{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:11:13Z","timestamp":1743099073149,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031347757"},{"type":"electronic","value":"9783031347764"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-34776-4_29","type":"book-chapter","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T09:03:04Z","timestamp":1687770184000},"page":"559-570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identification of Abnormal Behavior in Activities of Daily Life Using Novelty Detection"],"prefix":"10.1007","author":[{"given":"Mauricio","family":"Freitas","sequence":"first","affiliation":[]},{"given":"Vinicius","family":"de Aquino Piai","sequence":"additional","affiliation":[]},{"given":"Rudimar","family":"Dazzi","sequence":"additional","affiliation":[]},{"given":"Raimundo","family":"Teive","sequence":"additional","affiliation":[]},{"given":"Wemerson","family":"Parreira","sequence":"additional","affiliation":[]},{"given":"Anita","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Ivan Miguel","family":"Pires","sequence":"additional","affiliation":[]},{"given":"Valderi Reis Quietinho","family":"Leithardt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,27]]},"reference":[{"issue":"4","key":"29_CR1","first-page":"3970","volume":"12","author":"AA Abdulhussein","year":"2022","unstructured":"Abdulhussein, A.A., Hassen, O.A., Gupta, C., Virmani, D., Nair, A., Rani, P.: Health monitoring catalogue based on human activity classification using machine learning. Int. J. Electr. Comput. Eng. 12(4), 3970 (2022)","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1016\/j.gaitpost.2018.04.012","volume":"62","author":"SA Acu\u00f1a","year":"2018","unstructured":"Acu\u00f1a, S.A., Tyler, M.E., Danilov, Y.P., Thelen, D.G.: Abnormal muscle activation patterns are associated with chronic gait deficits following traumatic brain injury. Gait Posture 62, 510\u2013517 (2018). https:\/\/doi.org\/10.1016\/j.gaitpost.2018.04.012","journal-title":"Gait Posture"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.artmed.2019.01.005","volume":"94","author":"D Arifoglu","year":"2019","unstructured":"Arifoglu, D., Bouchachia, A.: Detection of abnormal behaviour for dementia sufferers using Convolutional Neural Networks. Artif. Intell. Med. 94, 88\u201395 (2019)","journal-title":"Artif. Intell. Med."},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Bozdog, I.A., et al.: Human behavior and anomaly detection using machine learning and wearable sensors. In: 2021 IEEE 17th International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 383\u2013390. IEEE (2021)","DOI":"10.1109\/ICCP53602.2021.9733684"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Budiarto, E.H., Permanasari, A.E., Fauziati, S.: Unsupervised anomaly detection using K-means, local outlier factor and one class SVM. In: 2019 5th International Conference on Science and Technology (ICST), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ICST47872.2019.9166366"},{"key":"29_CR6","doi-asserted-by":"publisher","unstructured":"Cesconetto, J., Augusto Silva, L., Bortoluzzi, F., Navarro-C\u00e1ceres, M., Zeferino, C.A., Leithardt, V.R.Q.: PRIPRO\u2014privacy profiles: user profiling management for smart environments. Electronics 9, 1519 (2020). https:\/\/doi.org\/10.3390\/electronics9091519","DOI":"10.3390\/electronics9091519"},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","DOI":"10.5812\/modernc.94661","volume":"16","author":"M Erfanmanesh","year":"2019","unstructured":"Erfanmanesh, M., Tahayori, H., Visconti, A.: Elderly action prediction and anomalous activity detection in smart homes through profiling residents\u2019 behavior. Mod. Care J. 16(3), e94661 (2019). https:\/\/doi.org\/10.5812\/modernc.94661","journal-title":"Mod. Care J."},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3390\/electron-ics9010180","volume":"9","author":"JM Ferreira","year":"2020","unstructured":"Ferreira, J.M., et al.: Activities of daily living and environment recognition using mobile devices: a comparative study. Electronics 9, 180 (2020). https:\/\/doi.org\/10.3390\/electron-ics9010180","journal-title":"Electronics"},{"key":"29_CR9","unstructured":"Foti, D., Koketsu, J.S.: Activities of daily living. Pedretti\u2019s Occup. Ther. Pract. Skills Phys. Dysfunction 7, 157\u2013232 (2013)"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Fouquet, K., Faraut, G., Lesage, J.-J.: Model-based approach for anomaly detection in smart home inhabitant daily life. In: 2021 American Control Conference (ACC), pp. 3596\u20133601. IEEE (2021)","DOI":"10.23919\/ACC50511.2021.9483053"},{"issue":"6","key":"29_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0497-2","volume":"40","author":"J Guo","year":"2016","unstructured":"Guo, J., Zhou, X., Sun, Y., Ping, G., Zhao, G., Li, Z.: Smartphone-based patients\u2019 activity recognition by using a self-learning scheme for medical monitoring. J. Med. Syst. 40(6), 1\u201314 (2016). https:\/\/doi.org\/10.1007\/s10916-016-0497-2","journal-title":"J. Med. Syst."