{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:10:01Z","timestamp":1731975001992,"version":"3.28.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00530-024-01343-7","type":"journal-article","created":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T12:01:51Z","timestamp":1715688111000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A fuzzy detection approach to high-dimensional anomalies"],"prefix":"10.1007","volume":"30","author":[{"given":"Jian","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Nanshan","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Pingping","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jingyue","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,14]]},"reference":[{"key":"1343_CR1","unstructured":"Chalapathy, R., Chawla, S.: Deep Learning for Anomaly Detection: A Survey, pp. 1\u201350 (2019). arXiv:1901.03407v2"},{"key":"1343_CR2","doi-asserted-by":"crossref","unstructured":"Pang, G., Cao, L., Chen, L., et al.: Learning representations of ultrahigh-dimensional data for random distance-based outlier detection. In: KDD, pp. 2041\u20132050 (2018)","DOI":"10.1145\/3219819.3220042"},{"key":"1343_CR3","doi-asserted-by":"crossref","unstructured":"Wang, H., Pang, G., Shen, C., et al.: Unsupervised representation learning by predicting random distances. In: Twenty-Ninth International Joint Conference on Artificial Intelligence Main track, pp. 2950\u20132956 (2020)","DOI":"10.24963\/ijcai.2020\/408"},{"issue":"4","key":"1343_CR4","doi-asserted-by":"publisher","first-page":"3632","DOI":"10.1109\/TKDE.2021.3130234","volume":"35","author":"Y Li","year":"2023","unstructured":"Li, Y., Peng, X., Zhang, J., et al.: DCT-GAN: dilated convolutional transformer-based GAN for time series anomaly detection. IEEE Trans. Knowl. Data Eng. 35(4), 3632\u20133644 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"1343_CR5","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TII.2021.3078192","volume":"19","author":"F Kong","year":"2023","unstructured":"Kong, F., Li, J., Jiang, B., et al.: Integrated generative model for industrial anomaly detection via bidirectional LSTM and attention mechanism. IEEE Trans. Industr. Inf. 19(1), 541\u2013550 (2023)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1343_CR6","doi-asserted-by":"crossref","unstructured":"Shanmuga Priya, G., Latha, M., Manoj, K., Prakash, S.: Unusual activity and anomaly detection in surveillance using GMM-KNN Model. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/ICICV50876.2021.9388587"},{"key":"1343_CR7","doi-asserted-by":"crossref","unstructured":"Sasirekha, R., Kanisha, B.: KNN based peak-LOF for outlier detection. In: 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1\u201310, IEEE (2022)","DOI":"10.1109\/ICSES55317.2022.9914212"},{"key":"1343_CR8","doi-asserted-by":"crossref","unstructured":"Rani, S., Tripathi, K., Arora, Y., Kumar, A.: Analysis of Anomaly detection of Malware using KNN. In: 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), pp. 1\u201310, IEEE (2022)","DOI":"10.1109\/ICIPTM54933.2022.9754044"},{"key":"1343_CR9","doi-asserted-by":"crossref","unstructured":"Abid, A., El Khediri, S., Moulahi, S., Cheour, R., Kachouri, R.: Vote and KNN outlier detection in wireless sensor networks. In: 2021 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/ISNCC52172.2021.9615901"},{"issue":"9","key":"1343_CR10","doi-asserted-by":"publisher","first-page":"8462","DOI":"10.1109\/JIOT.2020.2991693","volume":"7","author":"MM Aboelwafa","year":"2020","unstructured":"Aboelwafa, M.M., Seddik, K.G., Eldefrawy, M.H., Gadallah, Y., Gidlund, M.: A machine learning-based technique for false data injection attacks detection in industrial iot. IEEE Internet Things J. 7(9), 8462\u20138471 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"1343_CR11","doi-asserted-by":"publisher","first-page":"11385","DOI":"10.1109\/TCYB.2021.3079247","volume":"52","author":"K Jiang","year":"2022","unstructured":"Jiang, K., Xie, W., Lei, J., Li, Z., Li, Y., Jiang, T., Qian, Du.: E2E-LIADE: end-to-end local invariant autoencoding density estimation model for anomaly target detection in hyperspectral image. IEEE Trans. Cybern. 52(11), 11385\u201311396 (2022)","journal-title":"IEEE Trans. Cybern."