{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T22:58:47Z","timestamp":1773701927855,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000774","name":"The University of Newcastle","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000774","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The experimental validation of algorithms depends strongly on the characteristics of the test set used. Ideally, such a set should exhibit diverse characteristics that challenge an algorithm and are present in real-world problems. An approach to examine the diversity and representativeness of a test set is Instance Space Analysis, which uses a 2D projection to visualise the test set while identifying the strengths and weaknesses of competing algorithms. However, this has the limitation of discarding potentially useful information while crowding out the space as more features and algorithms are considered. This paper describes an extension of Instance Space Analysis into 3D, which retains a higher degree of information while maintaining the explainability of the visualisation by finding the rotations that maximise the linear trends. In addition to the expansion to 3D, a new algorithm for identifying portfolio footprints is introduced, offering a more robust and reliable method for identifying footprints in both 2D and 3D instance spaces. As a case study, we present a performance analysis of unsupervised anomaly detection methods, subject to changes in the normalisation technique. The results demonstrate the advantages by identifying regions of strength of algorithms previously thought to be underpowered.<\/jats:p>","DOI":"10.1007\/s10994-025-06871-5","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T22:33:58Z","timestamp":1759185238000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ISA3: a 3-dimensional expansion of instance space analysis"],"prefix":"10.1007","volume":"114","author":[{"given":"Connor","family":"Simpson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mario Andr\u00e9s","family":"Mu\u00f1oz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sevvandi","family":"Kandanaarachchi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ricardo J. G. B.","family":"Campello","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"key":"6871_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-45681-3_2","volume-title":"Principles of data mining and knowledge discovery","author":"F Angiulli","year":"2002","unstructured":"Angiulli, F., & Pizzuti, C. (2002). Fast outlier detection in high dimensional spaces. In T. Elomaa, H. Mannila, & H. Toivonen (Eds.), Principles of data mining and knowledge discovery (pp. 15\u201327). Springer."},{"key":"6871_CR2","unstructured":"Bartz-Beielstein, T., Doerr, C., van\u00a0den Berg, D., Bossek, J., Chandrasekaran, S., Eftimov, T., & Weise, T. (2020). Benchmarking in optimization: Best practice and open issues. https:\/\/arxiv.org\/abs\/2007.03488"},{"key":"6871_CR3","doi-asserted-by":"crossref","unstructured":"Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000). LOF: Identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (pp. 93\u2013104). Association for Computing Machinery.","DOI":"10.1145\/342009.335388"},{"issue":"1","key":"6871_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1093\/imamat\/6.1.76","volume":"6","author":"CG Broyden","year":"1970","unstructured":"Broyden, C. G. (1970). The convergence of a class of double-rank minimization algorithms 1. General considerations. IMA Journal of Applied Mathematics, 6(1), 76\u201390. https:\/\/doi.org\/10.1093\/imamat\/6.1.76","journal-title":"IMA Journal of Applied Mathematics"},{"issue":"4","key":"6871_CR5","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1007\/s10618-015-0444-8","volume":"30","author":"GO Campos","year":"2016","unstructured":"Campos, G. O., Zimek, A., Sander, J., Campello, R. J., Micenkov\u00e1, B., Schubert, E., & Houle, M. E. (2016). On the evaluation of unsupervised outlier detection: Measures, datasets, and an empirical study. Data Mining and Knowledge Discovery, 30(4), 891\u2013927. https:\/\/doi.org\/10.1007\/s10618-015-0444-8","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"4","key":"6871_CR6","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TIT.1983.1056714","volume":"29","author":"H Edelsbrunner","year":"1983","unstructured":"Edelsbrunner, H., Kirkpatrick, D., & Seidel, R. (1983). On the shape of a set of points in the plane. IEEE Transactions on Information Theory, 29(4), 551\u2013559. https:\/\/doi.org\/10.1109\/TIT.1983.1056714","journal-title":"IEEE Transactions on Information Theory"},{"key":"6871_CR7","unstructured":"Ester, M., Kriegel, H., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (pp. 226\u2013231). AAAI Press."