{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T22:25:51Z","timestamp":1774909551075,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"32","license":[{"start":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:00:00Z","timestamp":1758931200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:00:00Z","timestamp":1758931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Anomaly detection in data streams consists of detecting abnormal data samples in continuous data streams. This poses challenges that traditional and advanced anomaly detection methods are not equipped to deal with, such as the occurrence of conceptual drift and the need for continuous learning. Current state-of-the-art methods for detecting anomalies in data streams rely on fixed memory using hash functions or nearest neighbors. However, these methods can struggle to handle high-frequency data points or effectively identify seamless outliers, and also, they cannot be trained within a comprehensive deep-learning framework. In our research, we propose a novel method for streaming anomaly detection based on incremental density estimation. The method uses random Fourier features and incorporates the principles of quantum measurements and density matrices. We present the definition of the method and a variant of it, which can be represented as an exponential moving average density and a simple moving average, respectively. The method is designed to handle potentially infinite data streams and has a constant update complexity of\n                    <jats:italic>O<\/jats:italic>\n                    (1). To evaluate its effectiveness, we performed a comprehensive analysis by comparing the two variants with 12 state-of-the-art algorithms for detecting anomalies in data streams. We use 12 different streaming datasets to ensure an extensive evaluation of performance and efficiency.\n                  <\/jats:p>","DOI":"10.1007\/s00521-025-11602-x","type":"journal-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T06:30:58Z","timestamp":1758954658000},"page":"27475-27503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["INQMAD: incremental streaming anomaly detection with density matrices, quantum measurement, and density estimation"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8971-4998","authenticated-orcid":false,"given":"Joseph","family":"Gallego","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0704-9117","authenticated-orcid":false,"given":"Oscar A.","family":"Bustos-Brinez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9009-7288","authenticated-orcid":false,"given":"Fabio A.","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,27]]},"reference":[{"key":"11602_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41:3. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput Surv"},{"key":"11602_CR2","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/JPROC.2021.3052449","volume":"109","author":"L Ruff","year":"2021","unstructured":"Ruff L, Kauffmann JR, Vandermeulen RA, Montavon G, Samek W, Kloft M, Dietterich TG, Muller KR (2021) A unifying review of deep and shallow anomaly detection. Proc IEEE 109:756\u2013795. https:\/\/doi.org\/10.1109\/JPROC.2021.3052449","journal-title":"Proc IEEE"},{"key":"11602_CR3","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TNNLS.2022.3162123","volume":"33","author":"G Pang","year":"2022","unstructured":"Pang G, Aggarwal C, Shen C, Sebe N (2022) Editorial deep learning for anomaly detection. IEEE Trans Neural Netw Learn Syst 33:2282\u20132286. https:\/\/doi.org\/10.1109\/TNNLS.2022.3162123","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"11602_CR4","doi-asserted-by":"crossref","unstructured":"Mirsky Y, Doitshman T, Elovici Y, Shabtai A (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv:1802.09089","DOI":"10.14722\/ndss.2018.23204"},{"issue":"3","key":"11602_CR5","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11235-018-0475-8","volume":"70","author":"G Fernandes","year":"2019","unstructured":"Fernandes G, Rodrigues JJ, Carvalho LF, Al-Muhtadi JF, Proen\u00e7a ML (2019) A comprehensive survey on network anomaly detection. Telecommun Syst 70(3):447\u2013489","journal-title":"Telecommun Syst"},{"key":"11602_CR6","volume":"57","author":"H Nguyen","year":"2021","unstructured":"Nguyen H, Tran KP, Thomassey S, Hamad M (2021) Forecasting and anomaly detection approaches using lstm and lstm autoencoder techniques with the applications in supply chain management. Int J Inf Manage 57:102282","journal-title":"Int