{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T18:40:08Z","timestamp":1743619208848,"version":"3.40.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100006498","name":"Clemson University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100006498","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>This paper presents a novel anomaly and outlier detection algorithm from the SPINEX (Similarity-based Predictions with Explainable Neighbors Exploration) family. This algorithm leverages the concept of similarity and higher-order interactions across multiple subspaces to identify outliers. A comprehensive set of experiments was conducted to evaluate the performance of SPINEX. This algorithm was examined against 21 commonly used anomaly detection algorithms, and across 39 synthetic and real datasets from various domains and of a variety of dimensions and complexities. Furthermore, a complexity analysis was carried out to examine the complexity of the proposed algorithm. Our results demonstrate that SPINEX achieves superior performance, outperforms commonly used anomaly detection algorithms, and has moderate complexity (e.g., O(n log n\u2009\u00d7\u2009d)). More specifically, SPINEX was found to rank at the top of algorithms on the synthetic datasets and the 7th on the real datasets. Finally, a demonstration of the explainability capabilities of SPINEX, along with future research needs, is presented.<\/jats:p>","DOI":"10.1186\/s40537-025-01122-9","type":"journal-article","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T09:50:11Z","timestamp":1743501011000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SPINEX-anomaly: similarity-based predictions with explainable neighbors exploration for anomaly and outlier detection"],"prefix":"10.1186","volume":"12","author":[{"given":"M. Z.","family":"Naser","sequence":"first","affiliation":[]},{"given":"Ahmad Z.","family":"Naser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"1122_CR1","doi-asserted-by":"publisher","DOI":"10.2307\/2530182","author":"AC Atkinson","year":"1981","unstructured":"Atkinson AC, Hawkins DM. Identification of outliers. Biometrics. 1981. https:\/\/doi.org\/10.2307\/2530182.","journal-title":"Biometrics"},{"key":"1122_CR2","first-page":"3455","volume":"12","author":"D Ghosh","year":"2012","unstructured":"Ghosh D, Vogt A. Outliers: an evaluation of methodologies. Jt Stat Meet. 2012;12:3455\u201360.","journal-title":"Jt Stat Meet"},{"key":"1122_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932769","author":"H Wang","year":"2019","unstructured":"Wang H, Bah MJ, Hammad M. Progress in outlier detection techniques: a survey. IEEE Access. 2019. https:\/\/doi.org\/10.1109\/ACCESS.2019.2932769.","journal-title":"IEEE Access"},{"key":"1122_CR4","first-page":"307","volume":"9","author":"K Singh","year":"2012","unstructured":"Singh K, Upadhyaya S. Outlier detection: applications and techniques. Int J Comput. 2012;9:307.","journal-title":"Int J Comput"},{"key":"1122_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.46","author":"H Xiong","year":"2006","unstructured":"Xiong H, Pandey G, Steinbach M, Kumar V. Enhancing data analysis with noise removal. IEEE Trans Knowl Data Eng. 2006. https:\/\/doi.org\/10.1109\/TKDE.2006.46.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1122_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2981476","author":"Y Liu","year":"2020","unstructured":"Liu Y, Dillon T, Yu W, Rahayu W, Mostafa F. Noise removal in the presence of significant anomalies for industrial IoT sensor data in manufacturing. IEEE Internet Things J. 2020. https:\/\/doi.org\/10.1109\/JIOT.2020.2981476.","journal-title":"IEEE Internet Things J"},{"key":"1122_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2718220","author":"H Liu","year":"2018","unstructured":"Liu H, Li X, Li J, Zhang S. Efficient outlier detection for high-dimensional data. IEEE Trans Syst Man Cybern Syst. 2018. https:\/\/doi.org\/10.1109\/TSMC.2017.2718220.","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"1122_CR8","doi-asserted-by":"publisher","first-page":"110947","DOI":"10.1016\/J.PATCOG.2024.110947","volume":"157","author":"H Liu","year":"2025","unstructured":"Liu H, Zhang S, Wu Z, Li X. Outlier detection using local density and global structure. Pattern Recognit. 2025;157:110947. https:\/\/doi.org\/10.1016\/J.PATCOG.2024.110947.","journal-title":"Pattern Recognit"},{"key":"1122_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975716","author":"A Nagaraja","year":"2020","unstructured":"Nagaraja A, Boregowda U, Khatatneh K, Vangipuram R, Nuvvusetty R, Sravan Kiran V. Similarity based feature transformation for network anomaly detection. IEEE Access. 