},{"key":"6871_CR8","doi-asserted-by":"crossref","unstructured":"Hautamaki, V., Karkkainen, I., & Franti, P. (2004). Outlier detection using k-nearest neighbour graph. In Proceedings of the 17th international conference on pattern recognition (3, pp. 430\u2013433). IEEE.","DOI":"10.1109\/ICPR.2004.1334558"},{"key":"6871_CR9","doi-asserted-by":"crossref","unstructured":"Jin, W., Tung, A. K., Han, J., & Wang, W. (2006). Ranking outliers using symmetric neighborhood relationship. In Pacific-Asia conference on knowledge discovery and data mining (pp. 577\u2013593). Springer.","DOI":"10.1007\/11731139_68"},{"issue":"2","key":"6871_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10618-019-00661-z","volume":"34","author":"S Kandanaarachchi","year":"2020","unstructured":"Kandanaarachchi, S., Mu\u00f1oz, M. A., Hyndman, R. J., & Smith-Miles, K. (2020). On normalization and algorithm selection for unsupervised outlier detection. Data Mining and Knowledge Discovery, 34(2), 309\u2013354. https:\/\/doi.org\/10.1007\/s10618-019-00661-z","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6871_CR11","doi-asserted-by":"crossref","unstructured":"Kriegel, H. P., Kr\u00f6ger, P., Schubert, E. & Zimek, A. (2009). LoOP: Local outlier probabilities. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (pp. 1649\u20141652). Association for Computing Machinery.","DOI":"10.1145\/1645953.1646195"},{"key":"6871_CR12","doi-asserted-by":"crossref","unstructured":"Kriegel, H. P., Schubert, M. & Zimek, A. (2008). Angle-based outlier detection in high-dimensional data. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 444\u2014452). Association for Computing Machinery.","DOI":"10.1145\/1401890.1401946"},{"key":"6871_CR13","doi-asserted-by":"crossref","unstructured":"Latecki, L. J., Lazarevic, A. & Pokrajac, D. (2007). Outlier detection with kernel density functions. In International workshop on machine learning and data mining in pattern recognition (pp. 61\u201375). Springer.","DOI":"10.1007\/978-3-540-73499-4_6"},{"key":"6871_CR14","doi-asserted-by":"crossref","unstructured":"Liu, F. T., Ting, K. M. & Zhou, Z. H. (2008). Isolation forest. In 2008 Eighth IEEE international conference on data mining (pp. 413\u2013422).","DOI":"10.1109\/ICDM.2008.17"},{"key":"6871_CR15","unstructured":"Lundberg, S., & Lee, S. I. (2017). A unified approach to interpreting model predictions. arXiv:1705.07874"},{"issue":"4","key":"6871_CR16","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1162\/evco_a_00194","volume":"25","author":"M Mu\u00f1oz","year":"2017","unstructured":"Mu\u00f1oz, M., & Smith-Miles, K. (2017). Performance analysis of continuous black-box optimization algorithms via footprints in instance space. Evolutionary Computation, 25(4), 529\u2013554. https:\/\/doi.org\/10.1162\/evco_a_00194","journal-title":"Evolutionary Computation"},{"issue":"1","key":"6871_CR17","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10994-017-5629-5","volume":"107","author":"M Mu\u00f1oz","year":"2018","unstructured":"Mu\u00f1oz, M., Villanova, L., Baatar, D., & Smith-Miles, K. (2018). Instance spaces for machine learning classification. Machine Learning, 107(1), 109\u2013147. https:\/\/doi.org\/10.1007\/s10994-017-5629-5","journal-title":"Machine Learning"},{"key":"6871_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/3436893","author":"MA Mu\u00f1oz","year":"2021","unstructured":"Mu\u00f1oz, M. A., Yan, T., Leal, M. R., Smith-Miles, K., Lorena, A. C., Pappa, G. L., & Rodrigues, R. M. (2021). An instance space analysis of regression problems. ACM Transactions on Knowledge Discovery from Data. https:\/\/doi.org\/10.1145\/3436893","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"6871_CR19","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R. & Shim, K. (2000). Efficient algorithms for mining outliers from large data sets. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (pp. 427\u2014438). Association for Computing Machinery.","DOI":"10.1145\/342009.335437"},{"key":"6871_CR20","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S. & Guestrin, C. (2016). \u201cWhy should I trust you?\u201d: Explaining the predictions of any classifier. arXiv:1602.04938","DOI":"10.1145\/2939672.2939778"},{"key":"6871_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0065-2458(08)60520-3","volume":"15","author":"JR Rice","year":"1976","unstructured":"Rice, J. R. (1976). The algorithm selection problem. Advances in Computers, 15, 65\u2013118.","journal-title":"Advances in Computers"},{"key":"6871_CR22","doi-asserted-by":"crossref","unstructured":"Schubert, E., Zimek, A. & Kriegel, HP. (2014a). Generalized outlier detection with flexible kernel density estimates. In Proceedings of the 2014 SIAM international conference on data mining (pp. 542\u2013550).","DOI":"10.1137\/1.9781611973440.63"},{"key":"6871_CR23","doi-asserted-by":"publisher","unstructured":"Schubert, E., Zimek, A. K., & H, P. (2014b). Local outlier detection reconsidered: A generalized view on locality with applications to spatial, video, and network outlier detection. Data Mining and Knowledge Discovery, 28(1), 190\u2013237. https:\/\/doi.org\/10.1007\/s10618-012-0300-z","DOI":"10.1007\/s10618-012-0300-z"},{"key":"6871_CR24","unstructured":"Simpson, C. (2025). Scripts and meta-data for ISA3D + anomaly detection. Available at https:\/\/github.com\/CSimpson4224\/ISA3DAnomalyDetection."},{"issue":"1","key":"6871_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/3572895","volume":"55","author":"K Smith-Miles","year":"2023","unstructured":"Smith-Miles, K., & Mu\u00f1oz, M. A. (2023). Instance space analysis for algorithm testing: Methodology and software tools. ACM Computing Surveys, 55(1), 21\u201331. https:\/\/doi.org\/10.1145\/3572895","journal-title":"ACM Computing Surveys"},{"key":"6871_CR25","unstructured":"Smith-Miles, K., Mu\u00f1oz, M., Neelofar, N. (2020). Melbourne algorithm test instance library with data analytics (MATILDA). Available at https:\/\/matilda.unimelb.edu.au."},{"key":"6871_CR27","doi-asserted-by":"crossref","unstructured":"Tang, J., Chen, Z., Fu, A. W. C. & Cheung, D. W. (2002). Enhancing effectiveness of outlier detections for low density patterns. In Pacific-Asia conference on knowledge discovery and data mining (pp. 535\u2013548). Springer.","DOI":"10.1007\/3-540-47887-6_53"},{"key":"6871_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-05318-5_2","volume-title":"Automated Machine Learning: Methods, Systems, Challenges","author":"J Vanschoren","year":"2019","unstructured":"Vanschoren, J. (2019). Meta-learning meta-learning. In F. Hutter, L. Kotthoff, & J. Vanschoren (Eds.), Automated Machine Learning: Methods, Systems, Challenges (pp. 35\u201361). Springer."},{"issue":"2","key":"6871_CR29","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1023\/A:1019956318069","volume":"18","author":"R Vilalta","year":"2002","unstructured":"Vilalta, R., & Drissi, Y. (2002). A perspective view and survey of meta-learning. Artificial Intelligence Review, 18(2), 77\u201395. https:\/\/doi.org\/10.1023\/A:1019956318069","journal-title":"Artificial Intelligence Review"},{"key":"6871_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, K., Hutter, M. & Jin, H. (2009). A new local distance-based outlier detection approach for scattered real-world data. In Pacific-Asia conference on knowledge discovery and data mining (pp. 813\u2013822). Springer.","DOI":"10.1007\/978-3-642-01307-2_84"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-025-06871-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-025-06871-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-025-06871-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T14:29:54Z","timestamp":1764685794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-025-06871-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":30,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["6871"],"URL":"https:\/\/doi.org\/10.1007\/s10994-025-06871-5","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"20 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"240"}}