268
Views
4
CrossRef citations to date
0
Altmetric
Regular papers

Mapping grid based online taxi anomalous trajectory detection

ORCID Icon, &
Pages 1589-1603 | Received 26 Apr 2018, Accepted 17 May 2020, Published online: 17 Jun 2020

References

  • Angiulli, F., & Fassetti, F. (2009). Dolphin: An efficient algorithm for mining distance-based outliers in very large datasets. ACM Transactions on Knowledge Discovery from Data 3(1), 1–57. https://doi.org/10.1145/1497577.1497581
  • Bovenzi, A., Brancati, F., Russo, S., & Bondavalli, A. (2015). An OS-level framework for anomaly detection in complex software systems. IEEE Transactions on Dependable and Secure Computing, 12(3), 366–372. https://doi.org/10.1109/TDSC.2014.2334305
  • Breunig, M. M., Kriegel, H.-P., Ng, R. T., & Sander, J. (2000). LOF: Identifying density-based local outliers. In 2000 ACM SIGMOD - International Conference on Management of Data, May 16, 2000 - May 18, 2000, Dallas, TX, USA. ACM.
  • Bu, Y., Chen, L., Fu, A. W.-C., & Liu, D. (2009). Efficient anomaly monitoring over moving object trajectory streams. In The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '09, June 28, 2009 - July 1, 2009, Paris, France. Association for Computing Machinery.
  • Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58. https://doi.org/10.1145/1541880.1541882
  • Chen, Z. F., & Chang, T. (2005). Analysis and design of reliable control systems for urban traffic networks. International Journal of Systems Science, 36(11), 679–688. https://doi.org/10.1080/00207720500159912
  • Chen, C., Zhang, D., Castro, P. S., Li, N., Sun, L., & Li, S. (2012). Real-time detection of anomalous taxi trajectories from gps traces. In The 8th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2011, December 6, 2011 - December 9, 2011, Copenhagen, Denmark, Springer Verlag. (pp. 63–74). Springer.
  • Chen, C., Zhang, D. Q., Castro, P. S., Li, N., Sun, L., Li, S. J., & Wang, Z. H. (2013). iBOAT: Isolation-based online anomalous trajectory detection. IEEE Transactions on Intelligent Transportation Systems, 14(2), 806–818. https://doi.org/10.1109/TITS.2013.2238531
  • Ding, Z. (2017). Taxi driving anomalous route detection using GPS sampling data. In D. Yue, C. Peng, & D. Du (Eds.), Intelligent computing, networked control, and their engineering applications, LSMS 2017, ICSEE 2017. Communications in computer and information science (Vol. 762, pp. 304–312). Springer.
  • Ding, Z. G., Fei, M. R., Du, D. J., & Yang, F. (2017). Streaming data anomaly detection method based on hyper-grid structure and online ensemble learning. Soft Computing, 21(20), 5905–5917. https://doi.org/10.1007/s00500-016-2258-z
  • Ge, Y., Xiong, H., Liu, C., & Zhou, Z.-H. (2011). A taxi driving fraud detection system. In The 11th IEEE International Conference on Data Mining, ICDM 2011, December 11, 2011 - December 14, 2011, Vancouver, BC, Canada. Institute of Electrical and Electronics Engineers Inc.
  • Gupta, M., Gao, J., Aggarwal, C. C., & Han, J. (2014). Outlier detection for temporal data: A survey. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2250–2267. https://doi.org/10.1109/TKDE.2013.184
  • Huang, H., Yoo, S., Qin, H., & Yu, D. T. (2014). Physics-Based anomaly detection defined on manifold space. ACM Transactions on Knowledge Discovery from Data, 9(2), 1–39. https://doi.org/10.1145/2641574
  • Islam, M. S., Khreich, W., & Hamou-Lhadj, A. (2018). Anomaly detection techniques based on kappa-pruned ensembles. IEEE Transactions on Reliability, 67(1), 212–229. https://doi.org/10.1109/TR.2017.2787138
  • Knorr, E. M., Ng, R. T., & Tucakov, V. (2000). Distance-based outliers: Algorithms and applications. The VLDB Journal, 8(3-4), 237–253. https://doi.org/10.1007/s007780050006
  • Lee, J.-G., Han, J., & Li, X. (2008).  Trajectory outlier detection: A partition-and-detect framework. In The 24th IEEE  International Conference on Data Engineering, ICDE'08, April 7, 2008 - April 12, 2008, Cancun, Mexico. IEEE Computer Society.
