{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:33Z","timestamp":1750309533129,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T00:00:00Z","timestamp":1730160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100011039","name":"Intelligence Advanced Research Projects Activity","doi-asserted-by":"publisher","award":["140D0423C0025"],"award-info":[{"award-number":["140D0423C0025"]}],"id":[{"id":"10.13039\/100011039","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2302968"],"award-info":[{"award-number":["2302968"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,29]]},"DOI":"10.1145\/3681765.3698463","type":"proceedings-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T13:06:43Z","timestamp":1730898403000},"page":"79-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Neural Collaborative Filtering to Detect Anomalies in Human Semantic Trajectories"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5894-8740","authenticated-orcid":false,"given":"Yueyang","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Computer Science, Emory University, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6815-2219","authenticated-orcid":false,"given":"Lance","family":"Kennedy","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Emory University, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0926-7679","authenticated-orcid":false,"given":"Hossein","family":"Amiri","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Emory University, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7001-4123","authenticated-orcid":false,"given":"Andreas","family":"Z\u00fcfle","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Emory University, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,6]]},"reference":[{"volume-title":"An introduction to outlier analysis","author":"Aggarwal Charu C","key":"e_1_3_2_1_1_1","unstructured":"Charu C Aggarwal and Charu C Aggarwal. 2017. An introduction to outlier analysis. Springer."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Hossein Amiri Will Kohn et al. 2024. The Patterns of Life Human Mobility Simulation. (2024). arXiv:2410.00185","DOI":"10.1145\/3678717.3691319"},{"key":"e_1_3_2_1_3_1","volume-title":"Urban Anomalies: A Simulated Human Mobility Dataset with Injected Anomalies.","author":"Amiri Hossein","year":"2024","unstructured":"Hossein Amiri, Ruochen Kong, and Andreas Zufle. 2024. Urban Anomalies: A Simulated Human Mobility Dataset with Injected Anomalies. (2024). arXiv:2410.01844"},{"key":"e_1_3_2_1_4_1","volume-title":"Massive Trajectory Data Based on Patterns of Life. In SIGSPATIAL'23","author":"Amiri Hossein","year":"2023","unstructured":"Hossein Amiri, Shiyang Ruan, et al. 2023. Massive Trajectory Data Based on Patterns of Life. In SIGSPATIAL'23. ACM, 1--4."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284274"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587510"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399631"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of KDD cup and workshop","volume":"2007","author":"Bennett James","year":"2007","unstructured":"James Bennett, Stan Lanning, et al. 2007. The netflix prize. In Proceedings of KDD cup and workshop, Vol. 2007. New York, 35."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10072441"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.237"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031336"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30947-2_21"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02587-w"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9197560"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Yves-Alexandre De Montjoye et al. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3 1 (2013) 1--5.","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_16_1","volume-title":"2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech). IEEE, 1--6.","author":"D'Errico Leonardo","year":"2017","unstructured":"Leonardo D'Errico, Fabio Franchi, et al. 2017. Design and implementation of a children safety system based on IoT technologies. In 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech). IEEE, 1--6."