{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T02:45:51Z","timestamp":1777344351219,"version":"3.51.4"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Project of China","award":["2020AAA0104001"],"award-info":[{"award-number":["2020AAA0104001"]}]},{"name":"Zhejiang Lab","award":["2019KD0AD011005"],"award-info":[{"award-number":["2019KD0AD011005"]}]},{"name":"Zhejiang Provincial Science and Technology Planning Key Project of China","award":["2021C03129"],"award-info":[{"award-number":["2021C03129"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2022,8,31]]},"abstract":"<jats:p>With the popularization of visual object tracking (VOT), more and more trajectory data are obtained and have begun to gain widespread attention in the fields of mobile robots, intelligent video surveillance, and the like. How to clean the anomalous trajectories hidden in the massive data has become one of the research hotspots. Anomalous trajectories should be detected and cleaned before the trajectory data can be effectively used. In this article, a Trajectory Evaluator by Sub-tracks (TES) for detecting VOT-based anomalous trajectory is proposed. Feature of Anomalousness is defined and described as the Eigenvector of classifier to filter Track Lets anomalous trajectory and IDentity Switch anomalous trajectory, which includes Feature of Anomalous Pose and Feature of Anomalous Sub-tracks (FAS). In the comparative experiments, TES achieves better results on different scenes than state-of-the-art methods. Moreover, FAS makes better performance than point flow, least square method fitting and Chebyshev Polynomial Fitting. It is verified that TES is more accurate and effective and is conducive to the sub-tracks trajectory data analysis.<\/jats:p>","DOI":"10.1145\/3490032","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T20:51:00Z","timestamp":1641675060000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Trajectory Evaluator by Sub-tracks for Detecting VOT-based Anomalous Trajectory"],"prefix":"10.1145","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4678-1936","authenticated-orcid":false,"given":"Fei","family":"Gao","sequence":"first","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, Zhejiang Province, China"}]},{"given":"Jiada","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, Zhejiang Province, China"}]},{"given":"Yisu","family":"Ge","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, Zhejiang Province, China"}]},{"given":"Jianwen","family":"Shao","sequence":"additional","affiliation":[{"name":"Zhejiang Institute of Metrology, Hangzhou, Zhejiang Province, China"}]},{"given":"Shufang","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, Zhejiang Province, China"}]},{"given":"Libo","family":"Weng","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, Zhejiang Province, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3051126"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9619-1"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2857489"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2547641"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-006-0058-5"},{"key":"e_1_3_1_8_2","unstructured":"IEEE Access"},{"issue":"2","key":"e_1_3_1_9_2","first-page":"119","article-title":"Testing for revealing of data structure based on the hybrid approach","volume":"7","author":"Mosorov Volodymyr","year":"2017","unstructured":"Volodymyr Mosorov, Taras Panskyi, and Sebastian Biedron. 2017. Testing for revealing of data structure based on the hybrid approach. Informatics Control Meas. Econ. Environ. Prot. 7, 2 (2017), 119\u2013122. DOI:https:\/\/doi.org\/10.5604\/01.3001.0010.4853","journal-title":"Informatics Control Meas. Econ. Environ. Prot."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-015-1192-x"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2997656"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497422"},{"key":"e_1_3_1_13_2","first-page":"1","volume-title":"Proceedings of the 14th International Conference on Information Fusion","author":"Laxhammar Rikard","year":"2011","unstructured":"Rikard Laxhammar and G\u00f6ran Falkman. 2011. Sequential conformal anomaly detection in trajectories based on Hausdorff distance. In Proceedings of the 14th International Conference on Information Fusion. 1\u20138."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.172"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2899179"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0400-6"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2018.8486597"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00477"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19010084"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2014.6958916"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351493"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_51"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20870-7_23"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.5555\/2026851.2026861"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.79"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247546"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2014.0238"},{"key":"e_1_3_1_28_2","volume-title":"Proceedings of the 7th International Conference on Advanced Computing.","author":"Ranjith R.","year":"2016","unstructured":"R. Ranjith, J. Joshan Athanesious, and V. Vaidehi. 2016. Anomaly detection using DBSCAN clustering technique for traffic video surveillance. In Proceedings of the 7th International Conference on Advanced Computing. 1\u20136. DOI:https:\/\/doi.org\/10.1109\/ICoAC.2015.7562795"},{"issue":"5","key":"e_1_3_1_29_2","doi-asserted-by":"crossref","first-page":"230","DOI":"10.3788\/IRLA201746.0528001","article-title":"Trajectory outlier detection based on DBSCAN clustering algorithm","volume":"46","author":"Zhou Peipei","year":"2017","unstructured":"Peipei Zhou, Qinghai Ding, Luo Haibo, and Xinglin Hou. 2017. Trajectory outlier detection based on DBSCAN clustering algorithm. Infrared Laser Eng. 46, 5 (2017), 230\u2013237.","journal-title":"Infrared Laser Eng"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi7010025"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2733381"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500658"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2019.8909844"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9370-y"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2005599"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3490032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:22Z","timestamp":1750188682000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8,31]]}},"alternative-id":["10.1145\/3490032"],"URL":"https:\/\/doi.org\/10.1145\/3490032","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"2021-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}