},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Jin, B., Chen, Y., Li, D., Poolla, K., Sangiovanni-Vincentelli, A.: A one-class support vector machine calibration method for time series change point detection. In: 2019 IEEE International Conference on Prognostics and Health Management (ICPHM), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ICPHM.2019.8819385"},{"key":"29_CR13","first-page":"1529","volume":"10","author":"V Leithardt","year":"2013","unstructured":"Leithardt, V., et al.: A privacy taxonomy for the management of ubiquitous environments. J. Commun. Comput. 10, 1529\u20131553 (2013)","journal-title":"J. Commun. Comput."},{"key":"29_CR14","unstructured":"Leithardt, V.R., et al.: Mobile architecture for identifying users in ubiquitous environments focused on Percontrol. In: The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM, pp. 145\u2013151 (2013)"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"11","DOI":"10.5383\/JUSPN.10.01.002","volume":"10","author":"VR Leithardt","year":"2018","unstructured":"Leithardt, V.R., et al.: Mechanism for privacy management based on data history (UbiPri-His). J. Ubiquit. Syst. Pervasive Netw. 10, 11\u201319 (2018)","journal-title":"J. Ubiquit. Syst. Pervasive Netw."},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"21","DOI":"10.5383\/JUSPN.05.02.004","volume":"5","author":"VR Leithardt","year":"2014","unstructured":"Leithardt, V.R., Nunes, D., Rossetto, A.G., Rolim, C.O., Geyer, C.F., Silva, J.S.: Privacy management solution in ubiquitous environments using percontrol. J. Ubiquit. Syst. Pervasive Netw. 5, 21\u201328 (2014)","journal-title":"J. Ubiquit. Syst. Pervasive Netw."},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Mshali, H., Lemlouma, T., Magoni, D.: Analysis of dependency evaluation models for eHealth services. In: 2014 IEEE Global Communications Conference, Austin, TX, USA, pp. 2429\u20132435. IEEE (2014)","DOI":"10.1109\/GLOCOM.2014.7037172"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Ouafae, B., Oumaima, L., Mariam, R., Abdelouahid, L.: Novelty detection review state of art and discussion of new innovations in the main application domains. In: 2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/IRASET48871.2020.9092147"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"6986","DOI":"10.3390\/s21216986","volume":"21","author":"IM Pires","year":"2021","unstructured":"Pires, I.M., et al.: Mobile 5P-medicine approach for cardiovascular patients. Sensors 21, 6986 (2021). https:\/\/doi.org\/10.3390\/s21216986","journal-title":"Sensors"},{"key":"29_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106628","volume":"33","author":"IM Pires","year":"2020","unstructured":"Pires, I.M., Garcia, N.M., Zdravevski, E., Lameski, P.: Activities of daily living with motion: a dataset with accelerometer, magnetometer and gyroscope data from mobile devices. Data Brief 33, 106628 (2020). https:\/\/doi.org\/10.1016\/j.dib.2020.106628","journal-title":"Data Brief"},{"key":"29_CR21","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1038\/s41597-022-01213-9","volume":"9","author":"IM Pires","year":"2022","unstructured":"Pires, I.M., Garcia, N.M., Zdravevski, E., Lameski, P.: Daily motionless activities: a dataset with accelerometer, magnetometer, gyroscope, environment, and GPS data. Sci Data 9, 105 (2022). https:\/\/doi.org\/10.1038\/s41597-022-01213-9","journal-title":"Sci Data"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Saha, S.S., Rahman, S., Rasna, M.J., Mahfuzul Islam, A.K.M., Rahman Ahad, Md.A.: DU-MD: an open-source human action dataset for ubiquitous wearable sensors. In: 2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), Kitakyushu, Japan, pp. 567\u2013572. IEEE (2018)","DOI":"10.1109\/ICIEV.2018.8641051"},{"issue":"1","key":"29_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s42979-020-00418-2","volume":"2","author":"SW Yahaya","year":"2020","unstructured":"Yahaya, S.W., Lotfi, A., Mahmud, M.: Detecting anomaly and its sources in activities of daily living. SN Comput. Sci. 2(1), 14 (2020). https:\/\/doi.org\/10.1007\/s42979-020-00418-2","journal-title":"SN Comput. Sci."