{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:02:06Z","timestamp":1776092526823,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319557526","type":"print"},{"value":"9783319557533","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55753-3_15","type":"book-chapter","created":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:38:10Z","timestamp":1490067490000},"page":"231-246","source":"Crossref","is-referenced-by-count":38,"title":["Outlier Trajectory Detection: A Trajectory Analytics Based Approach"],"prefix":"10.1007","author":[{"given":"Zhongjian","family":"Lv","sequence":"first","affiliation":[]},{"given":"Jiajie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Pengpeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Guanfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiaofang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1109\/TITS.2013.2238531","volume":"14","author":"C Chen","year":"2013","unstructured":"Chen, C., Zhang, D., Castro, P.S., Li, N., Sun, L., Li, S., Wang, Z.: iBoat: isolation-based online anomalous trajectory detection. IEEE Trans. Intell. Transp. Syst. 14, 806\u201318 (2013)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Z., Shen, H.T., Zhou, X.: Discovering popular routes from trajectories. In: ICDE, pp. 900\u2013911 (2011)","DOI":"10.1109\/ICDE.2011.5767890"},{"key":"15_CR3","doi-asserted-by":"crossref","first-page":"1260","DOI":"10.1007\/s11227-012-0762-1","volume":"66","author":"Z Ding","year":"2013","unstructured":"Ding, Z., Jiajie, X., Yang, Q.: Seaclouddm: a database cluster framework for managing and querying massive heterogeneous sensor sampling data. J. Supercomput. 66, 1260\u201384 (2013)","journal-title":"J. Supercomput."},{"key":"15_CR4","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xiaowei, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, pp. 226\u2013231 (1994)"},{"key":"15_CR5","unstructured":"Gonzalez, H., Han, J., Li, X., Myslinska, M., Sondag, J.P.: Adaptive fastest path computation on a road network: a traffic mining approach. In: VLDB, pp. 794\u2013805 (2007)"},{"key":"15_CR6","unstructured":"Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier (2011)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Jeung, H., Yiu, M.L., Zhou, X., Jensen, C.S., Shen, H.T.: Discovery of convoys in trajectory databases. In: PVLDB, pp. 1068\u20131080 (2008)","DOI":"10.14778\/1453856.1453971"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11853565_15","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"J Krumm","year":"2006","unstructured":"Krumm, J., Horvitz, E.: Predestination: inferring destinations from partial trajectories. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 243\u201360. Springer, Heidelberg (2006). doi: 10.1007\/11853565_15"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Lee, J.-G., Han, J., Li, X.: Trajectory outlier detection: a partition-and-detect framework. In: ICDE, pp. 140\u2013149 (2008)","DOI":"10.1109\/ICDE.2008.4497422"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Lee, J.-G., Han, J., Whang, K.-Y.: Trajectory clustering: a partition-and-group framework. In: SIGMOD, pp. 593\u2013604 (2007)","DOI":"10.1145\/1247480.1247546"},{"key":"15_CR11","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.artint.2007.01.006","volume":"171","author":"L Liao","year":"2007","unstructured":"Liao, L., Patterson, D.J., Fox, D., Kautz, H.: Learning, inferring transportation routines. Artif. Intell. 171, 311\u20131 (2007)","journal-title":"Artif. Intell."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Liu, L., Andris, C., Ratti, C.: Uncovering cabdrivers behavior patterns from their digital traces. In: Computers, Environment and Urban Systems, pp. 541\u2013548 (2010)","DOI":"10.1016\/j.compenvurbsys.2010.07.004"},{"key":"15_CR13","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/TVT.2013.2272792","volume":"63","author":"S Liu","year":"2014","unstructured":"Liu, S., Ni, L.M., Krishnan, R.: Fraud detection from taxis\u2019 driving behaviors. IEEE Trans. Veh. Technol. 63, 464\u201372 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"15_CR14","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28, 129\u2013136 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Masciari, E.: Trajectory outlier detection using an analytical approach. In: ICTAI, pp. 377\u2013384 (2011)","DOI":"10.1109\/ICTAI.2011.62"},{"key":"15_CR16","doi-asserted-by":"crossref","first-page":"3336","DOI":"10.1016\/j.eswa.2008.01.039","volume":"36","author":"H-S Park","year":"2009","unstructured":"Park, H.-S., Jun, C.-H.: A Simple and fast algorithm for k-meds clustering. Expert Syst. Appl. 36, 3336\u20133341 (2009)","journal-title":"Expert Syst. Appl."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: Roam: Rule-and motif-based anomaly detection in massive moving object data sets. In: SDM, pp. 273\u2013284 (2007)","DOI":"10.1137\/1.9781611972771.25"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Sacharidis, D., Patroumpas, K., Terrovitis, M., Kantere, V., Potamias, M., Mouratidis, K., Sellis, T.: On-line discovery of hot motion paths. In: EDBT, pp. 392\u2013403 (2008)","DOI":"10.1145\/1353343.1353392"},{"key":"15_CR19","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s00778-014-0365-y","volume":"24","author":"S Han","year":"2015","unstructured":"Han, S., Zheng, K., Huang, J., Wang, H., Zhou, X.: Calibrating trajectory data for spatio-temporal similarity analysis. VLDB J. 24, 93\u2013116 (2015)","journal-title":"VLDB J."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Lu-An Tang, Y., Zheng, J.Y., Han, J., Leung, A., Hung, C.-C., Peng, W.-C.: On discovery of traveling companions from streaming trajectories. In: ICDE, pp. 186\u2013197 (2012)","DOI":"10.1109\/ICDE.2012.33"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Wang, H., Zheng, K., Jiajie, X., Zheng, B., Zhou, X., Sadiq, S.: Sharkdb: an in-memory column-oriented trajectory storage. In: CIKM, pp. 1409\u20131418 (2014)","DOI":"10.1145\/2661829.2661878"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Yanwei, Y., Cao, L., Rundensteiner, E.A., Wang, Q.: Detecting moving object outliers in massive-scale trajectory streams. In: KDD, pp. 422\u2013431 (2014)","DOI":"10.1145\/2623330.2623735"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, D., Li, N., Zhou, Z.-H., Chen, C., Sun, L., Li, S.: iBAT: detecting anomalous taxi trajectories from gps traces. In: UbiComp, pp. 99\u2013108 (2011)","DOI":"10.1145\/2030112.2030127"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-319-26190-4_2","volume-title":"Web Information Systems Engineering \u2013 WISE 2015","author":"J Zhu","year":"2015","unstructured":"Zhu, J., Jiang, W., Liu, A., Liu, G., Zhao, L.: Time-dependent popular routes based trajectory outlier detection. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9418, pp. 16\u201330. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26190-4_2"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55753-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T14:32:43Z","timestamp":1750170763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55753-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319557526","9783319557533"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55753-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}