{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T02:10:07Z","timestamp":1745633407406,"version":"3.40.4"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10618-025-01095-6","type":"journal-article","created":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T20:47:38Z","timestamp":1742590058000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ada-Context: adaptive context-aware grid-based approach for curation of data streams"],"prefix":"10.1007","volume":"39","author":[{"given":"Mostafa","family":"Mirzaie","sequence":"first","affiliation":[]},{"given":"Behshid","family":"Behkamal","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Allahbakhsh","sequence":"additional","affiliation":[]},{"given":"Samad","family":"Paydar","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,20]]},"reference":[{"issue":"4","key":"1095_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/risks10040076","volume":"10","author":"IA Abed","year":"2022","unstructured":"Abed IA et al (2022) Creative accounting determinants and financial reporting quality: systematic literature review. Risks 10(4):1\u201325","journal-title":"Risks"},{"key":"1095_CR2","doi-asserted-by":"publisher","first-page":"9523","DOI":"10.1016\/j.jksuci.2021.11.006","volume":"34","author":"S Agrahari","year":"2022","unstructured":"Agrahari S, Singh AK (2022) Concept drift detection in data stream mining\u202f: a literature review. J King Saud Univ Comput Inform Sci 34:9523\u20139540","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"1095_CR3","doi-asserted-by":"crossref","unstructured":"Aleman, Concepcion Sanchez et al. (2018) Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach. In: 2018 International Conference on Computing, Networking and Communications, ICNC 2018: 226\u201330.","DOI":"10.1109\/ICCNC.2018.8390320"},{"issue":"2","key":"1095_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1504\/IJPQM.2022.124711","volume":"36","author":"HM Alzoubi","year":"2022","unstructured":"Alzoubi HM, Ahmed G, Alshurideh M (2022) An empirical investigation into the impact of product quality dimensions on improving the order-winners and customer satisfaction. Int J Product Quality Manage 36(2):169","journal-title":"Int J Product Quality Manage"},{"key":"1095_CR5","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.future.2018.07.014","volume":"89","author":"D Ardagna","year":"2018","unstructured":"Ardagna D, Cappiello C, Sam\u00e1 W, Vitali M (2018) Context-aware data quality assessment for big data. Fut Gen Comput Syst 89:548\u2013562","journal-title":"Fut Gen Comput Syst"},{"issue":"2","key":"1095_CR6","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10115-006-0026-6","volume":"11","author":"S Basu","year":"2007","unstructured":"Basu S, Meckesheimer M (2007) Automatic outlier detection for time series: an application to sensor data. Knowl Inf Syst 11(2):137\u2013154","journal-title":"Knowl Inf Syst"},{"issue":"1\u20132","key":"1095_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10994-009-5152-4","volume":"79","author":"S Ben-David","year":"2010","unstructured":"Ben-David S et al (2010) A theory of learning from different domains. Mach Learn 79(1\u20132):151\u2013175","journal-title":"Mach Learn"},{"key":"1095_CR8","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.csda.2017.11.003","volume":"120","author":"C Bergmeir","year":"2018","unstructured":"Bergmeir C, Hyndman RJ, Koo B (2018) A note on the validity of cross-validation for evaluating autoregressive time series prediction. Comput Stat Data Anal 120:70\u201383","journal-title":"Comput Stat Data Anal"},{"issue":"4","key":"1095_CR9","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1007\/s12652-019-01194-5","volume":"11","author":"S Bharti","year":"2020","unstructured":"Bharti S, Pattanaik KK, Pandey A (2020) Contextual outlier detection for wireless sensor networks. J Amb Intell Human Comput 11(4):1511\u20131530","journal-title":"J Amb Intell Human Comput"},{"issue":"4","key":"1095_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3494564","volume":"16","author":"S