},{"key":"29_CR24","unstructured":"Ageing and health. https:\/\/www.who.int\/news-room\/fact-sheets\/detail\/ageing-and-health. Accessed 5 Aug 2020"},{"key":"29_CR25","unstructured":"10 facts on ageing and health. https:\/\/www.who.int\/news-room\/fact-sheets\/detail\/10-facts-on-ageing-and-health. Accessed 2 Sept 2022"},{"key":"29_CR26","unstructured":"The Top 10 Most Common Chronic Diseases for Older Adults. https:\/\/www.ncoa.org\/article\/the-top-10-most-common-chronic-conditions-in-older-adults. Accessed 2 Sept 2022"},{"key":"29_CR27","unstructured":"Ageing and disability: United Nations Enable. https:\/\/www.un.org\/development\/desa\/disabilities\/disability-and-ageing.html. Accessed 2 Sept 2022"},{"key":"29_CR28","unstructured":"eHealth Monitoring Open Data Project. SourceForge. https:\/\/sourceforge.net\/projects\/ehealthmonitoringproject\/. Accessed 2 Sept 2022"},{"key":"29_CR29","unstructured":"Welcome to CASAS. http:\/\/casas.wsu.edu\/datasets\/. Accessed 2 Sept 2022"},{"key":"29_CR30","unstructured":"DaLiAc: Daily Life Activities. https:\/\/www.mad.tf.fau.de\/research\/activitynet\/daliacdaily-life-activities\/. Accessed 2 Sept 2022"},{"key":"29_CR31","unstructured":"UCI Machine Learning Repository: Activities of Daily Living (ADLs) Recognition Using Binary Sensors Data Set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/Activities+of+Daily+Living+(ADLs)+Recognition+Using+Binary+Sensors. Accessed 2 Sept 2022"},{"issue":"5","key":"29_CR32","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TCYB.2014.2340433","volume":"45","author":"Y Xiao","year":"2015","unstructured":"Xiao, Y., Wang, H., Xu, W.: Parameter selection of Gaussian kernel for one-class SVM. IEEE Trans. Cybern. 45(5), 941\u2013953 (2015)","journal-title":"IEEE Trans. Cybern."},{"key":"29_CR33","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.compeleceng.2017.09.028","volume":"65","author":"X Zou","year":"2018","unstructured":"Zou, X., Cao, J., Guo, Q., Wen, T.: A novel network security algorithm based on improved support vector machine from smart city perspective. Comput. Electr. Eng. 65, 67\u201378 (2018)","journal-title":"Comput. Electr. Eng."},{"issue":"14","key":"29_CR34","doi-asserted-by":"publisher","first-page":"3098","DOI":"10.3390\/s19143098","volume":"19","author":"LA Silva","year":"2019","unstructured":"Silva, L.A., Leithardt, V.R.Q., Rolim, C.O., Gonz\u00e1lez, G.V., Geyer, C.F.R., Silva, J.S.: PRISER: managing notification in multiples devices with data privacy support. Sensors 19(14), 3098 (2019). https:\/\/doi.org\/10.3390\/s19143098","journal-title":"Sensors"},{"key":"29_CR35","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-031-14859-0_7","volume-title":"New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence: The DITTET 2022 Collection","author":"VA Apolin\u00e1rio","year":"2023","unstructured":"Apolin\u00e1rio, V.A., Dal Bianco, G., Duarte, D., Leithardt, V.R.Q.: Exploring feature extraction to\u00a0vulnerability prediction problem. In: de la Iglesia, D.H., de Paz, J.F., Santana, A.J., Rivero, L. (eds.) New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence: The DITTET 2022 Collection, pp. 79\u201390. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-14859-0_7"},{"key":"29_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-50423-6_9","volume-title":"Computational Science \u2013 ICCS 2020","author":"J Klikowski","year":"2020","unstructured":"Klikowski, J., Wo\u017aniak, M.: Employing one-class SVM classifier ensemble for imbalanced data stream classification. In: Krzhizhanovskaya, V.V., et al. (eds.) ICCS 2020. LNCS, vol. 12140, pp. 117\u2013127. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50423-6_9"},{"issue":"1","key":"29_CR37","doi-asserted-by":"publisher","first-page":"173","DOI":"10.3390\/electron-ics9010173","volume":"9","author":"A Khraisat","year":"2020","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., Alazab, A.: Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine. Electronics 9(1), 173 (2020). https:\/\/doi.org\/10.3390\/electron-ics9010173","journal-title":"Electronics"},{"key":"29_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/bdcc5010001","volume":"5","author":"O Alghushairy","year":"2021","unstructured":"Alghushairy, O., Alsini, R., Soule, T., Ma, X.: A review of local outlier factor algorithms for outlier detection in big data streams. Big Data Cogn. Comput. 5, 1 (2021). https:\/\/doi.org\/10.3390\/bdcc5010001","journal-title":"Big Data Cogn. Comput."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-34776-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T09:08:31Z","timestamp":1687770511000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-34776-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031347757","9783031347764"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-34776-4_29","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiQuitous","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pittsburgh, PA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiquitous2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobiquitous.eai-conferences.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7.4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}