{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:05:32Z","timestamp":1766732732802,"version":"build-2065373602"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"publisher","award":["2021ZD0114200"],"award-info":[{"award-number":["2021ZD0114200"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61925202"],"award-info":[{"award-number":["61925202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013058","name":"Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["BE2022065-1","BE2022065-3"],"award-info":[{"award-number":["BE2022065-1","BE2022065-3"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tmc.2025.3545875","type":"journal-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T19:09:12Z","timestamp":1740596952000},"page":"6918-6933","source":"Crossref","is-referenced-by-count":1,"title":["Real-Time Abnormal Address Detection for Mobile Devices in Location-Based Services"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3682-4290","authenticated-orcid":false,"given":"Zhiqing","family":"Hong","sequence":"first","affiliation":[{"name":"Department of Computer Science, Rutgers University, Piscataway, NJ, USA"}]},{"given":"Heng","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, Beijing, China"}]},{"given":"Haotian","family":"Wang","sequence":"additional","affiliation":[{"name":"JD Logistics, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7885-3105","authenticated-orcid":false,"given":"Wenjun","family":"Lyu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Rutgers University, Piscataway, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1627-5503","authenticated-orcid":false,"given":"Yu","family":"Yang","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7739-7945","authenticated-orcid":false,"given":"Guang","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1180-8078","authenticated-orcid":false,"given":"Yunhuai","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6079-7053","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9307-8736","authenticated-orcid":false,"given":"Desheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Rutgers University, Piscataway, NJ, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2879933"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3141398"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3273411"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3351282"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3228259"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3198089"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3397536.3422254"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3557915.3560944"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403332"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615466"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3543873.3584647"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi5050065"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSP51882.2021.9408977"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3474717.3483986"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3474717.3483950"},{"article-title":"Deep anomaly detection using geometric transformations","year":"2018","author":"Golan","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3444690"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/614"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939687"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2980765.2980767"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"article-title":"Bidirectional LSTM-CRF models for sequence tagging","year":"2015","author":"Huang","key":"ref29"},{"key":"ref30","first-page":"23102","article-title":"COCO-LM: Correcting and contrasting text sequences for language model pretraining","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Meng"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.138"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.305"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525087"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3115\/1075096.1075134"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2028"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3659597"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858826"},{"article-title":"Llama: Open and efficient foundation language models","year":"2023","author":"Touvron","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3703155"},{"article-title":"Retrieval-augmented generation for large language models: A survey","year":"2023","author":"Gao","key":"ref43"},{"volume-title":"Modern Information Retrieval - The Concepts and Technology Behind Search","year":"2011","author":"Baeza-Yates","key":"ref44"},{"article-title":"Precision and recall for time series","year":"2018","author":"Tatbul","key":"ref45"},{"article-title":"MINILM: Deep self-attention distillation for task-agnostic compression of pre-trained transformers","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Wang","key":"ref46"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1181"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref49","first-page":"2873","article-title":"Recurrent neural network for text classification with multi-task learning","volume-title":"Proc. Int. Joint Conf. Artif. Intell.","author":"Liu"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2034"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403319"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/72.595879"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3557915.3560999"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref58","first-page":"582","article-title":"Support vector method for novelty detection","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Sch\u00f6lkopf"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"article-title":"Deep anomaly detection with outlier exposure","year":"2018","author":"Hendrycks","key":"ref60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.55"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1398"},{"article-title":"ALBERT: A lite BERT for self-supervised learning of language representations","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Lan","key":"ref63"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1506"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9513"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467132"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3007194"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3220720"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14778\/3626292.3626305"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614671"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679605"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3333944"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614724"},{"key":"ref74","first-page":"3421","article-title":"Neural chinese address parsing","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Li"},{"article-title":"Predicting completeness of unstructured shipping addresses using ensemble models","year":"2021","author":"Waradpande","key":"ref75"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3659596"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3331429"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3297115"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3301871"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3296501"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3328038"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11068893\/10904167.pdf?arnumber=10904167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T17:41:00Z","timestamp":1751996460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10904167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":77,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3545875","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}