},{"issue":"5","key":"1343_CR12","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/TIM.2019.2954757","volume":"69","author":"Y Lyu","year":"2020","unstructured":"Lyu, Y., Han, Z., Zhong, J., Li, C., Liu, Z.: A generic anomaly detection of catenary support components based on generative adversarial networks. IEEE Trans. Instrum. Meas. 69(5), 2439\u20132448 (2020)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"12","key":"1343_CR13","doi-asserted-by":"publisher","first-page":"23408","DOI":"10.1109\/TITS.2022.3203871","volume":"23","author":"Xu Mingjing","year":"2022","unstructured":"Mingjing, Xu., Baraldi, P., Xuefei, Lu., Zio, E.: Generative adversarial networks with AdaBoost ensemble learning for anomaly detection in high-speed train automatic doors. IEEE Trans. Intell. Transp. Syst. 23(12), 23408\u201323421 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"1343_CR14","doi-asserted-by":"publisher","first-page":"4205","DOI":"10.1007\/s40747-022-00695-9","volume":"8","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Li, J., Liu, C., Wang, J., Li, J., Liu, H.: Anomaly detection for high-dimensional space using deep hypersphere fused with probability approach. Complex Intell. Syst. 8, 4205\u20134220 (2022)","journal-title":"Complex Intell. Syst."},{"issue":"1","key":"1343_CR15","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/TKDE.2021.3077046","volume":"35","author":"Y Qiao","year":"2023","unstructured":"Qiao, Y., Kui, Wu., Jin, P.: Efficient anomaly detection for high-dimensional sensing data with one-class support vector machine. IEEE Trans. Knowl. Data Eng. 35(1), 404\u2013417 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1343_CR16","doi-asserted-by":"crossref","unstructured":"\u015ealk, Y., Uzun, B., \u00c7evikalp, H., Sar\u0131ba\u015f, H.: Anomaly detection with deep compact hypersphere. In: 30th Signal Processing and Communications Applications Conference (SIU), pp. 1\u20134, IEEE (2022)","DOI":"10.1109\/SIU55565.2022.9864994"},{"key":"1343_CR17","doi-asserted-by":"crossref","unstructured":"Kirchheim, K., Filax, M., Ortmeier, F.: Multi-class hypersphere anomaly detection. In: 26th International Conference on Pattern Recognition (ICPR), pp. 1\u20136. IEEE (2022)","DOI":"10.1109\/ICPR56361.2022.9956337"},{"key":"1343_CR18","doi-asserted-by":"crossref","unstructured":"Li, Z., Li, H., Lam, K., Chichung Kot, A.: Unseen face presentation attack detection with hypersphere loss. In: 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1\u201310 (2020)","DOI":"10.1109\/ICASSP40776.2020.9054420"},{"key":"1343_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.neucom.2018.12.079","volume":"338","author":"B Mei","year":"2019","unstructured":"Mei, B., Yitian, Xu.: Multi-task least squares twin support vector machine for classification. Neurocomputing 338, 26\u201333 (2019)","journal-title":"Neurocomputing"},{"issue":"9","key":"1343_CR20","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1109\/TFUZZ.2020.3003441","volume":"29","author":"S Zhou","year":"2021","unstructured":"Zhou, S., Li, D., Zhang, Z., Ping, R.: A new membership scaling fuzzy C-means clustering algorithm. IEEE Trans. Fuzzy Syst. 29(9), 2810\u20132818 (2021)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"6","key":"1343_CR21","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TFUZZ.2018.2874017","volume":"27","author":"I Banerjee","year":"2019","unstructured":"Banerjee, I., Mullick, S.S., Das, S.: On convergence of the class membership estimator in fuzzy k-nearest neighbor classifier. IEEE Trans. Fuzzy Syst. 27(6), 1226\u20131236 (2019)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"11","key":"1343_CR22","doi-asserted-by":"publisher","first-page":"2040","DOI":"10.1109\/TFUZZ.2019.2893863","volume":"27","author":"S Rezvani","year":"2019","unstructured":"Rezvani, S., Wang, X., Pourpanah, F.: Intuitionistic fuzzy twin support vector machines. IEEE Trans. Fuzzy Syst. 27(11), 2040\u20132151 (2019)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"1343_CR23","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.asoc.2018.07.003","volume":"71","author":"B Richhariya","year":"2018","unstructured":"Richhariya, B., Tanveer, M.: A robust fuzzy least squares twin support vector machine for class imbalance learning. Appl. Soft Comput. 