{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:35:42Z","timestamp":1772120142856,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T00:00:00Z","timestamp":1763596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T00:00:00Z","timestamp":1763596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2024.07677.IACDC"],"award-info":[{"award-number":["2024.07677.IACDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2024.07677.IACDC"],"award-info":[{"award-number":["2024.07677.IACDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2024.07677.IACDC"],"award-info":[{"award-number":["2024.07677.IACDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2024.07677.IACDC"],"award-info":[{"award-number":["2024.07677.IACDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2024.07677.IACDC"],"award-info":[{"award-number":["2024.07677.IACDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2024.07677.IACDC"],"award-info":[{"award-number":["2024.07677.IACDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Detecting anomalies in Waste transportation networks is vital for uncovering illegal or unsafe activities, that can have serious environmental and regulatory consequences. Identifying anomalies in such networks presents a significant challenge due to the limited availability of labeled data and the subtle nature of illicit activities. Moreover, traditional anomaly detection methods relying solely on individual transaction data may overlook deeper, network-level irregularities that arise from complex interactions between entities, especially in the absence of labeled data. This study explores anomaly detection in a waste transport network using unsupervised learning, enhanced by limited supervision and enriched with network structure information. Initially, unsupervised models like Isolation Forest, K-Means, LOF, and Autoencoders were applied using statistical and graph-based features. These models detected outliers without prior labels. Later, information on a few confirmed anomalous users enabled weak supervision, guiding feature selection through statistical tests like Kolmogorov-Smirnov and Anderson-Darling. Results show that models trained on a reduced, graph-focused feature set improved anomaly detection, particularly under extreme class imbalance. Isolation Forest notably ranked known anomalies highly. Ego network visualizations supported these findings, demonstrating the value of integrating structural features and limited labels for identifying subtle, relational anomalies.<\/jats:p>","DOI":"10.1007\/s41109-025-00753-4","type":"journal-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T07:38:09Z","timestamp":1763624289000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network-based Anomaly Detection in Waste Transportation Data with Limited Supervision"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1456-0901","authenticated-orcid":false,"given":"Nirbhaya","family":"Shaji","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-7054","authenticated-orcid":false,"given":"Shazia","family":"Tabassum","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6852-8077","authenticated-orcid":false,"given":"Rita P.","family":"Ribeiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3357-1195","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Gama","sequence":"additional","affiliation":[]},{"given":"Joana","family":"Gorgulho","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Santana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,20]]},"reference":[{"key":"753_CR1","volume-title":"Outlier analysis","author":"CC Aggarwal","year":"2016","unstructured":"Aggarwal CC (2016) Outlier analysis, 2nd edn. Springer, New York, NY","edition":"2"},{"issue":"3","key":"753_CR2","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2014","unstructured":"Akoglu L, Tong H, Koutra D (2014) Graph-based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626\u2013688","journal-title":"Data Min Knowl Discov"},{"key":"753_CR3","doi-asserted-by":"crossref","unstructured":"Andrade T, Shaji N, Ribeiro RP, Gama J (2023) Pollution emission patterns of transportation in porto, portugal through network analysis. In: EPIA Conference on Artificial Intelligence, Springer, pp 215\u2013226","DOI":"10.1007\/978-3-031-49008-8_17"},{"key":"753_CR4","doi-asserted-by":"crossref","unstructured":"Bank D, Koenigstein N, Giryes R (2023) Autoencoders. Mach Learn for Data Sci Handbook: Data Min Knowl Discov Handbook 353\u2013374","DOI":"10.1007\/978-3-031-24628-9_16"},{"key":"753_CR5","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers in statistical data, 3rd edn. John Wiley & Sons, Chichester","edition":"3"},{"key":"753_CR6","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp 2008:P10008","journal-title":"J Stat Mech: Theory Exp"},{"key":"753_CR7","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp 93\u2013104","DOI":"10.1145\/342009.335388"},{"issue":"10","key":"753_CR8","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1038\/nprot.2008.100","volume":"3","author":"S Broh\u00e9e","year":"2008","unstructured":"Broh\u00e9e S, Faust K, Lima-Mendez G, Vanderstocken G, Van Helden J (2008) Network analysis tools: from biological networks to clusters and pathways. Nat Protoc 3(10):1616\u20131629","journal-title":"Nat Protoc"},{"key":"753_CR9","doi-asserted-by":"crossref","unstructured":"Br\u00f6hl T, Lehnertz K (2019) Centrality-based identification of important edges in complex networks. Chaos: An Interdiscip J of Nonlinear Sci 29(3)","DOI":"10.1063\/1.5081098"},{"issue":"2","key":"753_CR10","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1086\/421787","volume":"110","author":"RS Burt","year":"2004","unstructured":"Burt RS (2004) Structural holes and good ideas. Am J Sociol 110(2):349\u2013399","journal-title":"Am J Sociol"},{"issue":"3","key":"753_CR11","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surveys 41(3):15:1-15:58","journal-title":"ACM Comput Surveys"},{"key":"753_CR12","doi-asserted-by":"crossref","unstructured":"Cheng Z, Zou C, Dong J (2019) Outlier detection using isolation forest and