{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:17:54Z","timestamp":1777043874063,"version":"3.51.4"},"reference-count":107,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T00:00:00Z","timestamp":1757116800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T00:00:00Z","timestamp":1757116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach. Intell. Res."],"published-print":{"date-parts":[[2025,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Anomaly detection is a longstanding and active research area that has many applications in domains such as finance, security and manufacturing. However, the efficiency and performance of anomaly detection algorithms are challenged by the large-scale, high-dimensional and heterogeneous data that are prevalent in the era of big data. Isolation-based unsupervised anomaly detection is a novel and effective approach for identifying anomalies in data. It relies on the idea that anomalies are few and different from normal instances, and thus can be easily isolated by random partitioning. Isolation-based methods have several advantages over existing methods, such as low computational complexity, low memory usage, high scalability, robustness to noise and irrelevant features, and no need for prior knowledge or heavy parameter tuning. In this survey, we review the state-of-the-art isolation-based anomaly detection methods, including their data partitioning strategies, anomaly score functions, and algorithmic details. We also discuss some extensions and applications of isolation-based methods in different scenarios, such as detecting anomalies in streaming data, time series, trajectory and image datasets. Finally, we identify some open challenges and future directions for isolation-based anomaly detection research.<\/jats:p>","DOI":"10.1007\/s11633-025-1554-4","type":"journal-article","created":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:30:17Z","timestamp":1757140217000},"page":"849-865","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Anomaly Detection Based on Isolation Mechanisms: A Survey"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2184-4491","authenticated-orcid":false,"given":"Yang","family":"Cao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4565-8829","authenticated-orcid":false,"given":"Haolong","family":"Xiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0401-4066","authenticated-orcid":false,"given":"Hang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4776-4932","authenticated-orcid":false,"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7892-6194","authenticated-orcid":false,"given":"Kai Ming","family":"Ting","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,6]]},"reference":[{"key":"1554_CR1","doi-asserted-by":"publisher","unstructured":"V. Chandola, A. Banerjee, V. Kumar. Anomaly detection: A survey. ACM Computing Surveys, vol. 41, no. 3, Article number 15, 2009. DOI: https:\/\/doi.org\/10.1145\/1541880.1541882.","DOI":"10.1145\/1541880.1541882"},{"key":"1554_CR2","doi-asserted-by":"publisher","unstructured":"G. Pang, C. Shen, L. Cao, A. Van Den Hengel. Deep learning for anomaly detection: A review. ACM Computing Surveys, vol. 54, no. 2, Article number 38, 2022. DOI: https:\/\/doi.org\/10.1145\/3439950.","DOI":"10.1145\/3439950"},{"issue":"143","key":"1554_CR3","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1080\/14786448708628471","volume":"23","author":"F Y Edgeworth","year":"1887","unstructured":"F. Y. Edgeworth. XLI. On discordant observations. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 23, no. 143, pp. 364\u2013375, 1887. DOI: https:\/\/doi.org\/10.1080\/14786448708628471.","journal-title":"The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science"},{"key":"1554_CR4","doi-asserted-by":"publisher","unstructured":"T. Fernando, H. Gammulle, S. Denman, S. Sridharan, C. Fookes. Deep learning for medical anomaly detection\u2013A survey. ACM Computing Surveys, vol. 54, no. 7, Article number 141, 2022. DOI: https:\/\/doi.org\/10.1145\/3464423.","DOI":"10.1145\/3464423"},{"issue":"22","key":"1554_CR5","doi-asserted-by":"publisher","first-page":"17457","DOI":"10.1007\/s00500-020-05191-1","volume":"24","author":"B Venkataramanaiah","year":"2020","unstructured":"B. Venkataramanaiah, J. Kamala. RETRACTED ARTICLE: ECG signal processing and KNN classifier-based abnormality detection by VH-doctor for remote cardiac healthcare monitoring. Soft Computing, vol. 24, no. 22, pp. 17457\u201317466, 2020. DOI: https:\/\/doi.org\/10.1007\/s00500-020-051911.","journal-title":"Soft Computing"},{"key":"1554_CR6","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems","author":"X Huang","year":"2022","unstructured":"X. Huang, Y. Yang, Y. Wang, C. Wang, Z. Zhang, J. Xu, L. Chen, M. Vazirgiannis. DGraph: A large-scale financial dataset for graph anomaly detection. In Proceedings of the 36th International Conference on Neural Information Processing Systems, New Orleans, USA, Article number 1654, 2022."},{"key":"1554_CR7","doi-asserted-by":"publisher","first-page":"4139","DOI":"10.1145\/3447548.3469456","volume-title":"Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining","author":"S Kumar","year":"2021","unstructured":"S. Kumar, L. Akoglu, N. Chawla, J. A. Rodriguez-Serrano, T. Faruquie, S. Nagrecha. Machine learning in finance. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, Singapore, pp. 4139\u20134140, 2021. DOI: https:\/\/doi.org\/10.1145\/3447548.3469456."},{"issue":"5","key":"1554_CR8","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1109\/TII.2021.3107783","volume":"18","author":"L Cui","year":"2022","unstructured":"L. Cui, Y. Qu, G. Xie, D. Zeng, R. Li, S. Shen, S. Yu. Security and privacy-enhanced federated learning for anomaly detection in IoT infrastructures. IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3492\u20133500, 2022. DOI: https:\/\/doi.org\/10.1109\/TII.2021.3107783.