  • Li, X., Li, Z., Han, J., & Lee, J.-G. (2009). Temporal outlier detection in vehicle traffic data. In The 25th IEEE International Conference on Data Engineering, ICDE 2009, March 29, 2009 – April 2, 2009, Shanghai, China. IEEE Computer Society.
  • Liu, S. Y., Ni, L. M., & Krishnan, R. (2014). Fraud detection from taxis’ driving behaviors. IEEE Transactions on Vehicular Technology, 63(1), 464–472. https://doi.org/10.1109/TVT.2013.2272792
  • Liu, W., Zheng, Y., Chawla, S., Yuan, J., & Xing, X. (2011). Discovering spatio-temporal causal interactions in traffic data streams. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'11, August 21, 2011–August 24, 2011, San Diego, CA, USA. Association for Computing Machinery.
  • Luo, S. Z., Tan, P. L., Sun, Q. L., Wu, W. N., Luo, H. W., & Chen, Z. Q. (2018). In-flight wind identification and soft landing control for autonomous unmanned powered parafoils. International Journal of Systems Science, 49(5), 929–946. https://doi.org/10.1080/00207721.2018.1433245
  • Mao, J. L., Wang, T., Jin, C. Q., & Zhou, A. Y. (2017). Feature grouping-based outlier detection upon streaming trajectories. IEEE Transactions on Knowledge and Data Engineering, 29(12), 2696–2709. https://doi.org/10.1109/TKDE.2017.2744619
  • Mohamad, I., Ali, M. A. M., & Ismail, M. (2011). Abnormal driving detection using real time global positioning system data. In 2011 IEEE International Conference on Space Science and Communication (IconSpace), July 12, 2011--July 13, 2011, Penang, Malaysia. IEEE.
  • Moshtaghi, M., Havens, T. C., Bezdek, J. C., Park, L., Leckie, C., Rajasegarar, S., Keller, J. M., & Palaniswami, M. (2011). Clustering ellipses for anomaly detection. Pattern Recognition, 44(1), 55–69. https://doi.org/10.1016/j.patcog.2010.07.024
  • Wang, Y., Miao, Q., Ma, E. W. M., Tsui, K. L., & Pecht, M. G. (2013). Online anomaly detection for hard disk drives based on Mahalanobis distance. IEEE Transactions on Reliability, 62(1), 136–145. https://doi.org/10.1109/TR.2013.2241204
  • Xiang, K., Zhou, X., & Jiang, J. P. (2008). Anomaly detection in complex system based on epsilon machine. International Journal of Systems Science, 39(10), 1007–1016. https://doi.org/10.1080/00207720802011266
  • Xie, M., Hu, J., Han, S., & Chen, H. (2012). Scalable hyper-grid k-nn-based online anomaly detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1661–1670. https://doi.org/10.1109/TPDS.2012.261
  • Yang, P., Li, J. S., & Huang, Y. X. (2011). HDD: A hypercube division-based algorithm for discretisation. International Journal of Systems Science, 42(4), 557–566. https://doi.org/10.1080/00207720903572455
  • Yu, Y., Cao, L., Rundensteiner, E. A., & Wang, Q. (2014). Detecting moving object outliers in massive-scale trajectory streams. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24, 2014–August 27, 2014, New York, NY, USA. ACM.
  • Yuan, G., Xia, S., Zhang, L., Zhou, Y., & Ji, C. (2011). Trajectory outlier detection algorithm based on structural features. Journal of Computational Information Systems, 7(11), 4137–4144.
  • Zhang, L., Hu, Z. M., & Yang, G. (2014). Trajectory outlier detection based on multi-factors. IEICE Transactions on Information and Systems, E97D(8), 2170–2173. https://doi.org/10.1587/transinf.E97.D.2170
  • Zhang, D., Li, N., Zhou, Z.-H., Chen, C., Sun, L., & Li, S. (2011). iBAT: detecting anomalous taxi trajectories from GPS traces. In Proceedings of the 13th International Conference on Ubiquitous Computing, September 17, 2011–September21, 2011, Beijing, China. ACM.
  • Zhang, J. F., Zhang, S. L., Chang, K. H., & Qin, X. (2014). An outlier mining algorithm based on constrained concept lattice. International Journal of Systems Science, 45(5), 1170–1179. https://doi.org/10.1080/00207721.2012.745029
  • Zhu, J., Jiang, W., Liu, A., Liu, G., & Zhao, L. (2017). Effective and efficient trajectory outlier detection based on time-dependent popular route. World Wide Web-Internet and Web Information Systems, 20(1), 111–134. https://doi.org/10.1007/s11280-016-0400-6

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.