{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:15:13Z","timestamp":1766733313887,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1849238, 1932223, 1951890, 1952096, 2003874, 2047822"],"award-info":[{"award-number":["1849238, 1932223, 1951890, 1952096, 2003874, 2047822"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1145\/3557915.3560999","type":"proceedings-article","created":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:11:25Z","timestamp":1669162285000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["FastAddr"],"prefix":"10.1145","author":[{"given":"Zhiqing","family":"Hong","sequence":"first","affiliation":[{"name":"Rutgers University and JD Logistics, Beijing, China"}]},{"given":"Heng","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, Beijing, China"}]},{"given":"Haotian","family":"Wang","sequence":"additional","affiliation":[{"name":"JD Logistics, Beijing, China"}]},{"given":"Wenjun","family":"Lyu","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[{"name":"Lehigh University"}]},{"given":"Guang","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University"}]},{"given":"Yunhuai","family":"Liu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Suzhou, China"}]},{"given":"Desheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Rutgers University"}]}],"member":"320","published-online":{"date-parts":[[2022,11,22]]},"reference":[{"volume-title":"Abnormal address in E-commerce","year":"2021","key":"e_1_3_2_1_1_1","unstructured":"2021. Abnormal address in E-commerce. 2021. http:\/\/finance.china.com.cn\/roll\/20211102\/5685321.shtml."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Gaode Maps. 2022. https:\/\/ditu.amap.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Ribeiro-Neto","author":"Baeza-Yates Ricardo A.","year":"2011","unstructured":"Ricardo A. Baeza-Yates and Berthier A. Ribeiro-Neto. 2011. Modern Information Retrieval - the concepts and technology behind search, Second edition."},{"key":"e_1_3_2_1_4_1","series-title":"Time Series Data","volume-title":"Lozano","author":"Bl\u00e1zquez-Garc\u00eda Ane","year":"2021","unstructured":"Ane Bl\u00e1zquez-Garc\u00eda, Angel Conde, Usue Mori, and Jose A. Lozano. 2021. A Review on Outlier\/Anomaly Detection in Time Series Data. ACM Comput. Surv. 54, 3, Article 56 (April 2021), 33 pages."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"key":"e_1_3_2_1_8_1","volume-title":"ICML'20","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In ICML'20. PMLR, 1597--1607."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yudong Chen Xin Wang Miao Fan Jizhou Huang Shengwen Yang and Wenwu Zhu. 2021. Curriculum Meta-Learning for Next POI Recommendation. ACM 2692--2702.","DOI":"10.1145\/3447548.3467132"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","volume":"1","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). Association for Computational Linguistics, 4171--4186."},{"key":"e_1_3_2_1_12_1","volume-title":"NSDI'21)","author":"Ding Yi","year":"2021","unstructured":"Yi Ding, Ling Liu, Yu Yang, Yunhuai Liu, Desheng Zhang, and Tian He. 2021. From Conception to Retirement: a Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild. In NSDI'21). 859--872."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.595879"},{"key":"e_1_3_2_1_14_1","unstructured":"Bowen Du Chuanren Liu Wenjun Zhou Zhenshan Hou and Hui Xiong. 2016. Catch me if you can: Detecting pickpocket suspects from large-scale transit records. In ACM SIGKDD. 87--96."},{"key":"e_1_3_2_1_15_1","volume-title":"Deep anomaly detection using geometric transformations. arXiv preprint arXiv:1805.10917","author":"Golan Izhak","year":"2018","unstructured":"Izhak Golan and Ran El-Yaniv. 2018. Deep anomaly detection using geometric transformations. arXiv preprint arXiv:1805.10917 (2018)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474717.3483950"},{"key":"e_1_3_2_1_17_1","volume-title":"Deep anomaly detection with outlier exposure. arXiv preprint arXiv:1812.04606","author":"Hendrycks Dan","year":"2018","unstructured":"Dan Hendrycks, Mantas Mazeika, and Thomas Dietterich. 2018. Deep anomaly detection with outlier exposure. arXiv preprint arXiv:1812.04606 (2018)."},{"key":"e_1_3_2_1_18_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_20_1","volume-title":"Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991 (2015)."},{"key":"e_1_3_2_1_21_1","volume-title":"PRADO: Projection Attention Networks for Document Classification On-Device","author":"Kaliamoorthi Prabhu","year":"2019","unstructured":"Prabhu Kaliamoorthi, Sujith Ravi, and Zornitsa Kozareva. 