Trajectory Outlier Detection: Algorithms, Taxonomies, Evaluation, and Open Challenges

被引:38
作者
Belhadi, Asma [1 ]
Djenouri, Youcef [2 ]
Lin, Jerry Chun-Wei [3 ]
Cano, Alberto [4 ]
机构
[1] Kristiania Univ Coll, Dept Technol, Kirkegata 24, N-0153 Oslo, Norway
[2] SINTEF Digital, Dept Math & Cybernet, Forskningsveien 1, N-0373 Oslo, Norway
[3] Western Norway Univ Appl Sci, Dept Comp Sci Elect Engn & Math Sci, Inndalsveien 28, N-5063 Bergen, Norway
[4] Virginia Commonwealth Univ, Dept Comp Sci, 401 W Main St, Richmond, VA 23284 USA
关键词
Trajectory outlier detection; industrial informatics applications; data mining; machine learning; ANOMALY DETECTION; SWARM INTELLIGENCE; TIME-SERIES; VIDEO; BEHAVIOR; KNOWLEDGE; MACHINE; SYSTEM;
D O I
10.1145/3399631
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting abnormal trajectories is an important task in research and industrial applications, which has attracted considerable attention in recent decades. This work studies the existing trajectory outlier detection algorithms in different industrial domains and applications, including maritime, smart urban transportation, video surveillance, and climate change domains. First, we review several algorithms for trajectory outlier detection. Second, different taxonomies are proposed regarding application-, output-, and algorithm-based levels. Third, evaluation of 10 trajectory outlier detection algorithms is performed on small, large, and big trajectory databases. Finally, future challenges and open issues with regard to trajectory outliers are derived and discussed. This survey offers a general overview of existing trajectory outlier detection algorithms in industrial informatics applications. As a result, mature solutions may be further developed by data mining and machine learning communities.
引用
收藏
页数:29
相关论文
共 152 条
[1]   Automatic visual detection of human behavior: A review from 2000 to 2014 [J].
Afsar, Palwasha ;
Cortez, Paulo ;
Santos, Henrique .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (20) :6935-6956
[2]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[3]   A survey of anomaly detection techniques in financial domain [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Islam, Md. Rafiqul .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :278-288
[4]   Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection [J].
Albanese, Alessia ;
Pal, Sankar K. ;
Petrosino, Alfredo .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (01) :194-207
[5]   Intelligent Transportation and Control Systems Using Data Mining and Machine Learning Techniques: A Comprehensive Study [J].
Alsrehin, Nawaf O. ;
Klaib, Ahmad F. ;
Magableh, Aws .
IEEE ACCESS, 2019, 7 :49830-49857
[6]   Ensemble anomaly detection from multi-resolution trajectory features [J].
Ando, Shin ;
Thanomphongphan, Theerasak ;
Seki, Yoichi ;
Suzuki, Einoshin .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (01) :39-83
[7]  
Angiulli F., 2007, Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, P811, DOI [10.1145/1321440.1321552, DOI 10.1145/1321440.1321552]
[8]  
[Anonymous], 2010, P 12 ANN C GEN EV CO, DOI [DOI 10.1145/1830483.1830498, 10.1145/1830483.1830498]
[9]  
[Anonymous], 2006, J COMPUTING INFORM T
[10]  
[Anonymous], 2017, ACM T DATABASE SYST