{"id":"https://openalex.org/W2942467438","doi":"https://doi.org/10.1109/access.2019.2909750","title":"A Collective Anomaly Detection Approach for Multidimensional Streams in Mobile Service Security","display_name":"A Collective Anomaly Detection Approach for Multidimensional Streams in Mobile Service Security","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2942467438","doi":"https://doi.org/10.1109/access.2019.2909750","mag":"2942467438"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2909750","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2909750","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08691875.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08691875.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024296105","display_name":"Yu Weng","orcid":"https://orcid.org/0000-0002-0787-550X"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Weng","raw_affiliation_strings":["School of Information Engineering, Minzu University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Minzu University of China, Beijing, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100349530","display_name":"Lei Liu","orcid":"https://orcid.org/0009-0003-3674-7237"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Liu","raw_affiliation_strings":["School of Information Engineering, Minzu University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Minzu University of China, Beijing, China","institution_ids":["https://openalex.org/I145897649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024296105"],"corresponding_institution_ids":["https://openalex.org/I145897649"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.7342,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.8854288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"49157","last_page":"49168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8285924792289734},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7987300157546997},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5900778770446777},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5660679340362549},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.5052497982978821},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32219576835632324}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8285924792289734},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7987300157546997},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5900778770446777},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5660679340362549},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.5052497982978821},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32219576835632324},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2909750","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2909750","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08691875.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e65c401dfd4f42b7bd373e4288e15900","is_oa":true,"landing_page_url":"https://doaj.org/article/e65c401dfd4f42b7bd373e4288e15900","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 49157-49168 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2909750","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2909750","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08691875.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3018770167","display_name":null,"funder_award_id":"2017YFB1402101","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3141632398","display_name":null,"funder_award_id":"61772575","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4465251987","display_name":null,"funder_award_id":"2017YFB1402101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G466649759","display_name":null,"funder_award_id":"2017Y","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4678737013","display_name":null,"funder_award_id":"2017YFB140","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5347105962","display_name":null,"funder_award_id":"B14021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7429600474","display_name":null,"funder_award_id":"2017YFB1","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8340078520","display_name":null,"funder_award_id":"2017YF","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8365407071","display_name":null,"funder_award_id":"1402101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8823009050","display_name":null,"funder_award_id":"2017YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2942467438.pdf","grobid_xml":"https://content.openalex.org/works/W2942467438.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W201138236","https://openalex.org/W1442292319","https://openalex.org/W1510174091","https://openalex.org/W1970978220","https://openalex.org/W1975188201","https://openalex.org/W1995443851","https://openalex.org/W2038819732","https://openalex.org/W2039260438","https://openalex.org/W2044019460","https://openalex.org/W2070808135","https://openalex.org/W2074250989","https://openalex.org/W2081014471","https://openalex.org/W2093606067","https://openalex.org/W2122646361","https://openalex.org/W2131166445","https://openalex.org/W2159473903","https://openalex.org/W2296719434","https://openalex.org/W2319025701","https://openalex.org/W2338852587","https://openalex.org/W2410548068","https://openalex.org/W2472119793","https://openalex.org/W2496268794","https://openalex.org/W2522803339","https://openalex.org/W2524573328","https://openalex.org/W2584316068","https://openalex.org/W2737551799","https://openalex.org/W2753661786","https://openalex.org/W2891812095","https://openalex.org/W2897510551","https://openalex.org/W2901048538","https://openalex.org/W4242702158","https://openalex.org/W6608319088","https://openalex.org/W6628678161","https://openalex.org/W6630465102","https://openalex.org/W6679434643","https://openalex.org/W6703385127","https://openalex.org/W6720330311"],"related_works":["https://openalex.org/W3190734578","https://openalex.org/W1595351371","https://openalex.org/W807005383","https://openalex.org/W2182399080","https://openalex.org/W1501624740","https://openalex.org/W1984941792","https://openalex.org/W2369440580","https://openalex.org/W91065195","https://openalex.org/W2964556660","https://openalex.org/W3191523773"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1,44,59,122],"in":[2,16,31,60,130,169,207],"many":[3],"applications":[4],"is":[5,78,87,102],"becoming":[6],"more":[7,9],"and":[8,14,27,64,85,175],"important,":[10],"especially":[11],"for":[12,45,124,156],"security":[13,209],"privacy":[15],"mobile":[17,25,28,141,157],"service":[18,158],"computing":[19],"domains":[20],"with":[21],"the":[22,41,54,57,71,91,109,113,190,195,208],"development":[23],"of":[24,50,74,112,115,154,204],"internet":[26],"cloud":[29,132,142],"computing,":[30],"which":[32],"data":[33,94],"are":[34],"typical":[35],"multidimensional":[36,46,61,75,93,125,205],"time":[37,62,66,76,83,173],"series":[38,63,67,77,84],"data.":[39,68],"However,":[40],"collective":[42,120,202],"anomaly":[43,58,97,121,203],"streams":[47,126,206],"exists":[48],"lots":[49],"problems,":[51],"owing":[52],"to":[53,89,171],"differences":[55],"between":[56],"univariate":[65,82],"For":[69],"example,":[70],"temporal":[72],"continuity":[73],"much":[79],"weaker":[80],"than":[81],"it":[86],"unreasonable":[88],"judge":[90],"entire":[92],"as":[95],"an":[96],"if":[98],"a":[99,118,131,163,201],"certain":[100],"dimension":[101],"abnormal.":[103],"In":[104],"this":[105],"paper,":[106],"we":[107,161],"consider":[108],"statistical":[110],"features":[111,139],"subsequence":[114],"streams,":[116],"proposing":[117],"novel":[119],"algorithm":[123,197],"based":[127],"on":[128,181],"iForest":[129],"environment,":[133],"namely":[134],"iForestFS.":[135],"When":[136],"using":[137,166],"different":[138,152],"about":[140,185],"services'":[143],"metrics":[144],"suggested":[145],"by":[146],"domain":[147],"knowledge,":[148],"iForestFS":[149,165],"could":[150],"detect":[151,200],"kinds":[153],"anomalies":[155],"security.":[159],"Furthermore,":[160],"implement":[162],"distributed":[164],"spark":[167],"framework":[168],"order":[170],"improve":[172],"performance":[174],"scalability.":[176],"The":[177],"experimental":[178],"results":[179],"performed":[180],"three":[182],"datasets":[183],"(mainly":[184],"network":[186],"security)":[187],"derived":[188],"from":[189],"UCI":[191],"repository":[192],"demonstrate":[193],"that":[194],"proposed":[196],"can":[198],"effectively":[199],"domain.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
