{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T20:17:12Z","timestamp":1778530632564,"version":"3.51.4"},"reference-count":50,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T00:00:00Z","timestamp":1521849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571160"],"award-info":[{"award-number":["61571160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771157"],"award-info":[{"award-number":["61771157"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Effective anomaly detection of sensing data is essential for identifying potential system failures. Because they require no prior knowledge or accumulated labels, and provide uncertainty presentation, the probability prediction methods (e.g., Gaussian process regression (GPR) and relevance vector machine (RVM)) are especially adaptable to perform anomaly detection for sensing series. Generally, one key parameter of prediction models is coverage probability (CP), which controls the judging threshold of the testing sample and is generally set to a default value (e.g., 90% or 95%). There are few criteria to determine the optimal CP for anomaly detection. Therefore, this paper designs a graphic indicator of the receiver operating characteristic curve of prediction interval (ROC-PI) based on the definition of the ROC curve which can depict the trade-off between the PI width and PI coverage probability across a series of cut-off points. Furthermore, the Youden index is modified to assess the performance of different CPs, by the minimization of which the optimal CP is derived by the simulated annealing (SA) algorithm. Experiments conducted on two simulation datasets demonstrate the validity of the proposed method. Especially, an actual case study on sensing series from an on-orbit satellite illustrates its significant performance in practical application.<\/jats:p>","DOI":"10.3390\/s18040967","type":"journal-article","created":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T03:43:29Z","timestamp":1522035809000},"page":"967","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Optimize the Coverage Probability of Prediction Interval for Anomaly Detection of Sensor-Based Monitoring Series"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4149-1670","authenticated-orcid":false,"given":"Jingyue","family":"Pang","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150080, China"}]},{"given":"Datong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150080, China"}]},{"given":"Yu","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150080, China"}]},{"given":"Xiyuan","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150080, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,3,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1109\/TSTE.2013.2241797","article-title":"Using Data-Mining Approaches for Wind Turbine Power Curve Monitoring: A Comparative Study","volume":"4","author":"Schlechtingen","year":"2013","journal-title":"IEEE Trans. Sustain. Energy"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1260\/174830109789621374","article-title":"Grid-based Approaches for Distributed Data Mining Applications","volume":"3","author":"Aouad","year":"2017","journal-title":"J. Algorithm Comput. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Rousseeuw, P.J., and Hubert, M. (2017). Anomaly Detection by Robust Statistics. Wiley Interdiscip. Rev. Data Min. Knowl. Discov.","DOI":"10.1002\/widm.1236"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"key":"ref_5","first-page":"44","article-title":"A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection","volume":"655","author":"Roy","year":"2017","journal-title":"ICMC"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","article-title":"The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature","volume":"50","author":"Ngai","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., and Furht, B. (2013, January 9\u201313). Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. Proceedings of the IEEE International Conference on Communications, Budapest, Hungary.","DOI":"10.1109\/ICC.2013.6655254"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Takeuchi, S., Nishino, T., Saito, T., and Watanabe, I. (2017, January 9\u201311). Semi-supervised Approach to Soft Sensor Modeling for Fault Detection in Industrial Systems with Multiple Operation Modes. Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, Cairo, Egypt.","DOI":"10.1007\/978-3-319-64861-3_64"},{"key":"ref_9","first-page":"5","article-title":"Anomaly Detection based on Machine Learning Dimensionality Reduction using PCA and Classification using SVM","volume":"47","author":"George","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_10","unstructured":"Shang, W., Li, L., Wan, M., and Zeng, P. (2015, January 14\u201316). Industrial communication intrusion detection algorithm based on improved one-class SVM. Proceedings of the 2015 World Congress on Industrial Control Systems Security (WCICSS), London, UK."