Bhatia","year":"2022","unstructured":"Bhatia S et al (2022) Real-time anomaly detection in edge streams. ACM Trans Knowl Discov Data 16(4):1\u201322","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"10","key":"1095_CR11","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.14778\/3467861.3467863","volume":"14","author":"P Boniol","year":"2021","unstructured":"Boniol P, Paparrizos J, Palpanas T, Franklin MJ (2021) SAND: streaming subsequence anomaly detection. Proceed VLDB Endowment 14(10):1717\u20131729","journal-title":"Proceed VLDB Endowment"},{"issue":"3","key":"1095_CR12","doi-asserted-by":"publisher","first-page":"611","DOI":"10.14778\/3494124.3494142","volume":"15","author":"D Campos","year":"2021","unstructured":"Campos D et al (2021) Unsupervised time series outlier detection with diversity-driven convolutional ensembles. Proceed VLDB Endowment 15(3):611\u2013623","journal-title":"Proceed VLDB Endowment"},{"key":"1095_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.ins.2020.12.011","volume":"553","author":"L Chen","year":"2021","unstructured":"Chen L, Li G, Huang G (2021) A hypergrid based adaptive learning method for detecting data faults in wireless sensor networks. Inf Sci 553:49\u201365","journal-title":"Inf Sci"},{"key":"1095_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Xuanhao et al. (2021) DAEMON: Unsupervised Anomaly Detection and Interpretation for Multivariate Time Series. In: Proceedings - International Conference on Data Engineering 2021\u2013April: 2225\u201330","DOI":"10.1109\/ICDE51399.2021.00228"},{"issue":"6","key":"1095_CR15","doi-asserted-by":"publisher","first-page":"101534","DOI":"10.1016\/j.leaqua.2021.101534","volume":"33","author":"M Drouvelis","year":"2022","unstructured":"Drouvelis M, Paiardini P (2022) Feedback quality and performance in organisations. Lead Quart 33(6):101534","journal-title":"Lead Quart"},{"key":"1095_CR16","doi-asserted-by":"publisher","first-page":"2978","DOI":"10.1109\/TNSE.2022.3163144","volume":"10","author":"H Gao","year":"2022","unstructured":"Gao H et al (2022) TSMAE: a novel anomaly detection approach for internet of things time series data using memory-augmented autoencoder. IEEE Trans Network Sci Eng 10:2978\u20132990","journal-title":"IEEE Trans Network Sci Eng"},{"issue":"1","key":"1095_CR17","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s11277-020-07722-3","volume":"116","author":"U Gupta","year":"2021","unstructured":"Gupta U, Bhattacharjee V, Bishnu PS (2021) Outlier detection in wireless sensor networks based on neighbourhood. Wireless Pers Commun 116(1):443\u2013454","journal-title":"Wireless Pers Commun"},{"issue":"7","key":"1095_CR18","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.14778\/3523210.3523225","volume":"15","author":"X Han","year":"2022","unstructured":"Han X, Cheng R, Ma C, Grubenmann T (2022) DeepTEA: effective and efficient online time-dependent trajectory outlier detection. Proceed the VLDB Endowment 15(7):1493\u20131505","journal-title":"Proceed the VLDB Endowment"},{"key":"1095_CR19","doi-asserted-by":"crossref","unstructured":"Hayes Michael A, and Miriam AM Capretz (2014) Contextual Anomaly Detection in Big Sensor Data. In: 2014 IEEE International Congress on Big Data: 64\u201371. http:\/\/ieeexplore.ieee.org\/document\/6906762\/ (June 6, 2018).","DOI":"10.1109\/BigData.Congress.2014.19"},{"issue":"1","key":"1095_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/s40537-014-0011-y","volume":"2","author":"MA Hayes","year":"2015","unstructured":"Hayes MA, Capretz MAM (2015) Contextual anomaly detection framework for big sensor data. J Big Data 2(1):2","journal-title":"J Big Data"},{"key":"1095_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3532189","volume":"16","author":"Y Hu","year":"2022","unstructured":"Hu Y, Ao Q, Wang Y, Work DB (2022) Streaming data preprocessing via online tensor recovery for large environmental sensor networks. ACM Trans Knowledge Disc Data 16:1\u201324","journal-title":"ACM Trans Knowledge Disc Data"},{"key":"1095_CR22","unstructured":"Iyer, Vasanth. 