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.06.030"},{"key":"e_1_3_2_1_18_1","volume-title":"Bayesics: Uncovering Human Mobility Distributions and Anomalies with an Integrated Statistical and Neural Framework.","author":"Duan Minxuan","year":"2024","unstructured":"Minxuan Duan, Yinlong Qian, et al. 2024. Back to Bayesics: Uncovering Human Mobility Distributions and Anomalies with an Integrated Statistical and Neural Framework. (2024). arXiv:2410.01011 https:\/\/arxiv.org\/abs\/2410.01011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/234"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/138859.138867"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20629"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/3523210.3523225"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"volume-title":"2020 21st IEEE International Conference on Mobile Data Management (MDM). IEEE, 158--167","author":"Joon-Seok","key":"e_1_3_2_1_24_1","unstructured":"Joon-Seok Kim et al. 2020. Location-based social network data generation based on patterns of life. In 2020 21st IEEE International Conference on Mobile Data Management (MDM). IEEE, 158--167."},{"key":"e_1_3_2_1_25_1","unstructured":"Edwin M Knox and Raymond T Ng. 1998. Algorithms for mining distancebased outliers in large datasets. In VLDB. Citeseer 392--403."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3615898.3628258"},{"key":"e_1_3_2_1_27_1","volume-title":"Advances in collaborative filtering. Recommender systems handbook","author":"Koren Yehuda","year":"2021","unstructured":"Yehuda Koren, Steffen Rendle, and Robert Bell. 2021. Advances in collaborative filtering. Recommender systems handbook (2021), 91--142."},{"key":"e_1_3_2_1_28_1","volume-title":"2009 12th international conference on information fusion. IEEE, 756--763","author":"Laxhammar Rikard","year":"2009","unstructured":"Rikard Laxhammar, Goran Falkman, and Egils Sviestins. 2009. Anomaly detection in sea traffic-a comparison of the gaussian mixture model and the kernel density estimator. In 2009 12th international conference on information fusion. IEEE, 756--763."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_15"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3159580"},{"key":"e_1_3_2_1_31_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00087"},{"key":"e_1_3_2_1_33_1","volume-title":"9th International Symposium on Ambient Intelligence. Springer, 247--255","author":"Machado Tom\u00e1s","year":"2019","unstructured":"Tom\u00e1s Machado, Rui Maia, et al. 2019. Vessel trajectories outliers. In Ambient Intelligence---Software and Applications---, 9th International Symposium on Ambient Intelligence. Springer, 247--255."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9619-1"},{"key":"e_1_3_2_1_35_1","unstructured":"Sai Munikoti Deepesh Agarwal et al. 2023. Challenges and opportunities in deep reinforcement learning with graph neural networks: A comprehensive review of algorithms and applications. IEEE transactions on neural networks and learning systems (2023)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2018.00032"},{"key":"e_1_3_2_1_37_1","volume-title":"Spatial epidemiology: an emerging (or re-emerging) discipline. Trends in ecology & evolution 20, 6","author":"Ostfeld Richard S","year":"2005","unstructured":"Richard S Ostfeld, Gregory E Glass, and Felicia Keesing. 2005. Spatial epidemiology: an emerging (or re-emerging) discipline. Trends in ecology & evolution 20, 6 (2005), 328--336."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501656"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of KDD cup and workshop. 5--8.","author":"Paterek Arkadiusz","year":"2007","unstructured":"Arkadiusz Paterek. 2007. Improving regularized singular value decomposition for collaborative filtering. In Proceedings of KDD cup and workshop. 5--8."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2005599"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412488"},{"key":"e_1_3_2_1_42_1","volume-title":"2008 11th International Conference on Information Fusion. IEEE, 1--7.","author":"Ristic Branko","year":"2008","unstructured":"Branko Ristic, Barbara La Scala, Mark Morelande, and Neil Gordon. 2008. Statistical analysis of motion patterns in AIS data: Anomaly detection and motion prediction. In 2008 11th International Conference on Information Fusion. IEEE, 1--7."},{"key":"e_1_3_2_1_43_1","volume-title":"International conference on machine learning. PMLR, 4393--4402","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In International conference on machine learning. PMLR, 4393--4402."},{"key":"e_1_3_2_1_44_1","volume-title":"Spatio-temporal graph neural networks: A survey. arXiv preprint arXiv:2301.10569","author":"Sahili Zahraa Al","year":"2023","unstructured":"Zahraa Al Sahili and Mariette Awad. 2023. Spatio-temporal graph neural networks: A survey. arXiv preprint arXiv:2301.10569 (2023)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64367-0_3"},{"key":"e_1_3_2_1_46_1","volume-title":"NUMOSIM: A Synthetic Mobility Dataset with Anomaly Detection Benchmarks. arXiv preprint arXiv:2409.03024","author":"Stanford Chris","year":"2024","unstructured":"Chris Stanford, Suman Adari, et al. 2024. NUMOSIM: A Synthetic Mobility Dataset with Anomaly Detection Benchmarks. arXiv preprint arXiv:2409.03024 (2024)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20102826"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Xiaoyuan Su. 2009. A Survey of Collaborative Filtering Techniques. (2009).","DOI":"10.1155\/2009\/421425"},{"key":"e_1_3_2_1_49_1","unstructured":"Kaixin Sui Youjian Zhao et al. 2016. Your trajectory privacy can be breached even if you walk in groups. In IEEE\/ACM IWQoS'16. IEEE 1--6."