2020. https:\/\/doi.org\/10.1109\/ACCESS.2020.2975716.","journal-title":"IEEE Access"},{"key":"1122_CR10","first-page":"87","volume":"2","author":"WS Suwandi","year":"2022","unstructured":"Suwandi WS. Do economic growth, income distribution, and investment reduce poverty level? J Berk Ilm Efisiensi. 2022;2:87.","journal-title":"J Berk Ilm Efisiensi"},{"key":"1122_CR11","doi-asserted-by":"publisher","DOI":"10.1145\/3447684","author":"H Liu","year":"2021","unstructured":"Liu H, Li E, Liu X, Su K, Zhang S. Anomaly Detection with kernel preserving embedding. ACM Trans Knowl Discov Data. 2021. https:\/\/doi.org\/10.1145\/3447684.","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1122_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2019.2918342","author":"Z Huang","year":"2019","unstructured":"Huang Z, Li S. From difference to similarity: a manifold ranking-based hyperspectral anomaly detection framework. IEEE Trans Geosci Remote Sens. 2019. https:\/\/doi.org\/10.1109\/TGRS.2019.2918342.","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"1122_CR13","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747","author":"M Sakurada","year":"2014","unstructured":"Sakurada M, Yairi T. Anomaly detection using autoencoders with nonlinear dimensionality reduction. ACM Int Conf Proceeding Ser. 2014. https:\/\/doi.org\/10.1145\/2689746.2689747.","journal-title":"ACM Int Conf Proceeding Ser"},{"key":"1122_CR14","doi-asserted-by":"publisher","unstructured":"Kriegel HP, Schubert M, Zimek A. Angle-based outlier detection in high-dimensional data, in: Proc ACM SIGKDD Int Conf Knowl Discov Data Min. 2008. https:\/\/doi.org\/10.1145\/1401890.1401946.","DOI":"10.1145\/1401890.1401946"},{"key":"1122_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106878","author":"ME Villa-P\u00e9rez","year":"2021","unstructured":"Villa-P\u00e9rez ME, \u00c1lvarez-Carmona M, Loyola-Gonz\u00e1lez O, Medina-P\u00e9rez MA, Velazco-Rossell JC, Choo KKR. Semi-supervised anomaly detection algorithms: a comparative summary and future research directions. Knowl-Based Syst. 2021. https:\/\/doi.org\/10.1016\/j.knosys.2021.106878.","journal-title":"Knowl-Based Syst"},{"key":"1122_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47887-6_53","author":"J Tang","year":"2002","unstructured":"Tang J, Chen Z, Fu AWC, Cheung DW. Enhancing effectiveness of outlier detections for low density patterns. Lect Notes Comput Sci. 2002. https:\/\/doi.org\/10.1007\/3-540-47887-6_53.","journal-title":"Lect Notes Comput Sci"},{"key":"1122_CR17","doi-asserted-by":"publisher","unstructured":"Li Z, Zhao Y, Botta N, Ionescu C, Hu X. COPOD: Copula-based outlier detection, in: Proc\u2014IEEE Int. Conf. Data Mining, ICDM, 2020. https:\/\/doi.org\/10.1109\/ICDM50108.2020.00135.","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"1122_CR18","doi-asserted-by":"publisher","unstructured":"Usman N, Utami E, Hartanto AD. Comparative analysis of elliptic envelope, isolation forest, one-class SVM, and local outlier factor in detecting earthquakes with status anomaly using outlier, in: ICCoSITE 2023\u2014Int Conf Comput Sci Inf Technol Eng Digit Transform Strateg Facing VUCA TUNA Era, 2023. https:\/\/doi.org\/10.1109\/ICCoSITE57641.2023.10127748.","DOI":"10.1109\/ICCoSITE57641.2023.10127748"},{"key":"1122_CR19","doi-asserted-by":"publisher","unstructured":"Lazarevic A, Kumar V. Feature bagging for outlier detection, in: Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min. 2005. https:\/\/doi.org\/10.1145\/1081870.1081891.","DOI":"10.1145\/1081870.1081891"},{"key":"1122_CR20","unstructured":"Goldstein M, Dengel A. Histogram-based outlier score (hbos): A fast unsupervised anomaly detection algorithm, KI-2012 Poster Demo Track. 2012."},{"key":"1122_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40725-3_4","author":"I Aguilera-Martos","year":"2023","unstructured":"Aguilera-Martos I, Luengo J, Herrera F. Revisiting histogram based outlier scores: strengths and\u00a0weaknesses. Lect Notes Comput Sci. 2023. https:\/\/doi.org\/10.1007\/978-3-031-40725-3_4.","journal-title":"Lect Notes Comput Sci"},{"key":"1122_CR22","doi-asserted-by":"publisher","unstructured":"Liu FT, Ting KM, Zhou ZH. Isolation forest, in: Proc\u2014IEEE Int. Conf. Data Mining, ICDM, 2008. https:\/\/doi.org\/10.1109\/ICDM.2008.17.","DOI":"10.1109\/ICDM.2008.17"},{"key":"1122_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2947676","author":"S Hariri","year":"2021","unstructured":"Hariri S, Kind MC, Brunner RJ. Extended isolation forest. IEEE Trans Knowl Data Eng. 2021. https:\/\/doi.org\/10.1109\/TKDE.2019.2947676.