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"1554_CR9","doi-asserted-by":"publisher","first-page":"3195","DOI":"10.1007\/s00500-020-05373-x","volume":"25","author":"M Hosseinzadeh","year":"2021","unstructured":"M. Hosseinzadeh, A. M. Rahmani, B. Vo, M. Bidaki, M. Masdari, M. Zangakani. Improving security using SVM-based anomaly detection: Issues and challenges. Soft Computing, vol. 25, no. 4, pp. 3195\u20133223, 2021. DOI: https:\/\/doi.org\/10.1007\/s00500-020-05373-x.","journal-title":"Soft Computing"},{"key":"1554_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.inffus.2020.10.001","volume":"67","author":"L Erhan","year":"2021","unstructured":"L. Erhan, M. Ndubuaku, M. Di Mauro, W. Song, M. Chen, G. Fortino, O. Bagdasar, A. Liotta. Smart anomaly detection in sensor systems: A multi-perspective review. Information Fusion, vol. 67, pp. 64\u201379, 2021. DOI: https:\/\/doi.org\/10.1016\/j.inffus.2020.10.001.","journal-title":"Information Fusion"},{"key":"1554_CR11","doi-asserted-by":"publisher","unstructured":"T. Finke, M. Kr\u00e4mer, A. Morandini, A. M\u00fcck, I. Oleksiyuk. Autoencoders for unsupervised anomaly detection in high energy physics. Journal of High Energy Physics, vol. 2021, no. 6, Article number 161, 2021. DOI: https:\/\/doi.org\/10.1007\/JHEP06(2021)161.","DOI":"10.1007\/JHEP06(2021)161"},{"key":"1554_CR12","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.patrec.2020.06.008","volume":"136","author":"A L Alfeo","year":"2020","unstructured":"A. L. Alfeo, M. G. C. A. Cimino, G. Manco, E. Ritacco, G. Vaglini. Using an autoencoder in the design of an anomaly detector for smart manufacturing. Pattern Recognition Letters, vol. 136, pp. 272\u2013278, 2020. DOI: https:\/\/doi.org\/10.1016\/j.patrec.2020.06.008.","journal-title":"Pattern Recognition Letters"},{"key":"1554_CR13","doi-asserted-by":"publisher","unstructured":"K. Pooja, S. Rekha. Anomaly detection for predictive maintenance in industry 4.0\u2013A survey. E3S Web of Conferences, vol. 170, Article number 02007, 2020. DOI: https:\/\/doi.org\/10.1051\/e3sconf\/202017002007.","DOI":"10.1051\/e3sconf\/202017002007"},{"key":"1554_CR14","doi-asserted-by":"publisher","unstructured":"F. Pittino, M. Puggl, T. Moldaschl, C. Hirschl. Automatic anomaly detection on in-production manufacturing machines using statistical learning methods. Sensors, vol. 20, no. 8, Article number 2344, 2020. DOI: https:\/\/doi.org\/10.3390\/s20082344.","DOI":"10.3390\/s20082344"},{"issue":"5","key":"1554_CR15","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/JPROC.2021.3052449","volume":"109","author":"L Ruff","year":"2021","unstructured":"L. Ruff, J. R. Kauffmann, R. A. Vandermeulen, G. Montavon, W. Samek, M. Kloft, T. G. Dietterich, K. R. M\u00fcller. A unifying review of deep and shallow anomaly detection. Proceedings of the IEEE, vol. 109, no. 5, pp. 756\u2013795, 2021. DOI: https:\/\/doi.org\/10.1109\/JPROC.2021.3052449.","journal-title":"Proceedings of the IEEE"},{"key":"1554_CR16","first-page":"1597","volume-title":"Proceedings of the 37th International Conference on Machine Learning","author":"T Chen","year":"2020","unstructured":"T. Chen, S. Kornblith, M. Norouzi, G. Hinton. A simple framework for contrastive learning of visual representations. In Proceedings of the 37th International Conference on Machine Learning, pp. 1597\u20131607, 2020."},{"issue":"6","key":"1554_CR17","doi-asserted-by":"publisher","first-page":"5879","DOI":"10.1109\/TKDE.2022.3172903","volume":"35","author":"Y Liu","year":"2023","unstructured":"Y. Liu, M. Jin, S. Pan, C. Zhou, Y. Zheng, F. Xia, P. S. Yu. Graph self-supervised learning: A survey. IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 6, pp. 5879\u20135900, 2023. DOI: https:\/\/doi.org\/10.1109\/TKDE.2022.3172903.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1554_CR18","doi-asserted-by":"publisher","unstructured":"H. Xiang, X. Zhang, X. Xu, A. Beheshti, L. Qi, Y. Hong, W. Dou. Federated learning-based anomaly detection with isolation forest in the IoT-edge continuum. ACM Transactions on Multimedia Computing, Communications and Applications, to be published. DOI: https:\/\/doi.org\/10.1145\/3702995.","DOI":"10.1145\/3702995"},{"key":"1554_CR19","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1109\/ICDM.2008.17","volume-title":"Proceedings of the 8th IEEE International Conference on Data Mining","author":"F T Liu","year":"2008","unstructured":"F. T. Liu, K. M. Ting, Z. H. Zhou. Isolation forest. In Proceedings of the 8th IEEE International Conference on Data Mining, Pisa, Italy, pp. 413\u2013422, 2008. DOI: https:\/\/doi.org\/10.1109\/ICDM.2008.17."},{"issue":"4","key":"1554_CR20","doi-asserted-by":"publisher","first-page":"1479","DOI":"10.1109\/TKDE.2019.2947676","volume":"33","author":"S Hariri","year":"2021","unstructured":"S. Hariri, M. C. Kind, R. J. Brunner. Extended isolation forest. IEEE Transactions on Knowledge and Data Engineering, vol. 33, no. 4, pp. 1479\u20131489, 2021. DOI: https:\/\/doi.org\/10.1109\/TKDE.2019.2947676.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"1554_CR21","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1111\/coin.12156","volume":"34","author":"T R Bandaragoda","year":"2018","unstructured":"T. R. Bandaragoda, K. M. Ting, D. Albrecht, F. T. Liu, Y. Zhu, J. R. Wells. Isolation-based anomaly detection using nearest-neighbor ensembles. Computational Intelligence, vol. 34, no. 4, pp. 968\u2013998, 2018. DOI: https:\/\/doi.org\/10.1111\/coin.12156.","journal-title":"Computational Intelligence"},{"key":"1554_CR22","first-page":"2379","volume-title":"Proceedings of the 32nd International Joint Conference on Artificial Intelligence","author":"H Xiang","year":"2023","unstructured":"H. Xiang, X. Zhang, H. Hu, L. Qi, W. Dou, M. Dras, A. Beheshti, X. Xu. OptiForest: Optimal isolation forest for anomaly detection. In Proceedings of the 32nd International Joint Conference on Artificial Intelligence, Macao, China, pp. 2379\u20132387, 2023."},{"issue":"3","key":"1554_CR23","doi-asserted-by":"publisher","first-page":"2697","DOI":"10.1109\/TKDE.2021.3120277","volume":"35","author":"K M Ting","year":"2023","unstructured":"K. M. Ting, B. C. Xu, T. Washio, Z. H. Zhou. Isolation distributional kernel: A new tool for point and group anomaly detections. IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 3, pp. 2697\u20132710, 2023. DOI: https:\/\/doi.org\/10.1109\/TKDE.2021.3120277.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1554_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D M Hawkins","year":"1980","unstructured":"D. M. Hawkins. Identification of Outliers, Dordrecht, The Netherlands: Springer, 1980. DOI: https:\/\/doi.org\/10.1007\/978-94-0153994-4."