2013. \u201cEnsemble Stream Model for Data-Cleaning in Sensor Networks.\u201d"},{"issue":"1","key":"1095_CR23","first-page":"53","volume":"10","author":"H Konno","year":"2018","unstructured":"Konno H, Uchihira N, Kosaka M (2018) Effective data cleansing method based on metadata. Int J Japan Assoc Manage Syst 10(1):53\u201358","journal-title":"Int J Japan Assoc Manage Syst"},{"key":"1095_CR24","doi-asserted-by":"crossref","unstructured":"Li Lei, F Noorian, DJM Moss, PHW Leong (2014) Rolling Window Time Series Prediction Using MapReduce. In: Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014: 757\u201364.","DOI":"10.1109\/IRI.2014.7051965"},{"key":"1095_CR25","doi-asserted-by":"publisher","first-page":"100554","DOI":"10.1016\/j.cosrev.2023.100554","volume":"48","author":"M Mirzaie","year":"2023","unstructured":"Mirzaie M et al (2023) State of the art on quality control for data streams: a systematic literature review. Comput Sci Rev 48:100554","journal-title":"Comput Sci Rev"},{"issue":"2","key":"1095_CR26","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/s00521-021-06455-z","volume":"34","author":"K Pasini","year":"2022","unstructured":"Pasini K et al (2022) Contextual anomaly detection on time series: a case study of metro ridership analysis. Neural Comput Appl 34(2):1483\u20131507","journal-title":"Neural Comput Appl"},{"key":"1095_CR27","doi-asserted-by":"crossref","unstructured":"Preuveneers Davy, Elisabeth Ilie-Zudor (2019) \u201cSpecial Issue: Big Data for Context-Aware Applications and Intelligent Environments.\u201d Future Generation Computer Systems 99: 644\u201345","DOI":"10.1016\/j.future.2018.11.031"},{"key":"1095_CR28","unstructured":"Pumpichet Sitthapon (2013) \u201cNovel online data cleaning protocols for data streams in trajectory , wireless sensor networks A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of doctor of philosophy in electrical engineering by Sitthapo.\u201d"},{"key":"1095_CR29","doi-asserted-by":"crossref","unstructured":"Qian Zhengping et al (2013) \u201cTimeStream: Reliable Stream Computation in the Cloud. In: Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013: 1\u201314. http:\/\/dl.acm.org\/citation.cfm?d=2465351.2465353 (July 16, 2020).","DOI":"10.1145\/2465351.2465353"},{"issue":"3","key":"1095_CR30","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1080\/0960085X.2021.1955628","volume":"31","author":"NP Rana","year":"2022","unstructured":"Rana NP, Chatterjee S, Dwivedi YK, Akter S (2022) Understanding dark side of artificial intelligence (AI) integrated business analytics: assessing firm\u2019s operational inefficiency and competitiveness. Eur J Inform Syst 31(3):364\u2013387","journal-title":"Eur J Inform Syst"},{"issue":"3","key":"1095_CR31","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1504\/IJSNET.2018.093126","volume":"27","author":"MA Rassam","year":"2018","unstructured":"Rassam MA, Maarof MA, Zainal A (2018) A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier. Int J Sens Networks 27(3):200","journal-title":"Int J Sens Networks"},{"key":"1095_CR32","unstructured":"Rutkowski L, Jaworski M, Duda P (2020) \u201cStream Data Mining: Algorithms and Their Probabilistic Properties | SpringerLink.\u201d https:\/\/link.springer.com\/book\/10.1007%2F978-3-030-13962-9 (July 23, 2020)."},{"issue":"1","key":"1095_CR33","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/spe.3020","volume":"52","author":"M Safaei","year":"2021","unstructured":"Safaei M et al (2021) Global outliers detection in wireless sensor networks: a novel approach integrating time-series analysis, entropy, and random forest-based classification. Software Pract Exp 52(1):277\u2013295","journal-title":"Software Pract Exp"},{"key":"1095_CR34","doi-asserted-by":"crossref","unstructured":"Song, Shaoxu et al. 2021. \u201cStream Data Cleaning under Speed and Acceleration Constraints.