{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:35:44Z","timestamp":1760240144182,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T00:00:00Z","timestamp":1553731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272420","61802185"],"award-info":[{"award-number":["61272420","61802185"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20180470"],"award-info":[{"award-number":["BK20180470"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In wireless sensor networks (WSNs), there are many challenges for outlier detection, such as fault detection, fraud detection, intrusion detection, and so on. In this paper, the participation degree of instances in the hierarchical clustering process infers the relationship between instances. However, most of the existing algorithms ignore such information. Thus, we propose a novel fault detection technique based on the participation degree, called fault detection based on participation degree (FDP). Our algorithm has the following advantages. First, it does not need data training in labeled datasets; in fact, it uses the participation degree to measure the differences between fault points and normal points without setting distance or density parameters. Second, FDP can detect global outliers without local cluster influence. Experimental results demonstrate the performance of our approach by applying it to synthetic and real-world datasets and contrasting it with four well-known techniques: isolation forest (IF), local outlier factor (LOF), one-class support vector machine (OCS), and robust covariance (RC).<\/jats:p>","DOI":"10.3390\/s19071522","type":"journal-article","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T03:38:52Z","timestamp":1553830732000},"page":"1522","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Participation Degree-Based Fault Detection Method for Wireless Sensor Networks"],"prefix":"10.3390","volume":"19","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Nanjing University of Science and Technology, NO. 200 Xiaolingwei Road, Nanjing 210094, China"},{"name":"Computer Science and Technology, Huaiyin Normal University, NO. 111 Changjiangxi Road, Huai\u2019an 223300, China"}]},{"given":"Gongxuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Nanjing University of Science and Technology, NO. 200 Xiaolingwei Road, Nanjing 210094, China"}]},{"given":"Xiaohui","family":"Chen","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Nanjing University of Science and Technology, NO. 200 Xiaolingwei Road, Nanjing 210094, China"},{"name":"Computer Science and Technology, Huaiyin Normal University, NO. 111 Changjiangxi Road, Huai\u2019an 223300, China"}]},{"given":"Xiumin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Nanjing University of Science and Technology, NO. 200 Xiaolingwei Road, Nanjing 210094, China"}]},{"given":"Yueqi","family":"Liu","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Nanjing University of Science and Technology, NO. 200 Xiaolingwei Road, Nanjing 210094, China"},{"name":"Computer Science and Technology, Huaiyin Normal University, NO. 111 Changjiangxi Road, Huai\u2019an 223300, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7734-4077","authenticated-orcid":false,"given":"Junlong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Nanjing University of Science and Technology, NO. 200 Xiaolingwei Road, Nanjing 210094, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Garcia-Font, V., Garrigues, C., and Rif\u00e0-Pous, H. (2018). Difficulties and Challenges of Anomaly Detection in Smart Cities: A Laboratory Analysis. Sensors, 18.","DOI":"10.3390\/s18103198"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Huan, Z., Wei, C., and Li, G.H. (2018). Outlier Detection in Wireless Sensor Networks Using Model Selection-Based Support Vector Data Descriptions. Sensors, 18.","DOI":"10.3390\/s18124328"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Vasta, R., Crandell, I., Millican, A., House, L., and Smith, E. (2017). Outlier Detection for Sensor Systems (ODSS): A MATLAB Macro for Evaluating Microphone Sensor Data Quality. Sensors, 17.","DOI":"10.3390\/s17102329"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly Detection: A Survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"key":"ref_5","unstructured":"Tan, P., Steinbach, M., and Kumar, V. (2005). Introduction to Data Mining, Addison-Wesley Longman, Inc."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the Support of a High-Dimensional Distribution","volume":"13","author":"Platt","year":"2001","journal-title":"Neural Comput."},{"key":"ref_7","unstructured":"Papadimitriou, S., Kitagawa, H., Gibbons, P.B., and Faloutsos, C. (2003, January 5\u20138). LOCI: Fast outlier detection using the local correlation integral. Proceedings of the 19th International Conference on Data Engineering, Bangalore, India."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s11634-010-0070-7","article-title":"Outlier detection and robust covariance estimation using mathematical programming","volume":"4","author":"Nguyen","year":"2010","journal-title":"Adv. Data Anal. Classif."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2133360.2133363","article-title":"Isolation-Based Anomaly Detection","volume":"6","author":"Liu","year":"2012","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1478","DOI":"10.1016\/j.patcog.2014.10.003","article-title":"Cluster validity measure and merging system for hierarchical clustering considering outliers","volume":"48","author":"Tuia","year":"2015","journal-title":"Pattern Recognit."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1080\/02664763.2017.1342779","article-title":"A clustering approach to detect multiple outliers in linear functional relationship model for circular data","volume":"45","author":"Mokhtar","year":"2018","journal-title":"J. Appl. Stat."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.ifacol.2018.09.604","article-title":"Diagnosis of Fluid Leaks in Pipelines Using Dynamic PCA","volume":"51","author":"Puig","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"ref_13","unstructured":"Knorr, E.M., and Ng, R.T. (1998, January 24\u201327). Algorithms for Mining Distance-Based Outliers in Large Datasets. Proceedings of the 24rd International Conference on Very Large Data Bases, New York, NY, USA."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","article-title":"Distance-based Outliers: Algorithms and Applications","volume":"8","author":"Knorr","year":"2000","journal-title":"VLDB J."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., and Shim, K. (2000, January 15\u201318). Efficient Algorithms for Mining Outliers from Large Data Sets. Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA.","DOI":"10.1145\/342009.335437"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Niu, K., Huang, C., Zhang, S., and Chen, J. (2007). ODDC: Outlier Detection Using Distance Distribution Clustering. Emerging Technologies in Knowledge Discovery and Data Mining, Springer.","DOI":"10.1007\/978-3-540-77018-3_34"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/335191.335388","article-title":"LOF: Identifying Density-based Local Outliers","volume":"29","author":"Breunig","year":"2000","journal-title":"SIGMOD Rec."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1109\/TKDE.2003.1232271","article-title":"Efficient biased sampling for approximate clustering and outlier detection in large data sets","volume":"15","author":"Kollios","year":"2003","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.neucom.2017.02.039","article-title":"A local density-based approach for outlier detection","volume":"241","author":"Tang","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.chemolab.2007.01.005","article-title":"Improving hierarchical cluster analysis: A new method with outlier detection and automatic clustering","volume":"87","author":"Almeida","year":"2007","journal-title":"Chemom. Intell. Lab. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Jiang, S., and An, Q. (2008, January 18\u201320). Clustering-Based Outlier Detection Method. Proceedings of the 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery, Shandong, China.","DOI":"10.1109\/FSKD.2008.244"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.18576\/amis\/100332","article-title":"An Improved Agglomerative Clustering Algorithm for Outlier Detection","volume":"10","author":"Krishnamoorthy","year":"2016","journal-title":"Appl. Math. Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.ins.2017.03.030","article-title":"An information-theoretic approach to hierarchical clustering of uncertain data","volume":"402","author":"Gullo","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_24","first-page":"860","article-title":"Identification of Outliers","volume":"37","author":"Hawkins","year":"2018","journal-title":"Biometrics"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Zhang, W., Zhang, G., Wang, Y., Zhu, Z., and Li, T. (2015, January 7\u20139). NNB: An efficient nearest neighbor search method for hierarchical clustering on large datasets. Proceedings of the 2015 IEEE International Conference on Semantic Computing (ICSC), Anaheim, CA, USA.","DOI":"10.1109\/ICOSC.2015.7050840"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/BF01890115","article-title":"Efficient algorithms for agglomerative hierarchical clustering methods","volume":"1","author":"Day","year":"1984","journal-title":"J. Classif."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Mirkin, B. (1998). Mathematical Classification and Clustering: From How to What and Why. Classification, Data Analysis, and Data Highways, Springer.","DOI":"10.1007\/978-3-642-72087-1_20"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1093\/comjnl\/10.3.271","article-title":"A general theory of classificatory sorting strategies II. Clustering systems","volume":"10","author":"Lance","year":"1967","journal-title":"Comput. J."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Zhou, J., Sun, J., Zhou, X., Wei, T., Chen, M., Hu, S., and Hu, X. (2019). Resource Management for Improving Soft-Error and Lifetime Reliability of Real-Time MPSoCs. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.","DOI":"10.1109\/TCAD.2018.2883993"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF00288933","article-title":"Quad trees a data structure for retrieval on composite keys","volume":"4","author":"Finkel","year":"1974","journal-title":"Acta Inform."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"de Berg, M., van Kreveld, M., Overmars, M., and Schwarzkopf, O. (2000). Computational Geometry. Computational Geometry, Springer.","DOI":"10.1007\/978-3-662-04245-8"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1145\/282957.282966","article-title":"Storing a collection of polygons using quadtrees","volume":"4","author":"Samet","year":"1985","journal-title":"ACM Trans. Graph."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1145\/361002.361007","article-title":"Multidimensional binary search trees used for associative searching","volume":"18","author":"Bentley","year":"1975","journal-title":"Commun. ACM"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Wald, I., and Havran, V. (2006, January 18\u201320). On building fast kd-trees for ray tracing, and on doing that in O (N log N). Proceedings of the IEEE Symposium on Interactive Ray Tracing 2006, Salt Lake City, UT, USA.","DOI":"10.1109\/RT.2006.280216"},{"key":"ref_35","first-page":"71","article-title":"Cluster Aggregate Inequality and Multi-level Hierarchical Clustering","volume":"Volume 3721","author":"Ding","year":"2005","journal-title":"Knowledge Discovery in Databases: PKDD 2005"},{"key":"ref_36","first-page":"975","article-title":"Time complexity analysis of support vector machines (SVM) in LibSVM","volume":"128","author":"Ns","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_37","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"FPedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"An introduction to ROC analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"ref_39","first-page":"37","article-title":"Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation","volume":"2","author":"Powers","year":"2008","journal-title":"J. Mach. Learn. Technol."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"5186","DOI":"10.1016\/j.csda.2007.11.008","article-title":"An adjusted boxplot for skewed distributions","volume":"52","author":"Hubert","year":"2008","journal-title":"Comput. Stat. Data Anal."},{"key":"ref_41","unstructured":"Blake, C., and Merz, C.J. (2018, March 17). UCI Repository of Machine Learning Databases. Available online: http:\/\/archive.ics.uci.edu\/ml\/index.php."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Rohra, J.G., Perumal, B., Narayanan, S.J., Thakur, P., and Bhatt, R.B. (2016, January 23\u201324). User Localization in an Indoor Environment using Fuzzy Hybrid of Particle Swarm Optimization & Gravitational Search Algorithm with Neural Networks. Proceedings of the Sixth International Conference on Soft Computing for Problem Solving, Patiala, India.","DOI":"10.1007\/978-981-10-3322-3_27"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/7\/1522\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:41:21Z","timestamp":1760186481000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/7\/1522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,28]]},"references-count":42,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,4]]}},"alternative-id":["s19071522"],"URL":"https:\/\/doi.org\/10.3390\/s19071522","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,3,28]]}}}