},{"key":"1554_CR25","doi-asserted-by":"publisher","DOI":"10.24432\/C56C76","volume-title":"UCI Machine Learning Repository","author":"R A Fisher","year":"1988","unstructured":"R. A. Fisher. Iris. UCI Machine Learning Repository, 1988. DOI: https:\/\/doi.org\/10.24432\/C56C76."},{"issue":"5","key":"1554_CR26","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","volume":"19","author":"X Song","year":"2007","unstructured":"X. Song, M. Wu, C. Jermaine, S. Ranka. Conditional anomaly detection. IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 5, pp. 631\u2013645, 2007. DOI: https:\/\/doi.org\/10.1109\/TKDE.2007.1009.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"9","key":"1554_CR27","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"M. Gupta, J. Gao, C. C. Aggarwal, J. Han. Outlier detection for temporal data: A survey. IEEE Transactions on Knowledge and data Engineering, vol. 26, no. 9, pp. 2250\u20132267, 2014. DOI: https:\/\/doi.org\/10.1109\/TKDE.2013.184.","journal-title":"IEEE Transactions on Knowledge and data Engineering"},{"issue":"5","key":"1554_CR28","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/TKDE.2010.235","volume":"24","author":"V Chandola","year":"2012","unstructured":"V. Chandola, A. Banerjee, V. Kumar. Anomaly detection for discrete sequences: A survey. IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 5, pp. 823\u2013839, 2012. DOI: https:\/\/doi.org\/10.1109\/TKDE.2010.235.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1554_CR29","doi-asserted-by":"publisher","first-page":"3154","DOI":"10.1609\/aaai.v34i04.5712","volume-title":"Proceedings of the 34th AAAI Conference on Artificial Intelligence","author":"F Ahmed","year":"2020","unstructured":"F. Ahmed, A. Courville. Detecting semantic anomalies. In Proceedings of the 34th AAAI Conference on Artificial Intelligence, New York, USA, pp. 3154\u20133162, 2020. DOI: https:\/\/doi.org\/10.1609\/aaai.v34i04.5712."},{"key":"1554_CR30","doi-asserted-by":"publisher","unstructured":"T. R. Laskar, J. X. Huang, V. Smetana, C. Stewart, K. Pouw, A. An, S. Chan, L. Liu. Extending isolation forest for anomaly detection in big data via K-means. ACM Transactions on Cyber-Physical Systems, vol. 5, no. 4, Article number 41, 2021. DOI: https:\/\/doi.org\/10.1145\/3460976.","DOI":"10.1145\/3460976"},{"key":"1554_CR31","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-642-15883-4_18","volume-title":"Proceedings of European Conference on Machine Learning and Knowledge Discovery in Databases","author":"F T Liu","year":"2010","unstructured":"F. T. Liu, K. M. Ting, Z. H. Zhou. On detecting clustered anomalies using SCiForest. In Proceedings of European Conference on Machine Learning and Knowledge Discovery in Databases, Barcelona, Spain, pp. 274\u2013290, 2010. DOI: https:\/\/doi.org\/10.1007\/978-3-642-15883-4_18."},{"key":"1554_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1613\/jair.63","volume":"2","author":"S K Murthy","year":"1994","unstructured":"S. K. Murthy, S. Kasif, S. Salzberg. A system for induction of oblique decision trees. Journal of Artificial Intelligence Research, vol. 2, pp. 1\u201332, 1994. DOI: https:\/\/doi.org\/10.1613\/jair.63.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"1554_CR33","doi-asserted-by":"publisher","first-page":"4755","DOI":"10.1609\/aaai.v33i01.33014755","volume-title":"Proceedings of the 33rd AAAI Conference on Artificial Intelligence","author":"X Y Qin","year":"2019","unstructured":"X. Y. Qin, K. M. Ting, Y. Zhu, V. C. S. Lee. Nearest-neighbour-induced isolation similarity and its impact on density-based clustering. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence, Honolulu, USA, pp. 4755\u20134762, 2019. DOI: https:\/\/doi.org\/10.1609\/aaai.v33i01.33014755."},{"issue":"3","key":"1554_CR34","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/116873.116880","volume":"23","author":"F Aurenhammer","year":"1991","unstructured":"F. Aurenhammer. Voronoi diagrams\u2013a survey of a fundamental geometric data structure. ACM Computing Surveys, vol. 23, no. 3, pp. 345\u2013405, 1991. DOI: https:\/\/doi.org\/10.1145\/116873.116880.","journal-title":"ACM Computing Surveys"},{"key":"1554_CR35","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/ICDE.2017.145","volume-title":"Proceedings of the 33rd International Conference on Data Engineering","author":"X Zhang","year":"2017","unstructured":"X. Zhang, W. Dou, Q. He, R. Zhou, C. Leckie, R. Kotagiri, Z. Salcic. LSHiForest: A generic framework for fast tree isolation based ensemble anomaly analysis. In Proceedings of the 33rd International Conference on Data Engineering, San Diego, USA, pp. 983\u2013994, 2017. DOI: https:\/\/doi.org\/10.1109\/ICDE.2017.145."},{"key":"1554_CR36","doi-asserted-by":"publisher","first-page":"2329","DOI":"10.1145\/3219819.3219990","volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"K M Ting","year":"2018","unstructured":"K. M. Ting, Y. Zhu, Z. H. Zhou. Isolation kernel and its effect on SVM. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, London, UK, pp. 2329\u20132337, 2018. DOI: https:\/\/doi.org\/10.1145\/3219819.3219990."},{"key":"1554_CR37","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/342009.335388","volume-title":"Proceedings of ACM SIGMOD International Conference on Management of Data","author":"M M Breunig","year":"2000","unstructured":"M. M. Breunig, H. P. Kriegel, R. T. Ng, J. Sander. LOF: Identifying density-based local outliers. In Proceedings of ACM SIGMOD International Conference on Management of Data, Dallas, USA, pp. 93\u2013104, 2000. DOI: https:\/\/doi.org\/10.1145\/342009.335388."},{"issue":"5","key":"1554_CR38","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.1109\/TMC.2020.3028369","volume":"21","author":"J Du","year":"2022","unstructured":"J. Du, G. Han, C. Lin, M. Mart\u00ednez-Garc\u00eda. ITrust: An anomaly-resilient trust model based on isolation forest for underwater acoustic sensor networks. IEEE Transactions on Mobile Computing, vol. 21, no. 5, pp. 1684\u20131696, 2022. DOI: https:\/\/doi.org\/10.1109\/TMC.2020.3028369.