2019. PRADO: Projection Attention Networks for Document Classification On-Device. In EMNLP-IJCNLP. Association for Computational Linguistics, 5012--5021."},{"key":"e_1_3_2_1_22_1","volume-title":"Outlier detection for text data: An extended version. arXiv preprint arXiv:1701.01325","author":"Kannan Ramakrishnan","year":"2017","unstructured":"Ramakrishnan Kannan, Hyenkyun Woo, Charu C Aggarwal, and Haesun Park. 2017. Outlier detection for text data: An extended version. arXiv preprint arXiv:1701.01325 (2017)."},{"volume-title":"Convolutional Neural Networks for Sentence Classification","author":"Kim Yoon","key":"e_1_3_2_1_23_1","unstructured":"Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. In EMNLP. Association for Computational Linguistics, 1746--1751."},{"key":"e_1_3_2_1_24_1","volume-title":"Recurrent Convolutional Neural Networks for Text Classification. In AAAI'15","author":"Lai Siwei","year":"2015","unstructured":"Siwei Lai, Liheng Xu, Kang Liu, and Jun Zhao. 2015. Recurrent Convolutional Neural Networks for Text Classification. In AAAI'15 (Austin, Texas) (AAAI'15). AAAI Press, 2267--2273."},{"key":"e_1_3_2_1_25_1","volume-title":"ALBERT: A Lite BERT for Self-supervised Learning of Language Representations. In ICLR'20","author":"Lan Zhenzhong","year":"2020","unstructured":"Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel, Piyush Sharma, and Radu Soricut. 2020. ALBERT: A Lite BERT for Self-supervised Learning of Language Representations. In ICLR'20."},{"key":"e_1_3_2_1_26_1","volume-title":"TaxoCom: Topic Taxonomy Completion with Hierarchical Discovery of Novel Topic Clusters. arXiv preprint arXiv:2201.06771","author":"Lee Dongha","year":"2022","unstructured":"Dongha Lee, Jiaming Shen, SeongKu Kang, Susik Yoon, Jiawei Han, and Hwanjo Yu. 2022. TaxoCom: Topic Taxonomy Completion with Hierarchical Discovery of Novel Topic Clusters. arXiv preprint arXiv:2201.06771 (2022)."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","volume":"1","author":"Li Hao","year":"2019","unstructured":"Hao Li, Wei Lu, Pengjun Xie, and Linlin Li. 2019. Neural Chinese address parsing. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). 3421--3431."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858826"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_30_1","volume-title":"KDD'20","author":"Liu Hu","year":"2020","unstructured":"Hu Liu, Jing Lu, Hao Yang, Xiwei Zhao, Sulong Xu, Hao Peng, Zehua Zhang, Wenjie Niu, Xiaokun Zhu, Yongjun Bao, et al. 2020. Category-Specific CNN for Visual-aware CTR Prediction at JD. com. In KDD'20. 2686--2696."},{"key":"e_1_3_2_1_31_1","volume-title":"Recurrent Neural Network for Text Classification with Multi-Task Learning. In IJCAI'16","author":"Liu Pengfei","year":"2016","unstructured":"Pengfei Liu, Xipeng Qiu, and Xuanjing Huang. 2016. Recurrent Neural Network for Text Classification with Multi-Task Learning. In IJCAI'16. AAAI Press, 2873--2879."},{"key":"e_1_3_2_1_32_1","volume-title":"DATE: Detecting Anomalies in Text via Self-Supervision of Transformers. In NAACL-HLT'21. 267--277.","author":"Manolache Andrei","year":"2021","unstructured":"Andrei Manolache, Florin Brad, and Elena Burceanu. 2021. DATE: Detecting Anomalies in Text via Self-Supervision of Transformers. In NAACL-HLT'21. 267--277."},{"key":"e_1_3_2_1_33_1","volume-title":"Coco-lm: Correcting and contrasting text sequences for language model pretraining. Advances in Neural Information Processing Systems 34","author":"Meng Yu","year":"2021","unstructured":"Yu Meng, Chenyan Xiong, Payal Bajaj, Paul Bennett, Jiawei Han, Xia Song, et al. 2021. Coco-lm: Correcting and contrasting text sequences for language model pretraining. Advances in Neural Information Processing Systems 34 (2021)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403332"},{"volume-title":"Multi-Context One-Class Classification for Unsupervised Anomaly Detection on Text","author":"Ruff Lukas","key":"e_1_3_2_1_36_1","unstructured":"Lukas Ruff, Yury Zemlyanskiy, Robert Vandermeulen, Thomas Schnake, and Marius Kloft. 2019. Self-Attentive, Multi-Context One-Class Classification for Unsupervised Anomaly Detection on Text. In ACL. Association for Computational Linguistics, 4061--4071."},{"key":"e_1_3_2_1_37_1","volume-title":"Estimating the support of a high-dimensional distribution. Neural computation 13, 7","author":"Sch\u00f6lkopf Bernhard","year":"2001","unstructured":"Bernhard Sch\u00f6lkopf, John C Platt, John Shawe-Taylor, Alex J Smola, and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation 13, 7 (2001), 1443--1471."