71, 418\u2013432 (2018)","journal-title":"Appl. Soft Comput."},{"key":"1343_CR24","doi-asserted-by":"crossref","unstructured":"Seegmiller, C., Chamberlain, B., Miller, J., Masoum, M.A.S., Shekaramiz, M.: Wind turbine fault classification using support vector machines with fuzzy logic. In: 2022 Intermountain Engineering, Technology and Computing (IETC), pp. 1\u201310. IEEE (2022)","DOI":"10.1109\/IETC54973.2022.9796919"},{"issue":"8","key":"1343_CR25","doi-asserted-by":"publisher","first-page":"5188","DOI":"10.1109\/TSMC.2021.3119422","volume":"52","author":"T Sun","year":"2022","unstructured":"Sun, T., Sun, X.-M.: New results on classification modeling of noisy tensor datasets: a fuzzy support tensor machine dual model. IEEE Trans. Syst. Man Cybern. Syst. 52(8), 5188\u20135200 (2022)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"4","key":"1343_CR26","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1109\/TCST.2021.3123611","volume":"30","author":"K Jeong","year":"2022","unstructured":"Jeong, K., Choi, S.B.: Takagi\u2013Sugeno fuzzy observer-based magnetorheological damper fault diagnosis using a support vector machine. IEEE Trans. Control Syst. Technol. 30(4), 1723\u20131735 (2022)","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"1343_CR27","doi-asserted-by":"crossref","unstructured":"Shreevastava, S., Maratha, P., Som, T., Tiwari, A.K.: A novel (alpha, beta)-indiscernibility-assisted intuitionistic fuzzy-rough set model and its application to dimensionality reduction. Optimization 1\u201320 (2023)","DOI":"10.1080\/02331934.2023.2270683"},{"key":"1343_CR28","doi-asserted-by":"crossref","unstructured":"Kumar, R., Singh, U.P., Bali, A., et al.: Adaptive control of unknown fuzzy disturbance-based uncertain nonlinear systems: application to hypersonic flight dynamics. J. Anal. 1\u201320 (2023)","DOI":"10.1007\/s41478-023-00687-z"},{"key":"1343_CR29","doi-asserted-by":"publisher","first-page":"2773","DOI":"10.1007\/s00521-022-07754-9","volume":"35","author":"P Jain","year":"2023","unstructured":"Jain, P., Tiwari, A., Som, T.: Fuzzy rough assisted missing value imputation and feature selection. Neural Comput. Appl. 35, 2773\u20132793 (2023)","journal-title":"Neural Comput. Appl."},{"key":"1343_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cie.2022.108124","volume":"168","author":"P Jain","year":"2022","unstructured":"Jain, P., Tiwari, A.K., Som, T.: An intuitionistic fuzzy bireduct model and its application to cancer treatment. Comput. Ind. Eng. 168, 1\u201320 (2022)","journal-title":"Comput. Ind. Eng."},{"issue":"6","key":"1343_CR31","first-page":"67","volume":"18","author":"S Shreevastava","year":"2021","unstructured":"Shreevastava, S., Singh, S., Tiwari, A.K., Som, T.: Different classes ratio and Laplace summation operator based intuitionistic fuzzy rough attribute selection. Iran. J. Fuzzy Syst. 18(6), 67\u201382 (2021)","journal-title":"Iran. J. Fuzzy Syst."},{"key":"1343_CR32","doi-asserted-by":"crossref","unstructured":"Jayasumana, S., Hartley, R., Salzmann, M., et al.: Optimizing over radial kernels on compact manifolds. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 3802\u20133809 (2014)","DOI":"10.1109\/CVPR.2014.480"},{"issue":"1","key":"1343_CR33","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1215\/S0012-7094-42-00908-6","volume":"9","author":"IJ Schoenberg","year":"1942","unstructured":"Schoenberg, I.J.: Positive definite functions on spheres. Duke Math. J. 9(1), 96\u2013108 (1942)","journal-title":"Duke Math. J."},{"key":"1343_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1128-0","volume-title":"Harmonic Analysis on Semigroups","author":"C Berg","year":"1984","unstructured":"Berg, C., Christensen, J.P.R., Ressel, P.: Harmonic Analysis on Semigroups. Springer Press, New York (1984)"},{"key":"1343_CR35","unstructured":"Chen, D., Wang, H., Tsang, E.C.C.: Generalized Mercer theorem and its application to feature space related to indefinite kernels. In: Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, pp. 774\u2013777. IEEE (2008)"},{"key":"1343_CR36","unstructured":"Hechtlinger, Y., P\u00f3czos, B., Wasserman, L.: Cautious deep learning (2019). arXiv:1805.09460"},{"key":"1343_CR37","doi-asserted-by":"crossref","unstructured":"Jayasumana, S., Hartley, R., Salzmann, M., et al.: Kernel methods on the Riemannian manifold of symmetric positive definite matrices. In: IEEE Conference on Computer Vision and Pattern Recognition (2013)","DOI":"10.1109\/CVPR.2013.17"},{"key":"1343_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2022.109146","volume":"125","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Hongchun, Qu., Li, Z., et al.: A deep hypersphere approach to high-dimensional anomaly detection. Appl. Soft Comput. 