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1554_CR39","doi-asserted-by":"publisher","first-page":"96319","DOI":"10.1109\/ACCESS.2019.2929581","volume":"7","author":"Z M Wang","year":"2019","unstructured":"Z. M. Wang, G. H. Song, C. Gao. An isolation-based distributed outlier detection framework using nearest neighbor ensembles for wireless sensor networks. IEEE Access, vol. 7, pp. 96319\u201396333, 2019. DOI: https:\/\/doi.org\/10.1109\/ACCESS.2019.2929581.","journal-title":"IEEE Access"},{"key":"1554_CR40","doi-asserted-by":"publisher","unstructured":"W. Fang, Y. Shao, P. E. D. Love, T. Hartmann, W. Liu. Detecting anomalies and de-noising monitoring data from sensors: A smart data approach. Advanced Engineering Informatics, vol. 55, Article number 101870, 2023. DOI: https:\/\/doi.org\/10.1016\/j.aei.2022.101870.","DOI":"10.1016\/j.aei.2022.101870"},{"key":"1554_CR41","doi-asserted-by":"publisher","first-page":"2157","DOI":"10.1109\/TIFS.2021.3050605","volume":"16","author":"P F Marteau","year":"2021","unstructured":"P. F. Marteau. Random partitioning forest for point-wise and collective anomaly detection\u2013application to network intrusion detection. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2157\u20132172, 2021. DOI: https:\/\/doi.org\/10.1109\/TIFS.2021.3050605.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1554_CR42","doi-asserted-by":"publisher","DOI":"10.1145\/3368756.3369061","volume-title":"Proceedings of the 4th International Conference on Smart City Applications","author":"Z Chiba","year":"2019","unstructured":"Z. Chiba, N. Abghour, K. Moussaid, A. El Omri, M. Rida. Newest collaborative and hybrid network intrusion detection framework based on Suricata and isolation forest algorithm. In Proceedings of the 4th International Conference on Smart City Applications, Casablanca, Morocco, Article number 77, 2019. DOI: https:\/\/doi.org\/10.1145\/3368756.3369061."},{"key":"1554_CR43","doi-asserted-by":"publisher","unstructured":"W. Hilal, S. A. Gadsden, J. Yawney. Financial fraud: A review of anomaly detection techniques and recent advances. Expert Systems with Applications, vol. 193, Article number 116429, 2022. DOI: https:\/\/doi.org\/10.1016\/j.eswa.2021.116429.","DOI":"10.1016\/j.eswa.2021.116429"},{"key":"1554_CR44","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/EMBC44109.2020.9175401","volume-title":"Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society","author":"N Islah","year":"2020","unstructured":"N. Islah, J. Koerner, R. Genov, T. A. Valiante, G. O\u2019Leary. Machine learning with imbalanced EEG data-sets using outlier-based sampling. In Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, Montreal, Canada, pp. 112\u2013115, 2020. DOI: https:\/\/doi.org\/10.1109\/EMBC44109.2020.9175401."},{"key":"1554_CR45","doi-asserted-by":"publisher","unstructured":"Y. Guo, X. Jiang, L. Tao, L. Meng, C. Dai, X. Long, F. Wan, Y. Zhang, J. van Dijk, R. M. Aarts, W. Chen, C. Chen. Epileptic seizure detection by cascading isolation forest-based anomaly screening and easyEnsemble. IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 30, Article number 915\u2013924, 2022. DOI: https:\/\/doi.org\/10.1109\/TNSRE.2022.3163503.","DOI":"10.1109\/TNSRE.2022.3163503"},{"key":"1554_CR46","doi-asserted-by":"publisher","unstructured":"S. Zhao, H. Gao, X. Li, H. Li, Y. Wang, R. Hu, J. Zhang, W. Yao, G. Li. An outlier detection based two-stage EEG artifact removal method using empirical wavelet transform and canonical correlation analysis. Biomedical Signal Processing and Control, vol. 92, Article number 106022, 2024. DOI: https:\/\/doi.org\/10.1016\/j.bspc.2024.106022.","DOI":"10.1016\/j.bspc.2024.106022"},{"key":"1554_CR47","doi-asserted-by":"publisher","unstructured":"Y. Himeur, K. Ghanem, A. Alsalemi, F. Bensaali, A. Amira. Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives. Applied Energy, vol. 287, Article number 116601, 2021. DOI: https:\/\/doi.org\/10.1016\/j.apenergy.2021.116601.","DOI":"10.1016\/j.apenergy.2021.116601"},{"issue":"10","key":"1554_CR48","doi-asserted-by":"publisher","first-page":"2765","DOI":"10.1109\/TIFS.2019.2902822","volume":"14","author":"S Ahmed","year":"2019","unstructured":"S. Ahmed, Y. Lee, S. H. Hyun, I. Koo. Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest. IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2765\u20132777, 2019. DOI: https:\/\/doi.org\/10.1109\/TIFS.2019.2902822.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"1554_CR49","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s10115-018-1257-z","volume":"60","author":"I Goldenberg","year":"2019","unstructured":"I. Goldenberg, G. I. Webb. Survey of distance measures for quantifying concept drift and shift in numeric data. Knowledge and Information Systems, vol. 60, no. 2, pp. 591\u2013615, 2019. DOI: https:\/\/doi.org\/10.1007\/s10115-018-1257-z.","journal-title":"Knowledge and Information Systems"},{"key":"1554_CR50","doi-asserted-by":"publisher","unstructured":"J. Gama, I. \u017dliobait\u0117, A. Bifet, M. Pechenizkiy, A. Bouchachia. A survey on concept drift adaptation. ACM Computing Surveys, vol. 46, no. 4, Article number 44, 2014. DOI: https:\/\/doi.org\/10.1145\/2523813.","DOI":"10.1145\/2523813"},{"issue":"5","key":"1554_CR51","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1007\/s11280-022-01052-z","volume":"25","author":"H Xiang","year":"2022","unstructured":"H. Xiang, X. Zhang. Edge computing empowered anomaly detection framework with dynamic insertion and deletion schemes on data streams. World Wide Web, vol. 25, no. 5, pp. 2163\u20132183, 2022. DOI: https:\/\/doi.org\/10.1007\/s11280-022-01052-z.","journal-title":"World Wide Web"},{"issue":"20","key":"1554_CR52","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3182\/20130902-3-CN-3020.00044","volume":"46","author":"Z Ding","year":"2013","unstructured":"Z. Ding, M. Fei. An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window. IFAC Proceedings Volumes, vol. 46, no. 20, pp. 12\u201317, 2013. DOI: https:\/\/doi.org\/10.3182\/20130902-3-CN-3020.00044.","journal-title":"IFAC Proceedings Volumes"},{"key":"1554_CR53","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.5591\/978-1-57735-516-8\/IJCAI11-254","volume-title":"Proceedings of the 22nd International Joint Conference on Artificial Intelligence","author":"S C Tan","year":"2011","unstructured":"S. C. Tan, K. M. Ting, T. F. Liu. Fast anomaly detection for streaming data. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence, Barcelona, Spain, pp. 1511\u20131516, 2011. DOI: https:\/\/doi.org\/10.5591\/978-1-57735-516-8\/IJCAI11-254."},{"key":"1554_CR54","first-page":"2712","volume-title":"Proceedings of the 33rd International Conference on Machine Learning","author":"S Guha","year":"2016","unstructured":"S. Guha, N. Mishra, G. Roy, O. Schrijvers. Robust random cut forest based anomaly detection on streams. In Proceedings of the 33rd International Conference on Machine Learning, New York, USA, pp. 2712\u20132721, 2016."},{"key":"1554_CR55","volume-title":"Proceedings of the 24th International Conference on Learning Representations","author":"B Zong","year":"2018","unstructured":"B. Zong, Q. Song, M. R. Min, W. Cheng, C. Lumezanu, D. Cho, H. Chen. Deep autoencoding Gaussian mixture model for unsupervised anomaly detection. In Proceedings of the 24th International Conference on Learning Representations, Vancouver, Canada, 2018."},{"key":"1554_CR56","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00054","volume-title":"Proceedings of the 24th International Conference on High Performance Computing & Communications; the 8th International Conference on Data Science & Systems; the 20th International Conference on Smart City; the 8th International Conference on Dependability","author":"M Wang","year":"2022","unstructured":"M. Wang, Y. Zhu, G. Li, G. Liu, B. Yang. Image anomaly detection with semantic-enhanced augmentation and distributional kernel. In Proceedings of the 24th International Conference on High Performance Computing & Communications; the 8th International Conference on Data Science & Systems; the 20th International Conference on Smart City; the 8th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application, Hainan, China, pp. 163\u2013170, 2022. DOI: https:\/\/doi.org\/10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00054."},{"key":"1554_CR57","doi-asserted-by":"publisher","unstructured":"L. Utkin, A. Ageev, A. Konstantinov, V. Muliukha. Improved anomaly detection by using the attention-based isolation forest. Algorithms, vol. 16, no. 1, Article number 19, 2023. DOI: https:\/\/doi.org\/10.3390\/a16010019.","DOI":"10.3390\/a16010019"},{"key":"1554_CR58","doi-asserted-by":"publisher","unstructured":"M. Zhao, W. Li, L. Li, A. Wang, J. Hu, R. Tao. Infrared small UAV target detection via isolation forest. IEEE Transactions on Geoscience and Remote Sensing, vol. 61, Article number 5004316, 2023. DOI: https:\/\/doi.org\/10.1109\/TGRS.2023.3321723.","DOI":"10.1109\/TGRS.2023.3321723"},{"key":"1554_CR59","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-030-59861-7_10","volume-title":"Proceedings of the 11th International Workshop on Machine Learning in Medical Imaging","author":"X Li","year":"2020","unstructured":"X. Li, Y. Lu, C. Desrosiers, X. Liu. Out-of-distribution detection for skin lesion images with deep isolation forest. In Proceedings of the 11th International Workshop on Machine Learning in Medical Imaging, Lima, Peru, pp. 91\u2013100, 2020. DOI: https:\/\/doi.org\/10.1007\/978-3-030-59861-7_10."},{"key":"1554_CR60","doi-asserted-by":"publisher","unstructured":"X. Cheng, M. Zhang, S. Lin, K. Zhou, S. Zhao, H. Wang. Two-stream isolation forest based on deep features for hyperspectral anomaly detection. IEEE Geoscience and Remote Sensing Letters, vol. 20, Article number 5504205, 2023. DOI: https:\/\/doi.org\/10.1109\/LGRS.2023.3271899.","DOI":"10.1109\/LGRS.2023.3271899"},{"key":"1554_CR61","doi-asserted-by":"publisher","unstructured":"X. Song, S. Aryal, K. M. Ting, Z. Liu, B. He. Spectral\u2013spatial anomaly detection of hyperspectral data based on improved isolation forest. IEEE Transactions on Geoscience and Remote Sensing, vol. 60, Article number 5516016, 2022. DOI: https:\/\/doi.org\/10.1109\/TGRS.2021.3104998.","DOI":"10.1109\/TGRS.2021.3104998"},{"issue":"9","key":"1554_CR62","doi-asserted-by":"publisher","first-page":"6664","DOI":"10.1109\/TGRS.2020.2978491","volume":"58","author":"R Wang","year":"2020","unstructured":"R. Wang, F. Nie, Z. Wang, F. He, X. Li. Multiple features and isolation forest-based fast anomaly detector for hyperspectral imagery. IEEE Transactions on Geoscience and Remote Sensing, vol. 58, no. 9, pp. 6664\u20136676, 2020. DOI: https:\/\/doi.org\/10.1109\/TGRS.2020.2978491.","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"1554_CR63","doi-asserted-by":"publisher","first-page":"252","DOI":"10.30919\/ES8E718","volume":"20","author":"A Bhatt","year":"2022","unstructured":"A. Bhatt, A. Ganatra. Explosive weapons and arms detection with singular classification (WARDIC) on novel weapon dataset using deep learning: Enhanced OODA loop. Engineered Science, vol. 20, pp. 252\u2013266, 2022. DOI: https:\/\/doi.org\/10.30919\/ES8E718.","journal-title":"Engineered Science"},{"issue":"3","key":"1554_CR64","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.icte.2020.06.003","volume":"6","author":"A Farzad","year":"2020","unstructured":"A. Farzad, T. A. Gulliver. Unsupervised log message anomaly detection. ICT Express, vol. 6, no. 3, pp. 229\u2013237, 2020. DOI: https:\/\/doi.org\/10.1016\/j.icte.2020.06.003.","journal-title":"ICT Express"},{"issue":"12","key":"1554_CR65","doi-asserted-by":"publisher","first-page":"12591","DOI":"10.1109\/TKDE.2023.3270293","volume":"35","author":"H Xu","year":"2023","unstructured":"H. Xu, G. Pang, Y. Wang, Y. Wang. Deep isolation forest for anomaly detection. IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 12, pp. 12591\u201312604, 2023. DOI: https:\/\/doi.org\/10.1109\/TKDE.2023.3270293.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1\u20132","key":"1554_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000060","volume":"10","author":"K Muandet","year":"2017","unstructured":"K. Muandet, K. Fukumizu, B. Sriperumbudur, B. Sch\u00f6lkopf. Kernel mean embedding of distributions: A review and beyond. Foundations and Trends\u00ae in Machine Learning, vol. 10, no. 1\u20132, pp. 1\u2013141, 2017. DOI: https:\/\/doi.org\/10.1561\/2200000060.","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"key":"1554_CR67","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-540-75225-7_5","volume-title":"Proceedings of the 18th International Conference on Algorithmic Learning Theory","author":"A Smola","year":"2007","unstructured":"A. Smola, A. Gretton, L. Song, B. Sch\u00f6lkopf. A hilbert space embedding for distributions. In Proceedings of the 18th International Conference on Algorithmic Learning Theory, Sendai, Japan, pp. 13\u201331, 2007. DOI: https:\/\/doi.org\/10.1007\/978-3-540-75225-7_5."