{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T03:14:16Z","timestamp":1773976456089,"version":"3.50.1"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/82489\/201"],"award-info":[{"award-number":["SFRH\/BD\/82489\/201"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00408\/2020"],"award-info":[{"award-number":["UIDB\/00408\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/CCI-COM\/30142\/2017"],"award-info":[{"award-number":["PTDC\/CCI-COM\/30142\/2017"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDP\/00408\/2020"],"award-info":[{"award-number":["UIDP\/00408\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["Grant Agreement No. 689239"],"award-info":[{"award-number":["Grant Agreement No. 689239"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2021,7,31]]},"abstract":"<jats:p>Sensor platforms used in environmental monitoring applications are often subject to harsh environmental conditions while monitoring complex phenomena. Therefore, designing dependable monitoring systems is challenging given the external disturbances affecting sensor measurements. Even the apparently simple task of outlier detection in sensor data becomes a hard problem, amplified by the difficulty in distinguishing true data errors due to sensor faults from deviations due to natural phenomenon, which look like data errors. Existing solutions for runtime outlier detection typically assume that the physical processes can be accurately modeled, or that outliers consist in large deviations that are easily detected and filtered by appropriate thresholds. Other solutions assume that it is possible to deploy multiple sensors providing redundant data to support voting-based techniques.<\/jats:p>\n          <jats:p>In this article, we propose a new methodology for dependable runtime detection of outliers in environmental monitoring systems, aiming to increase data quality by treating them. We propose the use of machine learning techniques to model each sensor behavior, exploiting the existence of correlated data provided by other related sensors. Using these models, along with knowledge of processed past measurements, it is possible to obtain accurate estimations of the observed environment parameters and build failure detectors that use these estimations. When a failure is detected, these estimations also allow one to correct the erroneous measurements and hence improve the overall data quality. Our methodology not only allows one to distinguish truly abnormal measurements from deviations due to complex natural phenomena, but also allows the quantification of each measurement quality, which is relevant from a dependability perspective.<\/jats:p>\n          <jats:p>\n            We apply the methodology to real datasets from a complex aquatic monitoring system, measuring temperature and salinity parameters, through which we illustrate the process for building the machine learning prediction models using a technique based on Artificial Neural Networks, denoted\n            <jats:bold>ANNODE<\/jats:bold>\n            (\n            <jats:bold>ANN Outlier Detection<\/jats:bold>\n            ). From this application, we also observe the effectiveness of our ANNODE approach for accurate outlier detection in harsh environments. Then we validate these positive results by comparing ANNODE with state-of-the-art solutions for outlier detection. The results show that ANNODE improves existing solutions regarding accuracy of outlier detection.\n          <\/jats:p>","DOI":"10.1145\/3445812","type":"journal-article","created":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:17:18Z","timestamp":1626049038000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Using Machine Learning for Dependable Outlier Detection in Environmental Monitoring Systems"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8431-3877","authenticated-orcid":false,"given":"Gon\u00e7alo","family":"Jesus","sequence":"first","affiliation":[{"name":"LNEC - National Laboratory for Civil Engineering, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5522-5739","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Casimiro","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7537-0984","authenticated-orcid":false,"given":"Anabela","family":"Oliveira","sequence":"additional","affiliation":[{"name":"LNEC - National Laboratory for Civil Engineering, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Intel Lab Data. Retrieved","year":"2018","unstructured":"2019. Intel Lab Data. Retrieved December 8, 2018 from http:\/\/db.csail.mit.edu\/labdata\/labdata.html. 2019. Intel Lab Data. Retrieved December 8, 2018 from http:\/\/db.csail.mit.edu\/labdata\/labdata.html."