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","article-title":"Support vector data description","volume":"54","author":"David","year":"2004","journal-title":"J. Mach. Learn. Res."},{"key":"ref_12","unstructured":"Yang, Y., and Hou, N. (2013, January 26\u201328). Data series forecasting and anomaly detection methods based on online least squares support vector machine. Proceedings of the Control Conference, Xi\u2019an, China."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Fujimaki, R., Yairi, T., and Machida, K. (2005, January 18\u201320). An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning. Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining, Hanoi, Vietnam.","DOI":"10.1007\/11430919_92"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Pang, J., Liu, D., Liao, H., Peng, Y., and Peng, X. (2014, January 22\u201325). Anomaly detection based on data stream monitoring and prediction with improved Gaussian process regression algorithm. Proceedings of the Prognostics and Health Management, Cheney, WA, USA.","DOI":"10.1109\/ICPHM.2014.7036394"},{"key":"ref_15","first-page":"507","article-title":"Anomaly Detection Using Artificial Neural Network","volume":"44","author":"Pradhan","year":"2012","journal-title":"J. Nucl. Med."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Amer, M., Goldstein, M., and Abdennadher, S. (2013, January 11). Enhancing one-class support vector machines for unsupervised anomaly detection. Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, Chicago, IL, USA.","DOI":"10.1145\/2500853.2500857"},{"key":"ref_17","first-page":"51","article-title":"A Lattice based Nearest Neighbor Classifier for Anomaly Intrusion Detection","volume":"4","author":"Jamshidi","year":"2013","journal-title":"JACR"},{"key":"ref_18","unstructured":"Ergen, T., Mirza, A.H., and Kozat, S.S. (arXiv, 2017). Unsupervised and Semi-supervised Anomaly Detection with LSTM Neural Networks, arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1016\/j.envsoft.2009.08.010","article-title":"Anomaly detection in streaming environmental sensor data: A data-driven modeling approach","volume":"25","author":"Hill","year":"2010","journal-title":"Environ. Model Softw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"19269","DOI":"10.1109\/ACCESS.2017.2754447","article-title":"Fragment Anomaly Detection with Prediction and Statistical Analysis for Satellite Telemetry","volume":"5","author":"Liu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_21","first-page":"211","article-title":"Sparse Bayesian Learning and Relevance Vector Machine","volume":"1","author":"Tipping","year":"2001","journal-title":"J. Mach. Learn. Res."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Rasmussen, C.E. (2004). Gaussian Processes in Machine Learning. Advanced Lectures on Machine Learning, Springer.","DOI":"10.7551\/mitpress\/3206.001.0001"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Song, G., Liang, J., Liu, D., and Yu, P. (2015, January 16\u201318). Anomaly detection of condition monitoring with predicted uncertainty for aerospace applications. Proceedings of the IEEE International Conference on Electronic Measurement & Instruments, Qingdao, China.","DOI":"10.1109\/ICEMI.2015.7494262"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Saito, T. Bayesian anomaly detection in monitoring data applying relevance vector machine. Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems, Proceedings of the SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring, San Diego, CA, USA, 6\u201310 March 2011, SPIE Conference.","DOI":"10.1117\/12.880403"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.measurement.2016.10.031","article-title":"Anomaly detection based on uncertainty fusion for univariate monitoring series","volume":"95","author":"Pang","year":"2017","journal-title":"Measurement"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/TVT.2016.2552487","article-title":"Approximation algorithms for cell planning in heterogeneous networks","volume":"66","author":"Zhao","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Vien, Q.T., Akinbote, T., and Nguyen, H.X. (2015, January 8\u201312). On the coverage and power allocation for downlink in heterogeneous wireless cellular networks. Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK.","DOI":"10.1109\/ICC.2015.7249055"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Omorinoye, A.A., and Vien, Q.T. (2017). On the optimization of practical wireless indoor and outdoor microcells subject to QoS constraints. Appl. Sci., 7.","DOI":"10.3390\/app7090948"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MNET.2013.6423186","article-title":"A layered encryption mechanism for networked critical infrastructures","volume":"27","author":"Cao","year":"2013","journal-title":"IEEE Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1198\/000313008X304062","article-title":"Choosing a coverage probability for prediction intervals","volume":"62","author":"Landon","year":"2008","journal-title":"Am. Stat."