},{"key":"1554_CR68","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1613\/jair.1.15849","volume":"79","author":"Y Wang","year":"2024","unstructured":"Y. Wang, Z. Wang, K. M. Ting, Y. Shang. A principled distributional approach to trajectory similarity measurement and its application to anomaly detection. Journal of Artificial Intelligence Research, vol. 79, pp. 865\u2013893, 2024. DOI: https:\/\/doi.org\/10.1613\/jair.1.15849.","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"11","key":"1554_CR69","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.14778\/3551793.3551796","volume":"15","author":"K M Ting","year":"2022","unstructured":"K. M. Ting, Z. Liu, H. Zhang, Y. Zhu. A new distributional treatment for time series and an anomaly detection investigation. Proceedings of the VLDB Endowment, vol. 15, no. 11, pp. 2321\u20132333, 2022. DOI: https:\/\/doi.org\/10.14778\/3551793.3551796.","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"3","key":"1554_CR70","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/s00778-023-00832-x","volume":"33","author":"K M Ting","year":"2024","unstructured":"K. M. Ting, Z. Liu, L. Gong, H. Zhang, Y. Zhu. A new distributional treatment for time series anomaly detection. The VLDB Journal, vol. 33, no. 3, pp. 753\u2013780, 2024. DOI: https:\/\/doi.org\/10.1007\/s00778-023-00832-x.","journal-title":"The VLDB Journal"},{"key":"1554_CR71","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/ICDM.2016.0179","volume-title":"Proceedings of the 16th International Conference on Data Mining","author":"C C M Yeh","year":"2016","unstructured":"C. C. M. Yeh, Y. Zhu, L. Ulanova, N. Begum, Y. Ding, H. A. Dau, D. F. Silva, A. Mueen, E. Keogh. Matrix profile I: All pairs similarity joins for time series: A unifying view that includes motifs, discords and shapelets. In Proceedings of the 16th International Conference on Data Mining, Barcelona, Spain, pp. 1317\u20131322, 2016. DOI: https:\/\/doi.org\/10.1109\/ICDM.2016.0179."},{"issue":"4","key":"1554_CR72","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1007\/s10618-020-00695-8","volume":"34","author":"S Gharghabi","year":"2020","unstructured":"S. Gharghabi, S. Imani, A. Bagnall, A. Darvishzadeh, E. Keogh. An ultra-fast time series distance measure to allow data mining in more complex real-world deployments. Data Mining and Knowledge Discovery, vol. 34, no. 4, pp. 1104\u20131135, 2020. DOI: https:\/\/doi.org\/10.1007\/s10618-020-00695-8.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"1554_CR73","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/ICDM.2016.0085","volume-title":"Proceedings of the 16th International Conference on Data Mining","author":"Y Zhu","year":"2016","unstructured":"Y. Zhu, Z. Zimmerman, N. S. Senobari, C. C. M. Yeh, G. Funning, A. Mueen, P. Brisk, E. Keogh. Matrix profile II: Exploiting a novel algorithm and GPUs to break the one hundred million barrier for time series motifs and joins. In Proceedings of the 16th International Conference on Data Mining, Barcelona, Spain, pp. 739\u2013748, 2016. DOI: https:\/\/doi.org\/10.1109\/ICDM.2016.0085."},{"key":"1554_CR74","doi-asserted-by":"publisher","first-page":"1855","DOI":"10.1145\/2723372.2737793","volume-title":"Proceedings of ACM SIG- MOD International Conference on Management of Data","author":"J Paparrizos","year":"2015","unstructured":"J. Paparrizos, L. Gravano. k-Shape: Efficient and accurate clustering of time series. In Proceedings of ACM SIG- MOD International Conference on Management of Data, Melbourne, Australia, pp. 1855\u20131870, 2015. DOI: https:\/\/doi.org\/10.1145\/2723372.2737793."},{"issue":"11","key":"1554_CR75","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.14778\/3342263.3342648","volume":"12","author":"J Paparrizos","year":"2019","unstructured":"J. Paparrizos, M. J. Franklin. GRAIL: Efficient time-series representation learning. Proceedings of the VLDB Endowment, vol. 12, no. 11, pp. 1762\u20131777, 2019. DOI: https:\/\/doi.org\/10.14778\/3342263.3342648.","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"3","key":"1554_CR76","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/s10115-004-0154-9","volume":"7","author":"E Keogh","year":"2005","unstructured":"E. Keogh, C. A. Ratanamahatana. Exact indexing of dynamic time warping. Knowledge and Information Systems, vol. 7, no. 3, pp. 358\u2013386, 2005. DOI: https:\/\/doi.org\/10.1007\/s10115-004-0154-9.","journal-title":"Knowledge and Information Systems"},{"key":"1554_CR77","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1137\/1.9781611975321.27","volume-title":"Proceedings of SIAM International Conference on Data Mining","author":"Y Shen","year":"2018","unstructured":"Y. Shen, Y. Chen, E. Keogh, H. Jin. Accelerating time series searching with large uniform scaling. In Proceedings of SIAM International Conference on Data Mining, San Diego, USA, pp. 234\u2013242, 2018. DOI: https:\/\/doi.org\/10.1137\/1.9781611975321.27."},{"key":"1554_CR78","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1137\/1.9781611975673.59","volume-title":"Proceedings of SIAM International Conference on Data Mining","author":"C W Tan","year":"2019","unstructured":"C. W. Tan, F. Petitjean, G. I. Webb. Elastic bands across the path: A new framework and method to lower bound DTW. In Proceedings of SIAM International Conference on Data Mining, Calgary, Canada, pp. 522\u2013530, 2019. DOI: https:\/\/doi.org\/10.1137\/1.9781611975673.59."},{"key":"1554_CR79","doi-asserted-by":"publisher","unstructured":"O. Gold, M. Sharir. Dynamic time warping and geometric edit distance: Breaking the quadratic barrier. ACM Transactions on Algorithms, vol. 14, no. 4, Article number 50, 2018. DOI: https:\/\/doi.org\/10.1145\/3230734.","DOI":"10.1145\/3230734"},{"key":"1554_CR80","volume-title":"UCI Machine Learning Repository","author":"M Kelly","year":"2017","unstructured":"M. Kelly, R. Longjohn, K. Nottingham. UCI Machine Learning Repository, [Online], Available, https:\/\/archive.ics.uci.edu\/, 2017."