\u201d ACM Transactions on Database Systems 46(3).","DOI":"10.1145\/3465740"},{"key":"1095_CR35","doi-asserted-by":"publisher","first-page":"100289","DOI":"10.1016\/j.bdr.2021.100289","volume":"27","author":"L Tang","year":"2022","unstructured":"Tang L et al (2022) Big data in forecasting research: a literature review. Big Data Res 27:100289","journal-title":"Big Data Res"},{"key":"1095_CR36","volume-title":"The Elements of Statistical Learning Data Mining, Inference, and Prediction","author":"H Trevor","year":"2001","unstructured":"Trevor H, Friedman J, Tibshirani R (2001) The Elements of Statistical Learning Data Mining, Inference, and Prediction. Springer"},{"issue":"4","key":"1095_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11270-018-3756-7","volume":"229","author":"VM van Zoest","year":"2018","unstructured":"van Zoest VM, Stein A, Hoek G (2018) Outlier detection in urban air quality sensor networks. Water, Air, and Soil Pollut 229(4):1\u201313","journal-title":"Water, Air, and Soil Pollut"},{"issue":"3","key":"1095_CR38","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TITS.2020.2970295","volume":"22","author":"Y Wang","year":"2021","unstructured":"Wang Y, Masoud N, Khojandi A (2021) Real-time sensor anomaly detection and recovery in connected automated vehicle sensors. IEEE Trans Intell Transp Syst 22(3):1411\u20131421","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1095_CR39","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.jmsy.2021.03.005","volume":"62","author":"J Wang","year":"2022","unstructured":"Wang J, Chuqiao Xu, Zhang J, Zhong R (2022) Big data analytics for intelligent manufacturing systems: a review. J Manufact Syst 62:738\u2013752","journal-title":"J Manufact Syst"},{"key":"1095_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2023.104114","volume":"151","author":"Y Wang","year":"2023","unstructured":"Wang Y, Zhang R, Masoud N, Liu HX (2023) Anomaly detection and string stability analysis in connected automated vehicular platoons. Trans Res Part c: Emerg Technol 151:104114","journal-title":"Trans Res Part c: Emerg Technol"},{"key":"1095_CR41","doi-asserted-by":"crossref","unstructured":"Yoon Susik, Yooju Shin, Jae Gil Lee, Byung Suk Lee (2021) Multiple Dynamic Outlier-Detection from a Data Stream by Exploiting Duality of Data and Queries. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (June): 2063\u201375.","DOI":"10.1145\/3448016.3452810"},{"issue":"8","key":"1095_CR42","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1080\/13658816.2012.654493","volume":"26","author":"Y Zhang","year":"2012","unstructured":"Zhang Y et al (2012) Statistics-based outlier detection for wireless sensor networks. Int J Geograph Inform Sci 26(8):1373\u20131392","journal-title":"Int J Geograph Inform Sci"},{"key":"1095_CR43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3102110","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Chen Y, Wang J, Pan Z (2021) Unsupervised deep anomaly detection for multi-sensor time-series signals. IEEE Trans Knowledge and Data Eng. https:\/\/doi.org\/10.1109\/TKDE.2021.3102110","journal-title":"IEEE Trans Knowledge and Data Eng"},{"key":"1095_CR44","doi-asserted-by":"publisher","unstructured":"Zhang Yihong, Claudia Szabo, and QZ Sheng (2014) \u201cCleaning Environmental Sensing Data Streams Based on Individual Sensor Reliability.\u201d : 405\u201314. http:\/\/link.springer.com\/https:\/\/doi.org\/10.1007\/978-3-319-11746-1_29 (August 16, 2018).","DOI":"10.1007\/978-3-319-11746-1_29"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-025-01095-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-025-01095-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-025-01095-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T01:35:21Z","timestamp":1745631321000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-025-01095-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,20]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1095"],"URL":"https:\/\/doi.org\/10.1007\/s10618-025-01095-6","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"type":"print","value":"1384-5810"},{"type":"electronic","value":"1573-756X"}],"subject":[],"published":{"date-parts":[[2025,3,20]]},"assertion":[{"value":"25 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"22"}}