{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:02:06Z","timestamp":1776092526720,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671874","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:55:12Z","timestamp":1724561712000},"page":"2980-2990","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Multi-Scale Detection of Anomalous Spatio-Temporal Trajectories in Evolving Trajectory Datasets"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2681-4593","authenticated-orcid":false,"given":"Chenhao","family":"Wang","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4233-3543","authenticated-orcid":false,"given":"Lisi","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1117-2890","authenticated-orcid":false,"given":"Shuo","family":"Shang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9697-7670","authenticated-orcid":false,"given":"Christian S.","family":"Jensen","sequence":"additional","affiliation":[{"name":"Aalborg University, Aalborg, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5060-1360","authenticated-orcid":false,"given":"Panos","family":"Kalnis","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288683"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2238531"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18579-4_45"},{"key":"e_1_3_2_2_4_1","volume-title":"Jia Yu, Chi Wang, Jaeyoung Do, Yinan Li, Hantian Zhang, Badrish Chandramouli, Johannes Gehrke, Donald Kossmann, David B. Lomet, and Tim Kraska.","author":"Ding Jialin","year":"2020","unstructured":"Jialin Ding, Umar Farooq Minhas, Jia Yu, Chi Wang, Jaeyoung Do, Yinan Li, Hantian Zhang, Badrish Chandramouli, Johannes Gehrke, Donald Kossmann, David B. Lomet, and Tim Kraska. 2020. ALEX: An Updatable Adaptive Learned Index. In SIGMOD. ACM, 969--984."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/233"},{"key":"e_1_3_2_2_6_1","volume-title":"A Taxi Driving Fraud Detection System","author":"Ge Yong","unstructured":"Yong Ge, Hui Xiong, Chuanren Liu, and Zhi-Hua Zhou. 2011. A Taxi Driving Fraud Detection System. In ICDM. IEEE Computer Society, 181--190."},{"key":"e_1_3_2_2_7_1","first-page":"1493","article-title":"DeepTEA","volume":"15","author":"Han Xiaolin","year":"2022","unstructured":"Xiaolin Han, Reynold Cheng, Chenhao Ma, and Tobias Grubenmann. 2022. DeepTEA: Effective and Efficient Online Time-dependent Trajectory Outlier Detection. Proc. VLDB Endow., Vol. 15, 7 (2022), 1493--1505.","journal-title":"Effective and Efficient Online Time-dependent Trajectory Outlier Detection. Proc. VLDB Endow."},{"key":"e_1_3_2_2_8_1","volume-title":"Brubaker","author":"Kazemi Seyed Mehran","year":"2019","unstructured":"Seyed Mehran Kazemi, Rishab Goel, Sepehr Eghbali, Janahan Ramanan, Jaspreet Sahota, Sanjay Thakur, Stella Wu, Cathal Smyth, Pascal Poupart, and Marcus A. Brubaker. 2019. Time2Vec: Learning a Vector Representation of Time. CoRR, Vol. abs\/1907.05321 (2019)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2666146"},{"key":"e_1_3_2_2_10_1","volume-title":"Kingma and Max Welling","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Max Welling. 2014. Auto-Encoding Variational Bayes. In ICLR."},{"key":"e_1_3_2_2_11_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR. OpenReview.net."},{"key":"e_1_3_2_2_12_1","volume-title":"Jeffrey Dean, and Neoklis Polyzotis.","author":"Kraska Tim","year":"2018","unstructured":"Tim Kraska, Alex Beutel, Ed H. Chi, Jeffrey Dean, and Neoklis Polyzotis. 2018. The Case for Learned Index Structures. In SIGMOD. ACM, 489--504."},{"key":"e_1_3_2_2_13_1","volume-title":"Trajectory Outlier Detection: A Partition-and-Detect Framework","author":"Lee Jae-Gil","unstructured":"Jae-Gil Lee, Jiawei Han, and Xiaolei Li. 2008. Trajectory Outlier Detection: A Partition-and-Detect Framework. In ICDE. IEEE Computer Society, 140--149."},{"key":"e_1_3_2_2_14_1","volume-title":"Deep Representation Learning for Trajectory Similarity Computation","author":"Li Xiucheng","unstructured":"Xiucheng Li, Kaiqi Zhao, Gao Cong, Christian S. Jensen, and Wei Wei. 2018. Deep Representation Learning for Trajectory Similarity Computation. In ICDE. IEEE Computer Society, 617--628."