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Pengfei Wang, Guannan Liu, Yanjie Fu, Yuanchun Zhou, and Jianhui Li. 2017. Spotting trip purposes from taxi trajectories: A general probabilistic model. ACM Transactions on Intelligent Systems and Technology (TIST) 9, 3 (2017), 1--26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Hao Wu, Weiwei Sun, and Baihua Zheng. 2017. A fast trajectory outlier detection approach via driving behavior modeling. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 837--846.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Jingyao Wu, Zhibin Zhao, Chuang Sun, Ruqiang Yan, and Xuefeng Chen. 2020. Fault-attention generative probabilistic adversarial autoencoder for machine anomaly detection. IEEE Transactions on Industrial Informatics (2020).Google ScholarGoogle ScholarCross RefCross Ref
  67. Liang Xiong, Barnabás Póczos, Jeff Schneider, Andrew Connolly, and Jake VanderPlas. 2011. Hierarchical probabilistic models for group anomaly detection. In Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. 789--797.Google ScholarGoogle Scholar
  68. Liang Xiong, Barnabás Póczos, and Jeff G. Schneider. 2011. Group anomaly detection using flexible genre models. In Advances in Neural Information Processing Systems. 1071--1079.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Cao Lei Yu, Yanwei, Elke A Rundensteiner, and Qin Wang. 2017. Outlier detection over massive-scale trajectory streams. ACM Transactions on Database Systems (TODS) 42, 2 (2017), 10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Rose Yu, Xinran He, and Yan Liu. 2015. Glad: Group anomaly detection in social media analysis. ACM Transactions on Knowledge Discovery from Data (TKDD) 10, 2 (2015), 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Yanwei Yu, Lei Cao, Elke A Rundensteiner, and Qin Wang. 2014. Detecting moving object outliers in massive-scale trajectory streams. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 422--431.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Nicholas Jing Yuan, Yu Zheng, Xing Xie, Yingzi Wang, Kai Zheng, and Hui Xiong. 2014. Discovering urban functional zones using latent activity trajectories. IEEE Transactions on Knowledge and Data Engineering 27, 3 (2014), 712--725.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Jianting Zhang. 2012. Smarter outlier detection and deeper understanding of large-scale taxi trip records: A case study of NYC. In Proceedings of the ACM SIGKDD International Workshop on Urban Computing. ACM, 157--162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Jiong Zhang, Mohammad Zulkernine, and Anwar Haque. 2008. Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 38, 5 (2008), 649--659.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Yang Zhang, Nirvana Meratnia, and Paul JM Havinga. 2010. Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials 12, 2 (2010), 159--170.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Xujun Zhao, Jifu Zhang, Xiao Qin, Jianghui Cai, and Yang Ma. 2019. Parallel mining of contextual outlier using sparse subspace. Expert Systems with Applications 126 (2019), 158--170.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Zheng Zhao and Huan Liu. 2007. Spectral feature selection for supervised and unsupervised learning. In Proceedings of the 24th International Conference on Machine Learning. ACM, 1151--1157.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Zhong Zheng, Soora Rasouli, and Harry Timmermans. 2014. Evaluating the accuracy of GPS-based taxi trajectory records. Procedia Environmental Sciences 22, 2014 (2014), 186--198.Google ScholarGoogle ScholarCross RefCross Ref
  79. Zhaohui Zheng, Xiaoyun Wu, and Rohini Srihari. 2004. Feature selection for text categorization on imbalanced data. ACM Sigkdd Explorations Newsletter 6, 1 (2004), 80--89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Jie Zhu, Wei Jiang, An Liu, Guanfeng Liu, and Lei Zhao. 2015. Time-dependent popular routes based trajectory outlier detection. In International Conference on Web Information Systems Engineering. Springer, 16--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Brian D. Ziebart, Andrew L. Maas, J. Andrew Bagnell, and Anind K. Dey. 2008. Maximum entropy inverse reinforcement learning. In AAAI, Vol. 8. Chicago, IL, USA, 1433--1438.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Arthur Zimek, Ricardo JGB Campello, and Jörg Sander. 2014. Ensembles for unsupervised outlier detection: Challenges and research questions a position paper. Acm Sigkdd Explorations Newsletter 15, 1 (2014), 11--22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Arthur Zimek, Matthew Gaudet, Ricardo JGB Campello, and Jörg Sander. 2013. Subsampling for efficient and effective unsupervised outlier detection ensembles. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 428--436.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Machine Learning for Identifying Group Trajectory Outliers

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Management Information Systems
          ACM Transactions on Management Information Systems  Volume 12, Issue 2
          June 2021
          227 pages
          ISSN:2158-656X
          EISSN:2158-6578
          DOI:10.1145/3446838
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 January 2021
          • Accepted: 1 October 2020
          • Revised: 1 July 2020
          • Received: 1 December 2019
          Published in tmis Volume 12, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format