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2011.5772437"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1097\/WAD.0000000000000091"},{"key":"e_1_3_2_1_52_1","volume-title":"Trajectory-based multidimensional outlier detection in wireless sensor networks using Hidden Markov Models. Wireless networks 20","author":"Wang Chen","year":"2014","unstructured":"Chen Wang, Hongzhi Lin, and Hongbo Jiang. 2014. Trajectory-based multidimensional outlier detection in wireless sensor networks using Hidden Markov Models. Wireless networks 20 (2014), 2409--2418."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380186"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.040"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132933"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1104-z"},{"key":"e_1_3_2_1_57_1","first-page":"4137","article-title":"Trajectory outlier detection algorithm based on structural features","volume":"7","author":"Yuan Guan","year":"2011","unstructured":"Guan Yuan, Shixiong Xia, Lei Zhang, Yong Zhou, and Cheng Ji. 2011. Trajectory outlier detection algorithm based on structural features. Journal of Computational Information Systems 7, 11 (2011), 4137--4144.","journal-title":"Journal of Computational Information Systems"},{"key":"e_1_3_2_1_58_1","unstructured":"Zheng Zhang Hossein Amiri et al. 2023. Large Language Models for Spatial Trajectory Patterns Mining. (2023). arXiv:2310.04942"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Zheng Zhang Hossein Amiri et al. 2024. Transferable Unsupervised Outlier Detection Framework for Human Semantic Trajectories. (2024). arXiv:2410.00054","DOI":"10.1145\/3678717.3691324"},{"key":"e_1_3_2_1_60_1","first-page":"7","article-title":"AddGraph: Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN","volume":"3","author":"Zheng Li","year":"2019","unstructured":"Li Zheng, Zhenpeng Li, et al. 2019. AddGraph: Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN.. In IJCAI, Vol. 3. 7.","journal-title":"IJCAI"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2743025"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409677"},{"key":"e_1_3_2_1_63_1","volume-title":"SIGSPATIAL'08 (sigspatial'08 ed.).","author":"Zheng Yu","year":"2008","unstructured":"Yu Zheng, Xing Xie, Quannan Li, and Wei-Ying Ma. 2008. Mining user similarity based on location history. In SIGSPATIAL'08 (sigspatial'08 ed.)."},{"key":"e_1_3_2_1_64_1","first-page":"32","article-title":"GeoLife: A collaborative social networking service among user, location and trajectory","volume":"33","author":"Zheng Yu","year":"2010","unstructured":"Yu Zheng, Xing Xie, Wei-Ying Ma, et al. 2010. GeoLife: A collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33, 2 (2010), 32--39.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.024"},{"key":"e_1_3_2_1_67_1","volume-title":"USA","author":"Zhu Jie","year":"2015","unstructured":"Jie Zhu, Wei Jiang, An Liu, Guanfeng Liu, and Lei Zhao. 2015. Time-dependent popular routes based trajectory outlier detection. In Web Information Systems Engineering---WISE 2015: 16th International Conference, Miami, FL, USA, November 1-3, 2015, Proceedings, Part I 16. Springer, 16--30."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-021-09348-7"}],"event":{"name":"GeoAnomalies '24: 1st ACM SIGSPATIAL International Workshop on Geospatial Anomaly Detection","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Atlanta GA USA","acronym":"GeoAnomalies '24"},"container-title":["Proceedings of the 1st ACM SIGSPATIAL International Workshop on Geospatial Anomaly Detection"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3681765.3698463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3681765.3698463","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3681765.3698463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:16Z","timestamp":1750295896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3681765.3698463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,29]]},"references-count":68,"alternative-id":["10.1145\/3681765.3698463","10.1145\/3681765"],"URL":"https:\/\/doi.org\/10.1145\/3681765.3698463","relation":{},"subject":[],"published":{"date-parts":[[2024,10,29]]},"assertion":[{"value":"2024-11-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}