125, 1\u201317 (2022)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"1343_CR39","first-page":"2118","volume":"35","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y., Chen, Y., Wang, J., et al.: Unsupervised deep anomaly detection for multi-sensor time-series signals. IEEE Trans. Knowl. Data Eng. 35(2), 2118\u20132132 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1343_CR40","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TIP.2022.3231532","volume":"32","author":"L J\u00e9z\u00e9quel","year":"2023","unstructured":"J\u00e9z\u00e9quel, L., Ngoc-Son, Vu., Beaudet, J., et al.: Efficient anomaly detection using self-supervised multi-cue tasks. IEEE Trans. Image Process. 32, 807\u2013821 (2023)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"1343_CR41","doi-asserted-by":"publisher","first-page":"2330","DOI":"10.1109\/TII.2022.3182385","volume":"19","author":"Q Wan","year":"2023","unstructured":"Wan, Q., Gao, L., Li, X., et al.: Unsupervised image anomaly detection and segmentation based on pretrained feature mapping. IEEE Trans. Ind. Inf. 19(3), 2330\u20132339 (2023)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"5","key":"1343_CR42","doi-asserted-by":"publisher","first-page":"8199","DOI":"10.1109\/JIOT.2023.3318298","volume":"11","author":"V Goyal","year":"2024","unstructured":"Goyal, V., Yadav, A., Kumar, S., et al.: Lightweight LAE for anomaly detection with sound-based architecture in smart poultry farm. IEEE Internet Things J. 11(5), 8199\u20138209 (2024)","journal-title":"IEEE Internet Things J."},{"key":"1343_CR43","doi-asserted-by":"crossref","unstructured":"Al-Khateeb, A., Faisal Kamal, N., Alnuweiri, H., et al.: Scalable light-weight anomaly detection for data of individual smart meters. In: 2024 4th International Conference on Smart Grid and Renewable Energy, pp. 1\u20138. IEEE (2024)","DOI":"10.1109\/SGRE59715.2024.10429010"},{"key":"1343_CR44","unstructured":"Snoek, J., Larochelle, H., Adams, R.P.: Practical Bayesian optimization of machine learning algorithms. In: Advances in Neural Information Processing Systems, pp. 2951\u20132959 (2012)"},{"key":"1343_CR45","unstructured":"Oh, C., Gavves, E., Welling, M.: BOCK: Bayesian Optimization with Cylindrical Kernels (2019). arXiv:1806.01619v2"},{"key":"1343_CR46","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1007\/s10618-015-0444-8","volume":"30","author":"GO Campos","year":"2016","unstructured":"Campos, G.O., Zimek, A., Sander, J., et al.: On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min. Knowl. Disc. 30, 891\u2013927 (2016)","journal-title":"Data Min. Knowl. Disc."},{"key":"1343_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2021.108301","volume":"116","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Hongchun, Qu., Li, Z., et al.: An irrelevant attributes resistant approach to anomaly detection in high-dimensional space using a deep hypersphere structure. Appl. Soft Comput. 116, 1\u201320 (2022)","journal-title":"Appl. Soft Comput."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01343-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01343-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01343-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T23:40:48Z","timestamp":1731973248000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01343-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,14]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1343"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01343-7","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2024,5,14]]},"assertion":[{"value":"25 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"There are no conflict interests of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"146"}}