{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:37Z","timestamp":1742913937108,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031612305"},{"type":"electronic","value":"9783031612312"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61231-2_16","type":"book-chapter","created":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T09:01:44Z","timestamp":1718442104000},"page":"251-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning-Based Outliers Detection in\u00a0Compressed Trajectories"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0772-1698","authenticated-orcid":false,"given":"Yousra","family":"Chabchoub","sequence":"first","affiliation":[]},{"given":"Michele Luca","family":"Puzzo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,16]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-030-05090-0_23","volume-title":"Advanced Data Mining and Applications","author":"L Song","year":"2018","unstructured":"Song, L., Wang, R., Xiao, D., Han, X., Cai, Y., Shi, C.: Anomalous trajectory detection using recurrent neural network. In: Gan, G., Li, B., Li, X., Wang, S. (eds.) ADMA 2018. LNCS (LNAI), vol. 11323, pp. 263\u2013277. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05090-0_23"},{"key":"16_CR2","doi-asserted-by":"publisher","unstructured":"Liu, Y., Zhao, K., Cong, G., Bao, Z.: Online anomalous trajectory detection with deep generative sequence modeling. In: 2020 IEEE 36th International Conference on Data Engineering (ICDE), Dallas, TX, USA, pp. 949\u2013960 (2020). https:\/\/doi.org\/10.1109\/ICDE48307.2020.00087","DOI":"10.1109\/ICDE48307.2020.00087"},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"Shahid, N., Naqvi, I.H., Qaisar, S.B.: Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: a survey. Artif. Intell. Rev. 43(2), 193\u2013228 (2015). https:\/\/doi.org\/10.1007\/s10462-012-9370-y","DOI":"10.1007\/s10462-012-9370-y"},{"key":"16_CR4","doi-asserted-by":"publisher","unstructured":"Muckell, J., Olsen Jr., P., Hwang, J., Lawson, C., Ravi, S.: Compression of trajectory data: a comprehensive evaluation and new approach. GeoInformatica. 18 (2014). https:\/\/doi.org\/10.1007\/s10707-013-0184-0","DOI":"10.1007\/s10707-013-0184-0"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/6587309","volume":"2016","author":"S Penghui","year":"2016","unstructured":"Penghui, S., Xia, S., Yuan, G., Li, D.: An overview of moving object trajectory compression algorithms. Math. Probl. Eng. 2016, 1\u201313 (2016). https:\/\/doi.org\/10.1155\/2016\/6587309","journal-title":"Math. Probl. Eng."},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Makris, A., Silva, C.L.d., Bogorny, V., et al.: Evaluating the effect of compressing algorithms for trajectory similarity and classification problems. Geoinformatica 25, 679\u2013711 (2021). https:\/\/doi.org\/10.1007\/s10707-021-00434-1","DOI":"10.1007\/s10707-021-00434-1"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Pappalardo, L., Simini, F., Barlacchi, G., Pellegrini, R.: scikit-mobility: A Python library for the analysis, generation, and risk assessment of mobility data. J. Stat. Softw. 103 (2022). https:\/\/doi.org\/10.18637\/jss.v103.i04","DOI":"10.18637\/jss.v103.i04"},{"issue":"8","key":"16_CR8","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1112","volume":"3","author":"Y Zhong","year":"2022","unstructured":"Zhong, Y., Kong, J., Zhang, J., Jiang, Y., Fan, X., Wang, Z.: A trajectory data compression algorithm based on spatio-temporal characteristics. PeerJ Comput. Sci. 3(8), e1112 (2022). https:\/\/doi.org\/10.7717\/peerj-cs.1112","journal-title":"PeerJ Comput. Sci."},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-540-75185-4_17","volume-title":"Advances in Databases and Information Systems","author":"E Frentzos","year":"2007","unstructured":"Frentzos, E., Theodoridis, Y.: On the effect of trajectory compression in spatiotemporal querying. In: Ioannidis, Y., Novikov, B., Rachev, B. (eds.) ADBIS 2007. LNCS, vol. 4690, pp. 217\u2013233. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75185-4_17"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Keogh, E., Chu, S., Hart, D., Pazzani, M.: An online algorithm for segmenting time series. In: Proceedings IEEE International Conference on Data Mining, pp. 289\u2013296. IEEE, San Jose, USA, Piscataway (2001)","DOI":"10.1109\/ICDM.2001.989531"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61231-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T22:56:42Z","timestamp":1732229802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61231-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031612305","9783031612312"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61231-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRiSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Risks and Security of Internet and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crisis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}