},{"key":"e_1_3_2_2_15_1","volume-title":"Online Anomalous Trajectory Detection with Deep Generative Sequence Modeling","author":"Liu Yiding","unstructured":"Yiding Liu, Kaiqi Zhao, Gao Cong, and Zhifeng Bao. 2020. Online Anomalous Trajectory Detection with Deep Generative Sequence Modeling. In ICDE. IEEE, 949--960."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55753-3_15"},{"key":"e_1_3_2_2_17_1","volume-title":"LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection. CoRR","author":"Malhotra Pankaj","year":"2016","unstructured":"Pankaj Malhotra, Anusha Ramakrishnan, Gaurangi Anand, Lovekesh Vig, Puneet Agarwal, and Gautam Shroff. 2016. LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection. CoRR, Vol. abs\/1607.00148 (2016)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Yue Ning Liang Zhao Feng Chen Chang-Tien Lu and Huzefa Rangwala. 2019. Spatio-temporal Event Forecasting and Precursor Identification. In KDD. ACM 3237--3238.","DOI":"10.1145\/3292500.3332291"},{"key":"e_1_3_2_2_19_1","volume-title":"FOGS: First-Order Gradient Supervision with Learning-based Graph for Traffic Flow Forecasting. In IJCAI. ijcai.org, 3926--3932.","author":"Rao Xuan","year":"2022","unstructured":"Xuan Rao, Hao Wang, Liang Zhang, Jing Li, Shuo Shang, and Peng Han. 2022. FOGS: First-Order Gradient Supervision with Learning-based Graph for Traffic Flow Forecasting. In IJCAI. ijcai.org, 3926--3932."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.29007\/584l"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3592074"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3206441"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3440207"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Hao Wu Weiwei Sun and Baihua Zheng. 2017. A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling. In CIKM. ACM 837--846.","DOI":"10.1145\/3132847.3132933"},{"key":"e_1_3_2_2_25_1","volume-title":"Modelling of Bi-Directional Spatio-Temporal Dependence and Users' Dynamic Preferences for Missing POI Check-In Identification","author":"Xi Dongbo","unstructured":"Dongbo Xi, Fuzhen Zhuang, Yanchi Liu, Jingjing Gu, Hui Xiong, and Qing He. 2019. Modelling of Bi-Directional Spatio-Temporal Dependence and Users' Dynamic Preferences for Missing POI Check-In Identification. In AAAI. AAAI Press, 5458--5465."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3165385"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Zhuoning Yuan Xun Zhou and Tianbao Yang. 2018. Hetero-ConvLSTM: A Deep Learning Approach to Traffic Accident Prediction on Heterogeneous Spatio-Temporal Data. In KDD. ACM 984--992.","DOI":"10.1145\/3219819.3219922"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3046670"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Daqing Zhang Nan Li Zhi-Hua Zhou Chao Chen Lin Sun and Shijian Li. 2011. iBAT: detecting anomalous taxi trajectories from GPS traces. In UbiComp. ACM 99--108.","DOI":"10.1145\/2030112.2030127"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Huichu Zhang Chang Liu Weinan Zhang Guanjie Zheng and Yong Yu. 2020. GeneraLight: Improving Environment Generalization of Traffic Signal Control via Meta Reinforcement Learning. In CIKM. ACM 1783--1792.","DOI":"10.1145\/3340531.3411859"},{"key":"e_1_3_2_2_31_1","volume-title":"Nicholas Jing Yuan, and Shuo Shang","author":"Zheng Kai","year":"2013","unstructured":"Kai Zheng, Yu Zheng, Nicholas Jing Yuan, and Shuo Shang. 2013. On discovery of gathering patterns from trajectories. In ICDE. IEEE Computer Society, 242--253."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.160"},{"key":"e_1_3_2_2_33_1","article-title":"Trajectory Data Mining","volume":"6","author":"Zheng Yu","year":"2015","unstructured":"Yu Zheng. 2015. Trajectory Data Mining: An Overview. ACM Trans. Intell. Syst. Technol., Vol. 6, 3 (2015), 29:1--29:41.","journal-title":"An Overview. ACM Trans. Intell. Syst. Technol."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26190-4_2"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0400-6"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Barcelona Spain","acronym":"KDD '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:15Z","timestamp":1750291455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":35,"alternative-id":["10.1145\/3637528.3671874","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671874","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}