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7794093"},{"key":"e_1_2_1_3_1","volume-title":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 687\u2013692","author":"Ayadi A.","year":"2017","unstructured":"A. Ayadi , O. Ghorbel , M. S. Bensaleh , A. Obeid , and M. Abid . 2017. Performance of outlier detection techniques based classification in wireless sensor networks . In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 687\u2013692 . DOI:https:\/\/doi.org\/10.1109\/IWCMC. 2017 .7986368 10.1109\/IWCMC.2017.7986368 A. Ayadi, O. Ghorbel, M. S. Bensaleh, A. Obeid, and M. Abid. 2017. Performance of outlier detection techniques based classification in wireless sensor networks. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 687\u2013692. DOI:https:\/\/doi.org\/10.1109\/IWCMC.2017.7986368"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.007"},{"key":"#cr-split#-e_1_2_1_5_1.1","doi-asserted-by":"crossref","unstructured":"M. Bahrepour N. Meratnia and P. J. M. Havinga. 2009. Sensor fusion-based event detection in wireless sensor networks. In 2009 6th Annual International Mobile and Ubiquitous Systems: Networking Services (MobiQuitous). 1-8. DOI:https:\/\/doi.org\/10.4108\/ICST.MOBIQUITOUS2009.7056 10.4108\/ICST.MOBIQUITOUS2009.7056","DOI":"10.4108\/ICST.MOBIQUITOUS2009.7056"},{"key":"#cr-split#-e_1_2_1_5_1.2","doi-asserted-by":"crossref","unstructured":"M. Bahrepour N. Meratnia and P. J. M. Havinga. 2009. Sensor fusion-based event detection in wireless sensor networks. In 2009 6th Annual International Mobile and Ubiquitous Systems: Networking Services (MobiQuitous). 1-8. DOI:https:\/\/doi.org\/10.4108\/ICST.MOBIQUITOUS2009.7056","DOI":"10.4108\/ICST.MOBIQUITOUS2009.7056"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCOS.2010.24"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2008.83"},{"key":"e_1_2_1_8_1","unstructured":"Lai-wan Chan. 1996. Levenberg-Marquardt learning and regularization. In Progress in Neural Information Processing. Citeseer.  Lai-wan Chan. 1996. Levenberg-Marquardt learning and regularization. In Progress in Neural Information Processing. Citeseer."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993042.1993045"},{"key":"e_1_2_1_10_1","volume-title":"Deep learning for time-series analysis. Retrieved","author":"Gamboa J.","year":"2018","unstructured":"J. Gamboa . 2017. Deep learning for time-series analysis. Retrieved December 8, 2018 from https:\/\/arxiv.org\/abs\/1701.01887. J. Gamboa. 2017. Deep learning for time-series analysis. Retrieved December 8, 2018 from https:\/\/arxiv.org\/abs\/1701.01887."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16060868"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2388498"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.6"},{"key":"e_1_2_1_15_1","volume-title":"Maximum likelihood estimators of the parameters of the log-logistic distribution. Statistical Papers","author":"He Xiaofang","year":"2018","unstructured":"Xiaofang He , Wangxue Chen , and Wenshu Qian . 2018. Maximum likelihood estimators of the parameters of the log-logistic distribution. Statistical Papers ( 2018 ), 1\u201318. DOI:https:\/\/doi.org\/10.1007\/s00362-018-1011-3 10.1007\/s00362-018-1011-3 Xiaofang He, Wangxue Chen, and Wenshu Qian. 2018. Maximum likelihood estimators of the parameters of the log-logistic distribution. Statistical Papers (2018), 1\u201318. DOI:https:\/\/doi.org\/10.1007\/s00362-018-1011-3"},{"key":"#cr-split#-e_1_2_1_16_1.1","doi-asserted-by":"crossref","unstructured":"G. Jesus A. Casimiro and A. Oliveira. 2017. A survey on data quality for dependable monitoring in wireless sensor networks. Sensors 17 9 (2017). DOI:https:\/\/doi.org\/10.3390\/s17092010 10.3390\/s17092010","DOI":"10.3390\/s17092010"},{"key":"#cr-split#-e_1_2_1_16_1.2","doi-asserted-by":"crossref","unstructured":"G. Jesus A. Casimiro and A. Oliveira. 2017. A survey on data quality for dependable monitoring in wireless sensor networks. Sensors 17 9 (2017). DOI:https:\/\/doi.org\/10.3390\/s17092010","DOI":"10.3390\/s17092010"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2015.0202"},{"key":"e_1_2_1_18_1","first-page":"383","article-title":"Smart outlier detection of wireless sensor network. Facta Universitatis, Series","volume":"19","author":"Kamal S.","year":"2016","unstructured":"S. Kamal , R. A. Ramadan , and E.-R. Fawzy . 2016 . Smart outlier detection of wireless sensor network. Facta Universitatis, Series : Electronics and Energetics 19 , 3 (2016), 383 \u2013 393 . DOI:https:\/\/doi.org\/10.2298\/FUEE1603383K 10.2298\/FUEE1603383K S. Kamal, R. A. Ramadan, and E.-R. Fawzy. 