{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T01:12:49Z","timestamp":1768093969426,"version":"3.49.0"},"reference-count":92,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2021,4,30]]},"abstract":"<jats:p>\n            This article introduces two new problems related to trajectory outlier detection: (1)\n            <jats:italic>group trajectory outlier (GTO) detection<\/jats:italic>\n            and (2)\n            <jats:italic>deviation point detection<\/jats:italic>\n            for both individual and group of trajectory outliers. Five algorithms are proposed for the first problem by adapting\n            <jats:italic>DBSCAN<\/jats:italic>\n            ,\n            <jats:italic>k nearest neighbors (kNN)<\/jats:italic>\n            , and\n            <jats:italic>feature selection (FS)<\/jats:italic>\n            .\n            <jats:italic>DBSCAN-GTO<\/jats:italic>\n            first applies\n            <jats:italic>DBSCAN<\/jats:italic>\n            to derive the\n            <jats:italic>micro clusters<\/jats:italic>\n            , which are considered as potential candidates. A pruning strategy based on density computation measure is then suggested to find the group of trajectory outliers.\n            <jats:italic>kNN-GTO<\/jats:italic>\n            recursively derives the trajectory candidates from the individual trajectory outliers and prunes them based on their density. The overall process is repeated for all individual trajectory outliers. FS-GTO considers the set of individual trajectory outliers as the set of all features, while the FS process is used to retrieve the group of trajectory outliers. The proposed algorithms are improved by incorporating ensemble learning and high-performance computing during the detection process. Moreover, we propose a general two-phase-based algorithm for detecting the deviation points, as well as a version for graphic processing units implementation using sliding windows. Experiments on a real trajectory dataset have been carried out to demonstrate the performance of the proposed approaches. The results show that they can efficiently identify useful patterns represented by group of trajectory outliers, deviation points, and that they outperform the baseline group detection algorithms.\n          <\/jats:p>","DOI":"10.1145\/3425867","type":"journal-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T18:27:49Z","timestamp":1612981669000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Trajectory Outlier Detection"],"prefix":"10.1145","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9342-8759","authenticated-orcid":false,"given":"Youcef","family":"Djenouri","sequence":"first","affiliation":[{"name":"SINTEF Digital, Oslo, Norway"}]},{"given":"Djamel","family":"Djenouri","sequence":"additional","affiliation":[{"name":"University of the West of England, United Kingdom"}]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"HVL, Bergen, Norway"}]}],"member":"320","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101936"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1111-8"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2013.6641405"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2528984"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161602"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2453975"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744419"},{"key":"e_1_2_1_9_1","volume-title":"A fast and recursive algorithm for clustering large datasets with k-medians. Computational Statistics 8 Data Analysis 56, 6","author":"Cardot Herv\u00e9","year":"2012"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00949659608811772"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 173--189","author":"Chalapathy Raghavendra","year":"2018"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2238531"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2614680"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281219"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 169--176","author":"Das Kaustav"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1601966.1601989"},{"key":"e_1_2_1_17_1","volume-title":"C","author":"Dernoncourt David","year":"2014"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311950"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891933"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893124"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3836"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.020"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 7th International Symposium on Bioinformatics Research and Applications.","volume":"13","author":"Eblen John D."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining. 226--231","author":"Ester Martin","year":"1996"},{"key":"e_1_2_1_25_1","volume-title":"Stochastic gradient boosting. Computational Statistics 8 Data Analysis 38, 4","author":"Friedman Jerome H.","year":"2002"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871716"},{"key":"e_1_2_1_27_1","volume-title":"Gibbs distributions, and the Bayesian restoration of images. In Readings in Computer Vision","author":"Geman Stuart"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.2795241"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2012.6338627"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TSMCA.2008.2007977","article-title":"Gait feature subset selection by mutual information","volume":"39","author":"Guo Baofeng","year":"2008","journal-title":"IEEE Transactions on Systems, MAN, and Cybernetics-part a: Systems and Humans"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems. 507--514","author":"He Xiaofei","year":"2006"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2011.2178037"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2727143"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the IEEE International Conference on Electro\/Information Technology. IEEE, 373--378","author":"Karbab Elmouatezbillah"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2018.00029"},{"key":"e_1_2_1_37_1","volume-title":"Rendell","author":"Kira Kenji","year":"1992"},{"key":"e_1_2_1_38_1","first-page":"1","article-title":"LoTAD: Long-term traffic anomaly detection based on crowdsourced bus trajectory data","volume":"21","author":"Kong Xiangjie","year":"2017","journal-title":"World Wide Web"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops. IEEE Computer Society, 209--214","author":"Laidi Roufaida","year":"2018"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1175\/MWR-D-12-00254.1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497422"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247546"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866364"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136625"},{"key":"e_1_2_1_45_1","first-page":"1","article-title":"Weighted outlier detection of high-dimensional categorical data using feature grouping","volume":"99","author":"Li Junli","year":"2018","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"e_1_2_1_46_1","volume-title":"Multi-view low-rank analysis with applications to outlier detection. ACM Transactions on Knowledge Discovery from Data 12, 3","author":"Li Sheng","year":"2018"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2720635"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525333"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEE.2013.00042"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55753-3_15"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975321.8"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2744619"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2018.03.007"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458288"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the 20th International Conference on International Conference on Machine Learning.","volume":"3","author":"Moore Andrew","year":"2003"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2262376"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the 23rd National Conference on Artificial intelligence.","volume":"2","author":"Nie Feiping","year":"2008"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2899906"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335437"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/3024719.3024758"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2727281"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2007.890733"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2561288"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887119"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-150764"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203246"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.08.010"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.206"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-017-5686-9"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.11.021"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132933"},{"key":"e_1_2_1_74_1","volume-title":"Proceedings of the 14th International Conference on Artificial Intelligence and Statistics. 789--797","author":"Xiong Liang","year":"2011"},{"key":"e_1_2_1_75_1","volume-title":"Schneider","author":"Xiong Liang","year":"2011"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3013527"},{"key":"e_1_2_1_77_1","first-page":"1","article-title":"Trajectory outlier detection approach based on common slices sub-sequence","volume":"48","author":"Yu Qingying","year":"2017","journal-title":"Applied Intelligence"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811268"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623735"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030127"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2346496.2346521"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.02.020"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273641"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2743025"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007741"},{"key":"e_1_2_1_86_1","volume-title":"Proceedings of the IEEE International Conference on Big Data. 530--535","author":"Zhou Xibo"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2815678"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93034-3_44"},{"key":"e_1_2_1_89_1","volume-title":"Proceedings of the International Conference on Web Information Systems Engineering. Springer, 16--30","author":"Guanfeng Liu Zhao Lei An Liu","year":"2015"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0400-6"},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the 23rd AAAI Conference on Artificial Intelligence.","volume":"8","author":"Ziebart Brian D."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487676"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3425867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:24Z","timestamp":1750195464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425867"}},"subtitle":["New Problems and Solutions for Smart Cities"],"short-title":[],"issued":{"date-parts":[[2021,2,10]]},"references-count":92,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4,30]]}},"alternative-id":["10.1145\/3425867"],"URL":"https:\/\/doi.org\/10.1145\/3425867","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,10]]},"assertion":[{"value":"2019-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}