J Inf Manage"},{"key":"11602_CR7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.knosys.2019.03.012","volume":"175","author":"Y Wang","year":"2019","unstructured":"Wang Y, Luo X, Ding L, Fu S, Wei X (2019) Detection based visual tracking with convolutional neural network. Knowl-Based Syst 175:62\u201371","journal-title":"Knowl-Based Syst"},{"key":"11602_CR8","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.future.2015.01.001","volume":"55","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Mahmood AN, Islam MR (2016) A survey of anomaly detection techniques in financial domain. Futur Gener Comput Syst 55:278\u2013288","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"11602_CR9","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34(4):1302\u20131325","journal-title":"J Netw Comput Appl"},{"key":"11602_CR10","doi-asserted-by":"crossref","unstructured":"Popat R, Chaudhary J (2018) A survey on credit card fraud detection using machine learning","DOI":"10.1109\/ICOEI.2018.8553963"},{"issue":"6","key":"11602_CR11","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/TSMCC.2012.2215319","volume":"42","author":"AA Sodemann","year":"2012","unstructured":"Sodemann AA, Ross MP, Borghetti BJ (2012) A review of anomaly detection in automated surveillance. IEEE Trans Syst Man Cybern Part C (Appl Rev) 42(6):1257\u20131272","journal-title":"IEEE Trans Syst Man Cybern Part C (Appl Rev)"},{"key":"11602_CR12","doi-asserted-by":"crossref","unstructured":"Latecki LJ, Lazarevic A, Pokrajac D (2007) Outlier detection with kernel density functions. In: International workshop on machine learning and data mining in pattern recognition. Springer, pp 61\u201375","DOI":"10.1007\/978-3-540-73499-4_6"},{"key":"11602_CR13","first-page":"139","volume":"2","author":"LM Manevitz","year":"2001","unstructured":"Manevitz LM, Yousef M (2001) One-class svms for document classification. J Mach Learn Res 2:139\u2013154","journal-title":"J Mach Learn Res"},{"key":"11602_CR14","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 Eighth Ieee international conference on data mining. IEEE, pp 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"11602_CR15","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An J, Cho S (2015) Variational autoencoder based anomaly detection using reconstruction probability. Spec Lect IE 2(1):1\u201318","journal-title":"Spec Lect IE"},{"issue":"1","key":"11602_CR16","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2019","unstructured":"Kwon D, Kim H, Kim J, Suh SC, Kim I, Kim KJ (2019) A survey of deep learning-based network anomaly detection. Clust Comput 22(1):949\u2013961","journal-title":"Clust Comput"},{"key":"11602_CR17","unstructured":"Chalapathy R, Menon AK, Chawla S (2018) Anomaly detection using one-class neural networks. arXiv:1802.06360"},{"key":"11602_CR18","unstructured":"Dimokranitou A (2017) Adversarial autoencoders for anomalous event detection in images. Ph.d thesis, Purdue University"},{"issue":"20","key":"11602_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3182\/20130902-3-CN-3020.00044","volume":"46","author":"Z Ding","year":"2013","unstructured":"Ding Z, Fei M (2013) An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window. IFAC Proc Vol 46(20):12\u201317","journal-title":"IFAC Proc Vol"},{"key":"11602_CR20","unstructured":"Guha S, Mishra N, Roy G, Schrijvers O (2016) Robust random cut forest based anomaly detection on streams"},{"key":"11602_CR21","doi-asserted-by":"crossref","unstructured":"Manzoor E, Lamba H, Akoglu L (2018) xstream: Outlier detection in feature-evolving data streams. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1963\u20131972","DOI":"10.1145\/3219819.3220107"},{"key":"11602_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2947676","author":"S Hariri","year":"2018","unstructured":"Hariri S, Kind MC, Brunner RJ (2018) Extended isolation. Forest. https:\/\/doi.org\/10.1109\/TKDE.2019.2947676","journal-title":"Forest"},{"key":"11602_CR23","unstructured":"Tan SC, Ting KM, Liu TF (2011) Fast anomaly detection for streaming data. In: Twenty-second international joint conference on artificial intelligence"},{"key":"11602_CR24","doi-asserted-by":"crossref","unstructured":"Sathe S, Aggarwal CC (2016) Subspace outlier detection in linear time with randomized hashing. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 459\u2013468","DOI":"10.1109\/ICDM.2016.0057"},{"key":"11602_CR25","doi-asserted-by":"crossref","unstructured":"Bhatia S, Jain A, Li P, Kumar R, Hooi B (2021) Mstream: fast anomaly detection in multi-aspect streams. In: Proceedings of the web conference 2021, pp 3371\u20133382","DOI":"10.1145\/3442381.3450023"},{"key":"11602_CR26","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD international conference on management of data, pp 93\u2013104","DOI":"10.1145\/342009.335388"},{"key":"11602_CR27","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevn\u00fd","year":"2016","unstructured":"Pevn\u00fd T (2016) Loda: lightweight on-line detector of anomalies. Mach Learn 102:275\u2013304. https:\/\/doi.org\/10.1007\/s10994-015-5521-0","journal-title":"Mach Learn"},{"key":"11602_CR28","doi-asserted-by":"crossref","unstructured":"Na GS, Kim D, Yu H (2018) Dilof: Effective and memory efficient local outlier detection in data streams. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1993\u20132002","DOI":"10.1145\/3219819.3220022"},{"key":"11602_CR29","doi-asserted-by":"publisher","unstructured":"Bhatia S, Jain A, Srivastava S, Kawaguchi K, Hooi B (2022) Memstream: memory-based streaming anomaly detection. WWW 2022-proceedings of the ACM web conference 2022, 610\u2013621. https:\/\/doi.org\/10.1145\/3485447.3512221","DOI":"10.1145\/3485447.3512221"},{"key":"11602_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106326","volume":"123","author":"L Melgar-Garc\u00eda","year":"2023","unstructured":"Melgar-Garc\u00eda L, Guti\u00e9rrez-Avil\u00e9s D, Rubio-Escudero C, Troncoso A (2023) Identifying novelties and anomalies for incremental learning in streaming time series forecasting. Eng Appl Artif Intell 123:106326. https:\/\/doi.org\/10.1016\/j.engappai.2023.106326","journal-title":"Eng Appl Artif Intell"},{"key":"11602_CR31","doi-asserted-by":"publisher","unstructured":"Angiulli F, Fassetti F (2007) Detecting distance-based outliers in streams of data, pp 811\u2013820. https:\/\/doi.org\/10.1145\/1321440.1321552","DOI":"10.1145\/1321440.1321552"},{"key":"11602_CR32","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1016\/j.ins.2022.06.013","volume":"607","author":"A Degirmenci","year":"2022","unstructured":"Degirmenci A, Karal O (2022) Efficient density and cluster based incremental outlier detection in data streams. Inf Sci 607:901\u2013920. https:\/\/doi.org\/10.1016\/j.ins.2022.06.013","journal-title":"Inf Sci"},{"key":"11602_CR33","first-page":"226","volume":"96","author":"M Ester","year":"1996","unstructured":"Ester M, Kriegel H-P, Sander J, Xu X et al (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. Kdd 96:226\u2013231","journal-title":"Kdd"},{"key":"11602_CR34","unstructured":"Rahimi A, Recht B (2007) Random features for large-scale kernel machines. In: Advances in neural information processing systems, vol. 20"},{"key":"11602_CR35","doi-asserted-by":"crossref","unstructured":"Li Y, Zhang K, Wang J, Kumar S (2019) Learning adaptive random features. In: Proceedings of the AAAI conference on artificial intelligence, vol 33, pp 4229\u20134236","DOI":"10.1609\/aaai.v33i01.33014229"},{"key":"11602_CR36","doi-asserted-by":"crossref","unstructured":"Gallego-Mejia JA, Gonz\u00e1lez FA (2023) Demande: Density matrix neural density estimation. IEEE Access","DOI":"10.1109\/ACCESS.2023.3279123"},{"issue":"2","key":"11602_CR37","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s42484-022-00079-9","volume":"4","author":"FA Gonz\u00e1lez","year":"2022","unstructured":"Gonz\u00e1lez FA, Gallego A, Toledo-Cort\u00e9s S, Vargas-Calder\u00f3n V (2022) Learning with density matrices and random features. Quantum Mach Intell 4(2):23","journal-title":"Quantum Mach Intell"},{"key":"11602_CR38","doi-asserted-by":"crossref","unstructured":"Gallego JA, Osorio JF, Gonzalez FA (2022) Fast kernel density estimation with density matrices and random fourier features. In: Ibero-American conference on artificial intelligence. Springer, pp 160\u2013172","DOI":"10.1007\/978-3-031-22419-5_14"},{"key":"11602_CR39","first-page":"16117","volume":"37","author":"JA Gallego-Mejia","year":"2023","unstructured":"Gallego-Mejia JA (2023) Efficient non-parametric neural density estimation and its application to outlier and anomaly detection. Proc AAAI Conf Artif Intell 37:16117\u201316118","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"11602_CR40","doi-asserted-by":"publisher","unstructured":"Gallego JA, Gonz\u00e1lez FA (2022) Quantum adaptive fourier features for neural density estimation. https:\/\/doi.org\/10.48550\/ARXIV.2208.00564 . https:\/\/arxiv.org\/abs\/2208.00564","DOI":"10.48550\/ARXIV.2208.00564"},{"key":"11602_CR41","doi-asserted-by":"crossref","unstructured":"Bustos-Brinez