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1122_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2882404","author":"W Hu","year":"2020","unstructured":"Hu W, Gao J, Li B, Wu O, Du J, Maybank S. Anomaly detection using local kernel density estimation and context-based regression. IEEE Trans Knowl Data Eng. 2020. https:\/\/doi.org\/10.1109\/TKDE.2018.2882404.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1122_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0","author":"T Pevn\u00fd","year":"2016","unstructured":"Pevn\u00fd T. Loda: Lightweight on-line detector of anomalies. Mach Learn. 2016. https:\/\/doi.org\/10.1007\/s10994-015-5521-0.","journal-title":"Mach Learn"},{"key":"1122_CR26","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breuniq","year":"2000","unstructured":"Breuniq MM, Kriegel HP, Ng RT, Sander J. LOF: identifying density-based local outliers. ACM SIGMOD Rec. 2000;29:93\u2013104. https:\/\/doi.org\/10.1145\/335191.335388.","journal-title":"ACM SIGMOD Rec"},{"key":"1122_CR27","doi-asserted-by":"publisher","unstructured":"Cheng Z, Zou C, Dong J. Outlier detection using isolation forest and local outlier, Proc. 2019 Res. Adapt. Converg. Syst. RACS 2019. 2019; 161\u2013168. https:\/\/doi.org\/10.1145\/3338840.3355641.","DOI":"10.1145\/3338840.3355641"},{"key":"1122_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1421","author":"M Hubert","year":"2018","unstructured":"Hubert M, Debruyne M, Rousseeuw PJ. Minimum covariance determinant and extensions. Wiley Interdiscip Rev Comput Stat. 2018. https:\/\/doi.org\/10.1002\/wics.1421.","journal-title":"Wiley Interdiscip Rev Comput Stat"},{"key":"1122_CR29","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1999.10485670","author":"PJ Rousseeuw","year":"1999","unstructured":"Rousseeuw PJ, Van Driessen K. A fast algorithm for the minimum covariance determinant estimator. Technometrics. 1999. https:\/\/doi.org\/10.1080\/00401706.1999.10485670.","journal-title":"Technometrics"},{"key":"1122_CR30","unstructured":"Muandet K, Sch\u00f6lkopf B. One-class support measure machines for group anomaly detection, in: Uncertain. Artif. Intell\u2014Proc. 29th Conf. UAI 2013, 2013."},{"key":"1122_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2009.5417371","author":"T Beltramonte","year":"2009","unstructured":"Beltramonte T, Clemente C, Di Bisceglie M, Galdi C. Robust multiband detection of thermal anomalies using the minimum covariance determinant estimator. Int Geosci Remote Sens Symp. 2009. https:\/\/doi.org\/10.1109\/IGARSS.2009.5417371.","journal-title":"Int Geosci Remote Sens Symp"},{"key":"1122_CR32","doi-asserted-by":"publisher","DOI":"10.1198\/004017001316975899","author":"D Pe\u00f1a","year":"2001","unstructured":"Pe\u00f1a D, Prieto FJ. Multivariate outlier detection and robust covariance matrix estimation. Technometrics. 2001. https:\/\/doi.org\/10.1198\/004017001316975899.","journal-title":"Technometrics"},{"key":"1122_CR33","unstructured":"Janssens JHM. Outlier Selection and One-Class Classifcation, Van Lankveld Uitgeverij, 2013."},{"key":"1122_CR34","doi-asserted-by":"crossref","unstructured":"Kriegel H-P, Kroger P, Schubert E, Zimek A. Outlier detection in axis-parallel subspaces of high dimensional data BT\u2014advances in knowledge discovery and data mining. Adv Knowl Discov Data Min. 2009.","DOI":"10.1007\/978-3-642-01307-2_86"},{"key":"1122_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3_5","author":"CC Aggarwal","year":"2017","unstructured":"Aggarwal CC. High-dimensional outlier detection: the subspace method. Outlier Anal. 2017. https:\/\/doi.org\/10.1007\/978-3-319-47578-3_5.","journal-title":"Outlier Anal"},{"key":"1122_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S44150-021-00015-8","volume":"1","author":"MZ Naser","year":"2021","unstructured":"Naser MZ, Alavi AH. Error metrics and performance fitness indicators for artificial intelligence and machine learning in engineering and sciences. Archit Struct Constr. 