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2935","DOI":"10.1080\/03610926.2012.729638","article-title":"Forecasting the incidence of cancer in regional victoria, Australia","volume":"42","author":"Nicholas","year":"2013","journal-title":"Commun. Stat."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1017\/S1481803500013336","article-title":"Understanding receiver operating characteristic (ROC) curves","volume":"8","author":"Fan","year":"2006","journal-title":"CJEM"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s13312-011-0055-4","article-title":"Receiver operating characteristic (ROC) curve for medical researchers","volume":"48","author":"Kumar","year":"2011","journal-title":"Indian Pediatr."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1093\/aje\/kwj063","article-title":"The inconsistency of \u2018optimal\u2019 cut points obtained using two criteria based on the receiver operating characteristic curve","volume":"163","author":"Perkins","year":"2006","journal-title":"Am J. Epidemiol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/TNN.2006.887556","article-title":"Self-organizing and self-evolving neurons: A new neural network for optimization","volume":"18","author":"Wu","year":"2007","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/TFUZZ.2006.876985","article-title":"Optimizing fuzzy neural networks for tuning PID controllers using an orthogonal simulated annealing algorithm OSA","volume":"14","author":"Ho","year":"2006","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_37","first-page":"983","article-title":"Prediction Interval Construction and Optimization for Adaptive Neurofuzzy Inference Systems","volume":"19","author":"Khosravi","year":"2011","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"4104","DOI":"10.1002\/sim.6210","article-title":"Choosing a coverage probability for forecasting the incidence of cancer","volume":"33","author":"Young","year":"2014","journal-title":"Stat. Med."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1142\/S0129065704001899","article-title":"Gaussian Processes for Machine Learning","volume":"14","author":"Seeger","year":"2004","journal-title":"Int. J. Neural Syst."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Berger, J.O. (1985). Statistical Decision Theory and Bayesian Analysis, Springer. [2nd ed.].","DOI":"10.1007\/978-1-4757-4286-2"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1496","DOI":"10.1109\/TPWRS.2010.2042309","article-title":"Construction of optimal prediction intervals for load forecasting problem","volume":"25","author":"Khosravi","year":"2010","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2377","DOI":"10.1016\/j.eswa.2009.07.059","article-title":"A prediction interval-based approach to determine optimal structures of neural network metamodels","volume":"37","author":"Khosravi","year":"2010","journal-title":"Expert Syst."},{"key":"ref_43","first-page":"18","article-title":"A New Fuzzy-Based Combined Prediction Interval for Wind Power Forecasting","volume":"31","author":"Khosravi","year":"2015","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/TNNLS.2013.2276053","article-title":"Short-Term Load and Wind Power Forecasting Using Neural Network-Based Prediction Intervals","volume":"25","author":"Hao","year":"2014","journal-title":"IEEE Trans. Neural Netw. Learn Syst."},{"key":"ref_45","first-page":"1818","article-title":"Receiver Operating Characteristic (ROC) Curve","volume":"67","author":"Melo","year":"2013","journal-title":"Springer N. Y."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Keogh, E., Lonardi, S., and Chiu, W. (2002, January 23\u201326). Finding surprising patterns in a time series database in linear time and space. Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, AB, Canada.","DOI":"10.1145\/775047.775128"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.cam.2007.02.027","article-title":"Multi-scale anomaly detection algorithm based on infrequent pattern of time series","volume":"214","author":"Chen","year":"2008","journal-title":"J. Comput. Appl. Math."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/485954","article-title":"An anomaly detection based on data fusion algorithm in wireless sensor networks","volume":"2015","author":"Guo","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/TKDE.2003.1198399","article-title":"Data structures and algorithms haar wavelets for efficient similarity search of time series: With and without time warping","volume":"15","author":"Chan","year":"2003","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/4\/967\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:58:24Z","timestamp":1760194704000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/4\/967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,24]]},"references-count":50,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,4]]}},"alternative-id":["s18040967"],"URL":"https:\/\/doi.org\/10.3390\/s18040967","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,24]]}}}