Spatiotemporal Road Traffic Anomaly Detection: A Tensor-Based Approach

被引:7
|
作者
Tisljaric, Leo [1 ]
Fernandes, Sofia [2 ]
Caric, Tonci [1 ]
Gama, Joao [2 ]
机构
[1] Univ Zagreb, Fac Transport & Traff Sci, Zagreb 10000, Croatia
[2] Univ Porto, Lab Artificial Intelligence & Decis Support, Inst Syst & Comp Engn Technol & Sci, P-4200 Porto, Portugal
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 24期
关键词
anomaly detection; tensor-based approach; traffic data; speed transition matrix; Intelligent Transport Systems; OUTLIER DETECTION; DATA IMPUTATION;
D O I
10.3390/app112412017
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The increased development of urban areas results in a larger number of vehicles on the road network, leading to traffic congestion, which often leads to potentially dangerous situations that can be described as anomalies. The tensor-based methods emerged only recently in applications related to traffic anomaly detection. They outperform other models regarding simultaneously capturing spatial and temporal components, which are of immense importance in traffic dataset analysis. This paper presents a tensor-based method for extracting the spatiotemporal road traffic patterns represented with the speed transition matrices, with the goal of anomaly detection. A novel anomaly detection approach is presented, which relies on computing the center of mass of the observed traffic patterns. The method was evaluated on a large road traffic dataset and was able to detect the most anomalous parts of the urban road network. By analyzing spatial and temporal components of the most anomalous traffic patterns, sources of anomalies can be identified. Results were validated using the extracted domain knowledge from the Highway Capacity Manual. The anomaly detection model achieved a precision score of 92.88%. Therefore, this method finds its usages for safety experts in detecting potentially dangerous road segments, urban traffic planners, and routing applications.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Optical Flow Based Anomaly Detection in Traffic Scenes
    Das, Anjana K. M.
    Murthy, O. V. Ramana
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 659 - 665
  • [42] PCA-Based Network Traffic Anomaly Detection
    Meimei Ding
    Hui Tian
    TsinghuaScienceandTechnology, 2016, 21 (05) : 500 - 509
  • [43] Network Traffic Anomaly Detection based on Apache Spark
    Pwint, Phyo Htet
    Shwe, Thanda
    2019 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION TECHNOLOGIES (ICAIT), 2019, : 222 - 226
  • [44] Anomaly detection based on the dynamic feature of network traffic
    Zhang, Yaxing
    Jin, Shuyuan
    Wang, Yuanzhuo
    Wang, Yanxia
    ADVANCES IN ENERGY, ENVIRONMENT AND MATERIALS SCIENCE, 2016, : 781 - 789
  • [45] Network Traffic Anomaly Detection Based on Wavelet Analysis
    Du, Zhen
    Ma, Lipeng
    Li, Huakang
    Li, Qun
    Sun, Guozi
    Liu, Zichang
    2018 IEEE/ACIS 16TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATION (SERA), 2018, : 94 - 101
  • [46] Network Traffic Anomaly Detection based on Catastrophe Theory
    Xiong, Wei
    Xiong, Naixue
    Yang, Laurence T.
    Vasilakos, Athanasios V.
    Wang, Qian
    Hu, Hanping
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 2070 - 2074
  • [47] PCA-Based Network Traffic Anomaly Detection
    Ding, Meimei
    Tian, Hui
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (05) : 500 - 509
  • [48] Anomaly Detection on Traffic Videos Based on Trajectory Simplification
    Isaloo, Mehdi
    Azimifar, Zohreh
    2013 8TH IRANIAN CONFERENCE ON MACHINE VISION & IMAGE PROCESSING (MVIP 2013), 2013, : 200 - 203
  • [49] Network Traffic Analysis based on Collective Anomaly Detection
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2014, : 1141 - 1146
  • [50] Network Traffic Anomaly Detection based on Ratio and Volume
    Kim, Hyun Joo
    Na, Jung C.
    Jang, Jong S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 190 - 193