2021;1:1\u201319. https:\/\/doi.org\/10.1007\/S44150-021-00015-8.","journal-title":"Archit Struct Constr"},{"key":"1122_CR37","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4266498","author":"S Han","year":"2022","unstructured":"Han S, Hu X, Huang H, Jiang M, Zhao Y. ADBench: Anomaly Detection Benchmark. Adv Neural Inf Process Syst. 2022. https:\/\/doi.org\/10.2139\/ssrn.4266498.","journal-title":"Adv Neural Inf Process Syst"},{"key":"1122_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8","author":"GO Campos","year":"2016","unstructured":"Campos GO, Zimek A, Sander J, Campello RJGB, Micenkov\u00e1 B, Schubert E, Assent I, Houle ME. On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min Knowl Discov. 2016. https:\/\/doi.org\/10.1007\/s10618-015-0444-8.","journal-title":"Data Min Knowl Discov"},{"key":"1122_CR39","doi-asserted-by":"publisher","DOI":"10.1145\/3439950","author":"G Pang","year":"2021","unstructured":"Pang G, Shen C, Cao L, Van Den Hengel A. Deep learning for anomaly detection: a review. ACM Comput Surv. 2021. https:\/\/doi.org\/10.1145\/3439950.","journal-title":"ACM Comput Surv"},{"key":"1122_CR40","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/bf00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR. Induction of decision trees. Mach Learn. 1986;1:81\u2013106. https:\/\/doi.org\/10.1007\/bf00116251.","journal-title":"Mach Learn"},{"key":"1122_CR41","first-page":"311","volume":"9","author":"D Ayres-de-Campos","year":"2000","unstructured":"Ayres-de-Campos D, Bernardes J, Garrido A, Marques-de-Sa J, Pereira-Leite L. SisPorto 2.0: a program for automated analysis of cardiotocograms. J Matern Fetal Med. 2000;9:311\u20138.","journal-title":"J Matern Fetal Med"},{"key":"1122_CR42","first-page":"262","volume":"10","author":"VG Sigillito","year":"1989","unstructured":"Sigillito VG, Wing SP, Hutton LV, Baker KB. Classification of radar returns from the ionosphere using neural networks. Johns Hopkins APL Tech Dig. 1989;10:262.","journal-title":"Johns Hopkins APL Tech Dig"},{"key":"1122_CR43","unstructured":"Alimoglu F, Alpaydin E. Methods of combining multiple classifiers based on different representations for pen-based handwritten digit recognition, Proc Fifth Turkish Artif Intell Artif Neural Networks Symp. 1996."},{"key":"1122_CR44","doi-asserted-by":"publisher","DOI":"10.1002\/widm.8","author":"WY Loh","year":"2011","unstructured":"Loh WY. Classification and regression trees. Wiley Interdiscip Rev Data Min Knowl Discov. 2011. https:\/\/doi.org\/10.1002\/widm.8.","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"1122_CR45","doi-asserted-by":"publisher","DOI":"10.1287\/opre.43.4.570","author":"OL Mangasarian","year":"1994","unstructured":"Mangasarian OL, Street WN, Wolberg WH. Breast cancer diagnosis and prognosis via linear programming. AAAI Spring Symp Tech Rep. 1994. https:\/\/doi.org\/10.1287\/opre.43.4.570.","journal-title":"AAAI Spring Symp Tech Rep"},{"key":"1122_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08994-z","author":"N Alghanmi","year":"2022","unstructured":"Alghanmi N, Alotaibi R, Buhari SM. Machine learning approaches for anomaly detection in IoT: an overview and future research directions. Wirel Pers Commun. 2022. https:\/\/doi.org\/10.1007\/s11277-021-08994-z.","journal-title":"Wirel Pers Commun"},{"key":"1122_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-94343-1_10","author":"A Koschmider","year":"2022","unstructured":"Koschmider A, Kaczmarek K, Krause M, van Zelst SJ. Demystifying noise and outliers in event logs: review and future directions. Lect Notes Bus Inf Process. 2022. https:\/\/doi.org\/10.1007\/978-3-030-94343-1_10.","journal-title":"Lect Notes Bus Inf Process"},{"key":"1122_CR48","volume-title":"Practical applications of data processing, algorithms, and modeling","author":"NR Palakurti","year":"2024","unstructured":"Palakurti NR. Challenges and future directions in anomaly detection. In: Practical applications of data processing, algorithms, and modeling. Hershey: IGI Global; 2024."}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01122-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01122-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01122-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T18:06:44Z","timestamp":1743617204000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01122-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,1]]},"references-count":48,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1122"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01122-9","relation":{},"ISSN":["2196-1115"],"issn-type":[{"type":"electronic","value":"2196-1115"}],"subject":[],"published":{"date-parts":[[2025,4,1]]},"assertion":[{"value":"8 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None required for this research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"77"}}