},{"key":"1554_CR81","first-page":"445","volume-title":"Proceedings of the 15th International Conference on Machine Learning","author":"F J Provost","year":"1998","unstructured":"F. J. Provost, T. Fawcett, R. Kohavi. The case against accuracy estimation for comparing induction algorithms. In Proceedings of the 15th International Conference on Machine Learning, Madison, USA, pp. 445\u2013453, 1998."},{"key":"1554_CR82","volume-title":"Foundations of Statistical Natural Language Processing","author":"C Manning","year":"1999","unstructured":"C. Manning, H. Sch\u00fctze. Foundations of Statistical Natural Language Processing, Cambridge, USA: MIT Press, 1999."},{"key":"1554_CR83","doi-asserted-by":"publisher","first-page":"10487","DOI":"10.1609\/aaai.v35i12.17255","volume-title":"Proceedings of the 35th AAAI Conference on Artificial Intelligence","author":"B C Xu","year":"2021","unstructured":"B. C. Xu, K. M. Ting, Y. Jiang. Isolation graph kernel. In Proceedings of the 35th AAAI Conference on Artificial Intelligence, pp. 10487\u201310495, 2021. DOI: https:\/\/doi.org\/10.1609\/aaai.v35i12.17255."},{"key":"1554_CR84","doi-asserted-by":"publisher","unstructured":"F. T. Liu, K. M. Ting, Z. H. Zhou. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data, vol. 6, no. 1, Article number 3, 2012. DOI: https:\/\/doi.org\/10.1145\/2133360.2133363.","DOI":"10.1145\/2133360.2133363"},{"key":"1554_CR85","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ICDM58522.2023.00077","volume-title":"Proceedings of IEEE International Conference on Data Mining","author":"H Xiang","year":"2023","unstructured":"H. Xiang, X. Zhang, M. Dras, A. Beheshti, W. Dou, X. Xu. Deep optimal isolation forest with genetic algorithm for anomaly detection. In Proceedings of IEEE International Conference on Data Mining, Shanghai, China, pp. 678\u2013687, 2023. DOI: https:\/\/doi.org\/10.1109\/ICDM58522.2023.00077."},{"key":"1554_CR86","first-page":"32142","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems","author":"S Han","year":"2022","unstructured":"S. Han, X. Hu, H. Huang, M. Jiang, Y. Zhao. ADBench: Anomaly detection benchmark. In Proceedings of the 36th International Conference on Neural Information Processing Systems, New Orleans, USA, pp. 32142\u201332159, 2022."},{"key":"1554_CR87","doi-asserted-by":"publisher","unstructured":"Y. Cao, Y. Ma, Y. Zhu, K. M. Ting. Revisiting streaming anomaly detection: Benchmark and evaluation. Artificial Intelligence Review, vol. 58, no. 1, Article number 8, 2025. DOI: https:\/\/doi.org\/10.1007\/s10462-024-10995-w.","DOI":"10.1007\/s10462-024-10995-w"},{"issue":"3","key":"1554_CR88","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1007\/S40745-021-00362-9","volume":"10","author":"D Samariya","year":"2023","unstructured":"D. Samariya, A. Thakkar. A comprehensive survey of anomaly detection algorithms. Annals of Data Science, vol. 10, no. 3, pp. 829\u2013850, 2023. DOI: https:\/\/doi.org\/10.1007\/S40745-021-00362-9.","journal-title":"Annals of Data Science"},{"issue":"2","key":"1554_CR89","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s10994-015-5507-y","volume":"100","author":"H Paulheim","year":"2015","unstructured":"H. Paulheim, R. Meusel. A decomposition of the outlier detection problem into a set of supervised learning problems. Machine Learning, vol. 100, no. 2, pp. 509\u2013531, 2015. DOI: https:\/\/doi.org\/10.1007\/s10994-015-5507-y.","journal-title":"Machine Learning"},{"key":"1554_CR90","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-030-33391-1_26","volume-title":"Proceedings of the 1st MICCAI Workshop on Domain Adaptation and Representation Transfer, and the 1st International Workshop on Medical Image Learning with Less Labels and Imperfect Data","author":"K Ouardini","year":"2019","unstructured":"K. Ouardini, H. Yang, B. Unnikrishnan, M. Romain, C. Garcin, H. Zenati, J. P. Campbell, M. F. Chiang, J. Kalpathy-Cramer, V. Chandrasekhar, P. Krishnaswamy, C. S. Foo. Towards practical unsupervised anomaly detection on retinal images. In Proceedings of the 1st MICCAI Workshop on Domain Adaptation and Representation Transfer, and the 1st International Workshop on Medical Image Learning with Less Labels and Imperfect Data, Shenzhen, China, pp. 225\u2013234, 2019. DOI: https:\/\/doi.org\/10.1007\/978-3-030-33391-1_26."},{"key":"1554_CR91","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2021.01.069","volume":"560","author":"T Hayashi","year":"2021","unstructured":"T. Hayashi, H. Fujita, A. Hernandez-Matamoros. Less complexity one-class classification approach using construction error of convolutional image transformation network. Information Sciences, vol. 560, pp. 217\u2013234, 2021. DOI: https:\/\/doi.org\/10.1016\/j.ins.2021.01.069.","journal-title":"Information Sciences"},{"key":"1554_CR92","unstructured":"C. Gini. On the measure of concentration with special reference to income and statistics. Colorado College Publication, General Series, no. 208, pp. 73\u201379, 1936."},{"key":"1554_CR93","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1613\/jair.1.15762","volume":"79","author":"Y Cao","year":"2024","unstructured":"Y. Cao, Y. Zhu, K. M. Ting, F. D. Salim, H. X. Li, L. Yang, G. Li. Detecting change intervals with isolation distributional kernel. Journal of Artificial Intelligence Research, vol. 79, pp. 273\u2013306, 2024. DOI: https:\/\/doi.org\/10.1613\/jair.1.15762.","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"9","key":"1554_CR94","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"D A Huffman","year":"1952","unstructured":"D. A. Huffman. A method for the construction of minimum-redundancy codes. Proceedings of the IRE, vol. 40, no. 9, pp. 1098\u20131101, 1952. DOI: https:\/\/doi.org\/10.1109\/JRPROC.1952.273898.","journal-title":"Proceedings of the IRE"},{"issue":"5","key":"1554_CR95","doi-asserted-by":"publisher","first-page":"5147","DOI":"10.1109\/TKDE.2022.3144914","volume":"35","author":"K M Ting","year":"2023","unstructured":"K. M. Ting, J. R. Wells, Y. Zhu. Point-set kernel clustering. IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 5, pp. 5147\u20135158, 2023. DOI: https:\/\/doi.org\/10.1109\/TKDE.2022.3144914.