851
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Anomalous behavior detection in single-trajectory data

Pages 2075-2094 | Received 09 Mar 2015, Accepted 14 Jun 2015, Published online: 09 Jul 2015

References

  • Ahmed, M., et al., 2014. A comparison and evaluation of map construction algorithms. CoRR, abs/1402.5138
  • Bu, Y., et al., 2009. Efficient anomaly monitoring over moving object trajectory streams. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’09, Paris, France: ACM, 159–168.
  • Chandola, V., Banerjee, A., and Kumar, V., 2009. Anomaly detection: A survey. ACM Computer Survey, 41 (3), 1–58. doi:10.1145/1541880
  • Hu, W., et al., 2006. A system for learning statistical motion patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28 (9), 1450–1464. doi:10.1109/TPAMI.2006.176
  • Huang, H., Zhang, L., and Sester, M., 2014. A recursive Bayesian filter for anomalous behavior detection in trajectory data. In: J. Huerta, S. Schade, and C. Granell, eds. Connecting a digital Europe through location and place, the 17th AGILE conference on geographic information science, vol. ii of lecture notes in geoinformation and cartography. Springer International Publishing, 91–104.
  • Kalman, R.E., 1960. A new approach to linear filtering and prediction problems. Transactions of the ASME–Journal of Basic Engineering, 82 (Series D), 35–45.
  • Kim, K., Lee, D., and Essa, I., 2011. Gaussian process regression flow for analysis of motion trajectories. In: Proceedings of IEEE international conference on computer vision (ICCV), November.
  • Laxhammar, R. and Falkman, G., 2014. Online learning and sequential anomaly detection in trajectories. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36 (6), 1158–1173. doi:10.1109/TPAMI.2013.172
  • Ma, T.S., 2009. Real-time anomaly detection for traveling individuals. In: Proceedings of the 11th international ACM SIGACCESS conference on computers and accessibility, Assets ’09. Pittsburgh, PA: ACM, 273–274.
  • Masreliez, C. and Martin, R., 1977. Robust Bayesian estimation for the linear model and robustifying the Kalman filter. IEEE Transactions on Automatic Control, 22 (3), 361–371. doi:10.1109/TAC.1977.1101538
  • Morris, B. and Trivedi, M., 2008. A survey of vision-based trajectory learning and analysis for surveillance. IEEE transactions on circuits and systems for video technology, 18 (8), 1114–1127. doi:10.1109/TCSVT.2008.927109
  • Pang, L.X., et al., 2011. On mining anomalous patterns in road traffic streams. In: Proceedings of the 7th international conference on advanced data mining and applications - Volume Part II, ADMA’11. Beijing: Springer-Verlag, 237–251.
  • Pang, L.X., et al., 2013. On detection of emerging anomalous traffic patterns using GPS data. Data & Knowledge Engineering, 87, 357–373. doi:10.1016/j.datak.2013.05.002
  • Piciarelli, C., Micheloni, C., and Foresti, G., 2008. Trajectory-based anomalous event detection. IEEE Transactions on Circuits and Systems for Video Technology, 18 (11), 1544–1554. doi:10.1109/TCSVT.2008.2005599
  • Prevost, C., Desbiens, A., and Gagnon, E., 2007. Extended Kalman filter for state estimation and trajectory prediction of a moving object detected by an unmanned aerial vehicle. In: American Control Conference. ACC, 1805–1810.
  • Sillito, R. and Fisher, R.B., 2008. Semi-supervised learning for Anomalous Trajectory Detection. In: Proceedings of British Machine Vision Conference BMVC08, 1035–1044.
  • Sun, L., et al., 2012. Trajectory tracking based on iterated unscented Kalman filter of boost phase. In: IEEE International conference on service operations and logistics, and informatics (SOLI), 232–235.
  • Suzuki, N., et al., 2007. Learning motion patterns and anomaly detection by human trajectory analysis. In: ISIC. IEEE international conference on systems, man and cybernetics, 498–503.
  • Wiedemann, C. and Ebner, H., 2000. automatic completion and evaluation of road networks. In: International Archives of Photogrammetry and Remote Sensing B. 979–986.
  • Zheng, Y., et al., 2008. Understanding mobility based on GPS data. In: ACM conference on ubiquitous computing (UbiComp 2008). Seoul: ACM Press, 312–321.
  • Zheng, Y., et al., 2009. Mining interesting locations and travel sequences from GPS trajectories. In: International conference on World Wide Web (WWW 2009). Madrid: ACM Press, 791–800.
  • Zheng, Y., Xie, X., and Ma, W.Y., 2010. GeoLife: a collaborative social networking service among user, location and trajectory. IEEE Data Engineering Bulletin, 33/2, 32–40.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.