local outlier factor. In: Proceedings of the conference on research in adaptive and convergent systems, pp 161\u2013168","DOI":"10.1145\/3338840.3355641"},{"key":"753_CR13","unstructured":"ELA (2024a) rights reserved. Ewc codes"},{"key":"753_CR14","unstructured":"ELA (2024b) rights reserved. Recovery and disposal codes"},{"issue":"2","key":"753_CR15","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s00355-011-0603-9","volume":"40","author":"P Emerson","year":"2013","unstructured":"Emerson P (2013) The original Borda count and partial voting. Soc Choice Welfare 40(2):353\u2013358","journal-title":"Soc Choice Welfare"},{"key":"753_CR16","doi-asserted-by":"crossref","unstructured":"Ghosh S, Pal A, Nag A, Sadhu S, Pati R (2017) Network anomaly detection using a fuzzy rule-based classifier. In: Computer, Communication and Electrical Technology, CRC Press, pp 61\u201365","DOI":"10.1201\/9781315400624-12"},{"issue":"4","key":"753_CR17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein M, Uchida S (2016) A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE 11(4):e0152173","journal-title":"PLoS ONE"},{"key":"753_CR18","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) Node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"issue":"1","key":"753_CR19","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan JA, Wong MA (1979) Algorithm as 136: a k-means clustering algorithm. J Royal Stat Soc Ser C (Applied Statistics) 28(1):100\u2013108","journal-title":"J Royal Stat Soc Ser C (Applied Statistics)"},{"key":"753_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of outliers","author":"DM Hawkins","year":"1980","unstructured":"Hawkins DM (1980) Identification of outliers. Springer, Dordrecht"},{"key":"753_CR21","unstructured":"Kipf T (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907"},{"issue":"6","key":"753_CR22","first-page":"90","volume":"1","author":"TM Kodinariya","year":"2013","unstructured":"Kodinariya TM, Makwana PR et al (2013) Review on determining number of cluster in k-means clustering. Int J 1(6):90\u201395","journal-title":"Int J"},{"key":"753_CR23","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp 413\u2013422 IEEE","DOI":"10.1109\/ICDM.2008.17"},{"issue":"253","key":"753_CR24","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/01621459.1951.10500769","volume":"46","author":"FJ Massey","year":"1951","unstructured":"Massey FJ (1951) The Kolmogorov-Smirnov test for goodness of fit. J Am Stat Assoc 46(253):68\u201378","journal-title":"J Am Stat Assoc"},{"key":"753_CR25","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1038\/nphys2162","volume":"8","author":"MEJ Newman","year":"2012","unstructured":"Newman MEJ (2012) Communities, modules and large-scale structure in networks. Nat Phys 8:25\u201331","journal-title":"Nat Phys"},{"key":"753_CR26","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"753_CR27","first-page":"582","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Adv Neural Inf Proc Syst (NIPS) 13:582\u2013588","journal-title":"Adv Neural Inf Proc Syst (NIPS)"},{"issue":"399","key":"753_CR28","first-page":"918","volume":"82","author":"FW Scholz","year":"1987","unstructured":"Scholz FW, Stephens MA (1987) K-sample Anderson-Darling tests. J Am Stat Assoc 82(399):918\u2013924","journal-title":"J Am Stat Assoc"},{"key":"753_CR29","doi-asserted-by":"crossref","unstructured":"Shaji N, Gama J, Ribeiro RP, Gomes P (2022) Bank statements to network features: extracting features out of time series using visibility graph. In: International Symposium on Intelligent Data Analysis, Springer, pp 278\u2013289","DOI":"10.1007\/978-3-031-01333-1_22"},{"issue":"9","key":"753_CR30","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s12243-020-00794-z","volume":"75","author":"S Tabassum","year":"2020","unstructured":"Tabassum S, Azad MA, Gama J (2020) Profiling high leverage points for detecting anomalous users in telecom data networks. Ann Telecommun 75(9):573\u2013581","journal-title":"Ann Telecommun"},{"key":"753_CR31","doi-asserted-by":"crossref","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications","DOI":"10.1017\/CBO9780511815478"},{"key":"753_CR32","unstructured":"Wong W-K, Moore A, Cooper G, Wagner M (2002) Rule-based anomaly pattern detection for detecting disease outbreaks. In: AAAI\/IAAI, pp 217\u2013223"},{"key":"753_CR33","doi-asserted-by":"publisher","first-page":"174830262210781","DOI":"10.1177\/17483026221078111","volume":"16","author":"H Xu","year":"2002","unstructured":"Xu H, Zhang L, Li P, Zhu F (2002) Outlier detection algorithm based on k-nearest neighbors-local outlier factor. J Algorithms Comput Technol 16:17483026221078112","journal-title":"J Algorithms Comput Technol"},{"key":"753_CR34","doi-asserted-by":"publisher","first-page":"2870","DOI":"10.1109\/TIFS.2023.3272731","volume":"18","author":"Z Yuan","year":"2023","unstructured":"Yuan Z, Shao M, Yan Q (2023) Motif-level anomaly detection in dynamic graphs. IEEE Trans Inf Forensics Secur 18:2870\u20132882","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"753_CR35","first-page":"912","volume":"14","author":"H Zardi","year":"2023","unstructured":"Zardi H, Alrajhi H (2023) Anomaly discover: a new community-based approach for detecting anomalies in social networks. Int J Adv Comput Sci Appl 14(4):912\u2013920","journal-title":"Int J Adv Comput Sci Appl"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00753-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00753-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00753-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T07:38:16Z","timestamp":1763624296000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-025-00753-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,20]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["753"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00753-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7261398\/v1","asserted-by":"object"}]},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,20]]},"assertion":[{"value":"31 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"60"}}