},{"key":"e_1_3_2_1_38_1","volume-title":"NIPS","volume":"12","author":"Sch\u00f6lkopf Bernhard","year":"1999","unstructured":"Bernhard Sch\u00f6lkopf, Robert C Williamson, Alexander J Smola, John Shawe-Taylor, John C Platt, et al. 1999. Support vector method for novelty detection.. In NIPS, Vol. 12. Citeseer, 582--588."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474717.3483986"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2028"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397536.3422254"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Lichao Sun Congying Xia Wenpeng Yin Tingting Liang Philip Yu and Lifang He. 2020. Mixup-Transformer: Dynamic Data Augmentation for NLP Tasks. In ACL. International Committee on Computational Linguistics 3436--3440.","DOI":"10.18653\/v1\/2020.coling-main.305"},{"key":"e_1_3_2_1_43_1","volume-title":"Stan Zdonik, Mejbah Alam, and Justin Gottschlich.","author":"Tatbul Nesime","year":"2018","unstructured":"Nesime Tatbul, Tae Jun Lee, Stan Zdonik, Mejbah Alam, and Justin Gottschlich. 2018. Precision and recall for time series. arXiv preprint arXiv:1803.03639 (2018)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi5050065"},{"key":"e_1_3_2_1_45_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NeurIPS'17. 5998--6008."},{"key":"e_1_3_2_1_46_1","volume-title":"NeurIPS","author":"Wang Wenhui","year":"2020","unstructured":"Wenhui Wang, Furu Wei, Li Dong, Hangbo Bao, Nan Yang, and Ming Zhou. 2020. MiniLM: Deep Self-Attention Distillation for Task-Agnostic Compression of Pre-Trained Transformers. In NeurIPS 2020, December 6--12, 2020, virtual."},{"key":"e_1_3_2_1_47_1","volume-title":"Nikhil Jhaveri, and Shashank Agarwal.","author":"Waradpande Vedang A","year":"2021","unstructured":"Vedang A Waradpande, Petchetti Vinay Surya Prakash, Nikhil Jhaveri, and Shashank Agarwal. 2021. Predicting Completeness of Unstructured Shipping Addresses Using Ensemble Models. (2021)."},{"key":"e_1_3_2_1_48_1","volume-title":"Efficient Contrastive Learning via Novel Data Augmentation and Curriculum Learning","author":"Ye Seonghyeon","year":"1832","unstructured":"Seonghyeon Ye, Jiseon Kim, and Alice Oh. 2021. Efficient Contrastive Learning via Novel Data Augmentation and Curriculum Learning. In EMNLP. Association for Computational Linguistics, 1832--1838."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSP51882.2021.9408977"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980765.2980767"},{"key":"e_1_3_2_1_51_1","volume-title":"TKDE'20","author":"Zhao Pengpeng","year":"2020","unstructured":"Pengpeng Zhao, Anjing Luo, Yanchi Liu, Fuzhen Zhuang, Jiajie Xu, Zhixu Li, Victor S Sheng, and Xiaofang Zhou. 2020. Where to go next: A spatio-temporal gated network for next poi recommendation. TKDE'20 (2020)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Li Zheng Zhenpeng Li Jian Li Zhao Li and Jun Gao. 2019. AddGraph: Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN.. In IJCAI. 4419--4425.","DOI":"10.24963\/ijcai.2019\/614"},{"volume-title":"ACL'16 (Volume 2: Short Papers)","author":"Zhou Peng","key":"e_1_3_2_1_53_1","unstructured":"Peng Zhou, Wei Shi, Jun Tian, Zhenyu Qi, Bingchen Li, Hongwei Hao, and Bo Xu. 2016. Attention-Based Bidirectional Long Short-Term Memory Networks for Relation Classification. In ACL'16 (Volume 2: Short Papers). Association for Computational Linguistics, 207--212."}],"event":{"name":"SIGSPATIAL '22: The 30th International Conference on Advances in Geographic Information Systems","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Seattle Washington","acronym":"SIGSPATIAL '22"},"container-title":["Proceedings of the 30th International Conference on Advances in Geographic Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3557915.3560999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3557915.3560999","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3557915.3560999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:26Z","timestamp":1750182566000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3557915.3560999"}},"subtitle":["real-time abnormal address detection via contrastive augmentation for location-based services"],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":53,"alternative-id":["10.1145\/3557915.3560999","10.1145\/3557915"],"URL":"https:\/\/doi.org\/10.1145\/3557915.3560999","relation":{},"subject":[],"published":{"date-parts":[[2022,11]]},"assertion":[{"value":"2022-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}