OA, Gallego-Mejia JA, Gonz\u00e1lez FA (2023) Ad-dmkde: anomaly detection through density matrices and fourier features. In: International conference on information technology and systems. Springer, pp 327\u2013338","DOI":"10.1007\/978-3-031-33258-6_31"},{"key":"11602_CR42","doi-asserted-by":"crossref","unstructured":"Gallego-Mejia J, Bustos-Brinez O, Gonz\u00e1lez FA (2022) Lean-dmkde: quantum latent density estimation for anomaly detection. arXiv:2211.08525","DOI":"10.1609\/aaai.v37i13.26965"},{"key":"11602_CR43","doi-asserted-by":"crossref","unstructured":"Gallego-Mejia J, Bustos-Brinez O, Gonz\u00e1lez FA (2024) Latent anomaly detection through density matrices. arXiv:2408.07623","DOI":"10.1007\/978-3-031-33258-6_31"},{"issue":"3","key":"11602_CR44","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.109.032418","volume":"109","author":"DH Useche","year":"2024","unstructured":"Useche DH, Bustos-Brinez OA, Gallego-Mejia JA, Gonz\u00e1lez FA (2024) Quantum density estimation with density matrices: application to quantum anomaly detection. Phys Rev A 109(3):032418","journal-title":"Phys Rev A"},{"key":"11602_CR45","doi-asserted-by":"crossref","unstructured":"Gallego-Mejia JA, Bustos-Brinez OA, Gonz\u00e1lez FA (2022) Inqmad: incremental quantum measurement anomaly detection. In: 2022 IEEE international conference on data mining workshops (ICDMW). IEEE, pp 787\u2013796","DOI":"10.1109\/ICDMW58026.2022.00107"},{"issue":"4","key":"11602_CR46","doi-asserted-by":"publisher","DOI":"10.7566\/JPSJ.90.044002","volume":"90","author":"FA Gonz\u00e1lez","year":"2021","unstructured":"Gonz\u00e1lez FA, Vargas-Calder\u00f3n V, Vinck-Posada H (2021) Classification with quantum measurements. J Phys Soc Jpn 90(4):044002","journal-title":"J Phys Soc Jpn"},{"issue":"4","key":"11602_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama J, \u017dliobait\u0117 I, Bifet A, Pechenizkiy M, Bouchachia A (2014) A survey on concept drift adaptation. ACM Comput Surv (CSUR) 46(4):1\u201337","journal-title":"ACM Comput Surv (CSUR)"},{"key":"11602_CR48","doi-asserted-by":"crossref","unstructured":"Bifet A, Gavalda R (2007) Learning from time-changing data with adaptive windowing. In: Proceedings of the 2007 SIAM international conference on data mining. SIAM, pp 443\u2013448","DOI":"10.1137\/1.9781611972771.42"},{"key":"11602_CR49","unstructured":"Yilmaz SF, Kozat SS (2020) Pysad: A streaming anomaly detection framework in python. arXiv:2009.02572"},{"key":"11602_CR50","unstructured":"Rayana S (2016) ODDS Library. http:\/\/odds.cs.stonybrook.edu"},{"key":"11602_CR51","unstructured":"KDD Cup Dataset. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"11602_CR52","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA. A detailed analysis of the Kdd Cup 99 data set. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"11602_CR53","unstructured":"Sharafaldin AHLI, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization"},{"key":"11602_CR54","unstructured":"Moustafa N, Slay J. Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 Network Data Set)"},{"issue":"11","key":"11602_CR55","doi-asserted-by":"publisher","first-page":"3009","DOI":"10.1016\/j.csda.2005.06.019","volume":"50","author":"X Zhang","year":"2006","unstructured":"Zhang X, King ML, Hyndman RJ (2006) A bayesian approach to bandwidth selection for multivariate kernel density estimation. Comput Stat Data Anal 50(11):3009\u20133031. https:\/\/doi.org\/10.1016\/j.csda.2005.06.019","journal-title":"Comput Stat Data Anal"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11602-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-025-11602-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11602-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T20:16:36Z","timestamp":1761077796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-025-11602-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,27]]},"references-count":55,"journal-issue":{"issue":"32","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["11602"],"URL":"https:\/\/doi.org\/10.1007\/s00521-025-11602-x","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,27]]},"assertion":[{"value":"10 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that there is no conflict of interest related to this research study. We have no financial or personal relationships that could influence the outcomes or interpretations presented in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}