2016. Smart outlier detection of wireless sensor network. Facta Universitatis, Series: Electronics and Energetics 19, 3 (2016), 383\u2013393. DOI:https:\/\/doi.org\/10.2298\/FUEE1603383K","journal-title":"Electronics and Energetics"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ocemod.2015.12.007"},{"key":"e_1_2_1_20_1","volume-title":"Retrieved","author":"Konstantinov N.","year":"2019","unstructured":"N. Konstantinov and C. Lampert . 2019. Robust learning from untrusted sources . Retrieved July 23, 2019 from https:\/\/arxiv.org\/abs\/1901.10310. N. Konstantinov and C. Lampert. 2019. Robust learning from untrusted sources. Retrieved July 23, 2019 from https:\/\/arxiv.org\/abs\/1901.10310."},{"key":"e_1_2_1_21_1","volume-title":"Sequence to sequence deep learning models for solar irradiation forecasting. In 2019 IEEE Milan PowerTech","author":"Mukhoty Bhaskar Pratim","unstructured":"Bhaskar Pratim Mukhoty , Vikas Maurya , and Sandeep Kumar Shukla . 2019. Sequence to sequence deep learning models for solar irradiation forecasting. In 2019 IEEE Milan PowerTech . IEEE , 1\u20136. Bhaskar Pratim Mukhoty, Vikas Maurya, and Sandeep Kumar Shukla. 2019. Sequence to sequence deep learning models for solar irradiation forecasting. In 2019 IEEE Milan PowerTech. IEEE, 1\u20136."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2680538"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2338611"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.005"},{"key":"e_1_2_1_25_1","volume-title":"Chichester","author":"Pugh D. T.","year":"1915","unstructured":"D. T. Pugh . 1987. Tides, Surges, and Mean Sea-level. Chichester ; New York : J. Wiley . http:\/\/eprints.soton.ac.uk\/ 1915 7\/01\/sea-level.pdf\u201d A handbook for engineers and scientists\u201d\u2013Cover. D. T. Pugh. 1987. Tides, Surges, and Mean Sea-level. Chichester; New York: J. Wiley. http:\/\/eprints.soton.ac.uk\/19157\/01\/sea-level.pdf\u201d A handbook for engineers and scientists\u201d\u2013Cover."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051543"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.09.008"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.01.003"},{"key":"e_1_2_1_29_1","volume-title":"Leroy","author":"Rousseeuw Peter J.","year":"1987","unstructured":"Peter J. Rousseeuw and Annick M . Leroy . 1987 . Robust Regression and Outlier Detection. Wiley , New York. DOI:https:\/\/doi.org\/10.1002\/0471725382 10.1002\/0471725382 Peter J. Rousseeuw and Annick M. Leroy. 1987. Robust Regression and Outlier Detection. Wiley, New York. DOI:https:\/\/doi.org\/10.1002\/0471725382"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0300-z"},{"key":"e_1_2_1_31_1","first-page":"2","article-title":"Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: A survey","volume":"43","author":"Shahid N.","year":"2015","unstructured":"N. Shahid , I. H. Naqvi , and S. B. Qaisar . 2015 . Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: A survey . Artificial Intelligence Review 43 , 2 (Feb. 2015), 193\u2013228. DOI:https:\/\/doi.org\/10.1007\/s10462-012-9370-y 10.1007\/s10462-012-9370-y N. Shahid, I. H. Naqvi, and S. B. Qaisar. 2015. Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: A survey. Artificial Intelligence Review 43, 2 (Feb. 2015), 193\u2013228. DOI:https:\/\/doi.org\/10.1007\/s10462-012-9370-y","journal-title":"Artificial Intelligence Review"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.19"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2008.4761978"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(01)00702-0"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.200"},{"key":"e_1_2_1_36_1","first-page":"2","article-title":"Outlier detection techniques for wireless sensor networks: A survey","volume":"12","author":"Zhang Y.","year":"2010","unstructured":"Y. Zhang , N. Meratnia , and P. Havinga . 2010 . Outlier detection techniques for wireless sensor networks: A survey . IEEE Communications Surveys Tutorials 12 , 2 (Second Quarter, 2010), 159\u2013170. DOI:https:\/\/doi.org\/10.1109\/SURV.2010.021510.00088 10.1109\/SURV.2010.021510.00088 Y. Zhang, N. Meratnia, and P. Havinga. 2010. Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys Tutorials 12, 2 (Second Quarter, 2010), 159\u2013170. DOI:https:\/\/doi.org\/10.1109\/SURV.2010.021510.00088","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11161"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:13Z","timestamp":1750195693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445812"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,7,31]]}},"alternative-id":["10.1145\/3445812"],"URL":"https:\/\/doi.org\/10.1145\/3445812","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}