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1554_CR96","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1145\/3534678.3539323","volume-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"X Han","year":"2022","unstructured":"X. Han, Y. Zhu, K. M. Ting, D. C. Zhan, G. Li. Streaming hierarchical clustering based on point-set kernel. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington DC, USA, pp. 525\u2013533, 2022. DOI: https:\/\/doi.org\/10.1145\/3534678.3539323."},{"key":"1554_CR97","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1109\/ICDM58522.2023.00178","volume-title":"Proceedings of IEEE International Conference on Data Mining","author":"Z J Wang","year":"2023","unstructured":"Z. J. Wang, Y. Zhu, K. M. Ting. Distribution-based trajectory clustering. In Proceedings of IEEE International Conference on Data Mining, Shanghai, China, pp. 1379\u20131384, 2023. DOI: https:\/\/doi.org\/10.1109\/ICDM58522.2023.00178."},{"key":"1554_CR98","doi-asserted-by":"publisher","unstructured":"Y. Zhu, K. M. Ting. Kernel-based clustering via isolation distributional kernel. Information Systems, vol. 117, Article number 102212, 2023. DOI: https:\/\/doi.org\/10.1016\/J.IS.2023.102212.","DOI":"10.1016\/J.IS.2023.102212"},{"issue":"8","key":"1554_CR99","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1109\/TKDE.2017.2691702","volume":"29","author":"X Mu","year":"2017","unstructured":"X. Mu, K. M. Ting, Z. H. Zhou. Classification under streaming emerging new classes: A solution using completely-random trees. IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 8, pp. 1605\u20131618, 2017. DOI: https:\/\/doi.org\/10.1109\/TKDE.2017.2691702.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1554_CR100","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/ICDM.2019.00109","volume-title":"Proceedings of IEEE International Conference on Data Mining","author":"X Q Cai","year":"2019","unstructured":"X. Q. Cai, P. Zhao, K. M. Ting, X. Mu, Y. Jiang. Nearest neighbor ensembles: An effective method for difficult problems in streaming classification with emerging new classes. In Proceedings of IEEE International Conference on Data Mining, Beijing, China, pp. 970\u2013975, 2019. DOI: https:\/\/doi.org\/10.1109\/ICDM.2019.00109."},{"key":"1554_CR101","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1145\/3292500.3330830","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"B C Xu","year":"2019","unstructured":"B. C. Xu, K. M. Ting, Z. H. Zhou. Isolation set-kernel and its application to multi-instance learning. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, USA, pp. 941\u2013949, 2019. DOI: https:\/\/doi.org\/10.1145\/3292500.3330830."},{"key":"1554_CR102","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/ICDM51629.2021.00073","volume-title":"Proceedings of IEEE International Conference on Data Mining","author":"K M Ting","year":"2021","unstructured":"K. M. Ting, T. Washio, J. R. Wells, H. Zhang. Isolation kernel density estimation. In Proceedings of IEEE International Conference on Data Mining, Auckland, New Zealand, pp. 619\u2013628, 2021. DOI: https:\/\/doi.org\/10.1109\/ICDM51629.2021.00073."},{"issue":"2","key":"1554_CR103","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10115-022-01765-7","volume":"65","author":"K M Ting","year":"2023","unstructured":"K. M. Ting, T. Washio, J. Wells, H. Zhang, Y. Zhu. Isolation kernel estimators. Knowledge and Information Systems, vol. 65, no. 2, pp. 759\u2013787, 2023. DOI: https:\/\/doi.org\/10.1007\/s10115-022-01765-7.","journal-title":"Knowledge and Information Systems"},{"key":"1554_CR104","first-page":"41952","volume-title":"Proceedings of the 40th International Conference on Machine Learning","author":"H Zhang","year":"2023","unstructured":"H. Zhang, K. Zhang, K. M. Ting, Y. Zhu. Towards a persistence diagram that is robust to noise and varied densities. In Proceedings of the 40th International Conference on Machine Learning, Honolulu, USA, pp. 41952\u201341972, 2023."},{"issue":"10","key":"1554_CR105","doi-asserted-by":"publisher","first-page":"3614","DOI":"10.1109\/TPAMI.2020.2981604","volume":"43","author":"C Geng","year":"2021","unstructured":"C. Geng, S. J. Huang, S. Chen. Recent advances in open set recognition: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, no. 10, pp. 3614\u20133631, 2021. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2020.2981604.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1554_CR106","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/AIKE52691.2021.00013","volume-title":"Proceedings of the 4th International Conference on Artificial Intelligence and Knowledge Engineering","author":"A Mahdavi","year":"2021","unstructured":"A. Mahdavi, M. Carvalho. A survey on open set recognition. In Proceedings of the 4th International Conference on Artificial Intelligence and Knowledge Engineering, Laguna Hills, USA, pp. 37\u201344, 2021. DOI: https:\/\/doi.org\/10.1109\/AIKE52691.2021.00013."},{"key":"1554_CR107","unstructured":"M. Salehi, H. Mirzaei, D. Hendrycks, Y. Li, M. H. Rohban, M. Sabokrou. A unified survey on anomaly, novelty, open-set, and out of-distribution detection: Solutions and future challenges. Transactions on Machine Learning Research, vol. 2022, Article number 234, 2022."}],"container-title":["Machine Intelligence Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-025-1554-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11633-025-1554-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-025-1554-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T08:03:08Z","timestamp":1758960188000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11633-025-1554-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,6]]},"references-count":107,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1554"],"URL":"https:\/\/doi.org\/10.1007\/s11633-025-1554-4","relation":{},"ISSN":["2731-538X","2731-5398"],"issn-type":[{"value":"2731-538X","type":"print"},{"value":"2731-5398","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,6]]},"assertion":[{"value":"30 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declared that they have no conflicts of interest to this work.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations of conflict of interest"}}]}}