{"id":"https://openalex.org/W3001464562","doi":"https://doi.org/10.1109/bigdata47090.2019.9006354","title":"Fast Anomaly Detection in Multiple Multi-Dimensional Data Streams","display_name":"Fast Anomaly Detection in Multiple Multi-Dimensional Data Streams","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3001464562","doi":"https://doi.org/10.1109/bigdata47090.2019.9006354","mag":"3001464562"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata47090.2019.9006354","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006354","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Fast_Anomaly_Detection_in_Multiple_Multi-Dimensional_Data_Streams/20713270","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101500315","display_name":"Hongyu Sun","orcid":"https://orcid.org/0009-0002-4118-4777"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Hongyu Sun","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023499987","display_name":"Qiang He","orcid":"https://orcid.org/0000-0002-2607-4556"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Qiang He","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081316307","display_name":"Kewen Liao","orcid":"https://orcid.org/0000-0003-0371-6525"},"institutions":[{"id":"https://openalex.org/I86695891","display_name":"Australian Catholic University","ror":"https://ror.org/04cxm4j25","country_code":"AU","type":"education","lineage":["https://openalex.org/I86695891"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Kewen Liao","raw_affiliation_strings":["Peter Faber Business School, Australian Catholic University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Peter Faber Business School, Australian Catholic University, Sydney, Australia","institution_ids":["https://openalex.org/I86695891"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020449921","display_name":"Timos Sellis","orcid":"https://orcid.org/0000-0002-9067-5639"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Timos Sellis","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013126405","display_name":"Longkun Guo","orcid":"https://orcid.org/0000-0003-2891-4253"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longkun Guo","raw_affiliation_strings":["School of Computer Science, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076120553","display_name":"Xuyun Zhang","orcid":"https://orcid.org/0000-0001-7353-4159"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Xuyun Zhang","raw_affiliation_strings":["Faculty of Engineering, The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031318875","display_name":"Jun Shen","orcid":"https://orcid.org/0000-0002-9403-7140"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Shen","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100404363","display_name":"Feifei Chen","orcid":"https://orcid.org/0000-0001-5455-3792"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Feifei Chen","raw_affiliation_strings":["School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101500315"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":1.7338,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.89055039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1218","last_page":"1223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8563309907913208},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.837104082107544},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7801306247711182},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6137726902961731},{"id":"https://openalex.org/keywords/streams","display_name":"STREAMS","score":0.5389516949653625},{"id":"https://openalex.org/keywords/locality","display_name":"Locality","score":0.5241960883140564},{"id":"https://openalex.org/keywords/locality-sensitive-hashing","display_name":"Locality-sensitive hashing","score":0.5128591060638428},{"id":"https://openalex.org/keywords/data-stream","display_name":"Data stream","score":0.5025990009307861},{"id":"https://openalex.org/keywords/streaming-data","display_name":"Streaming data","score":0.4330669045448303},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.37522077560424805},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.11663278937339783},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.07883420586585999}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8563309907913208},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.837104082107544},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7801306247711182},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6137726902961731},{"id":"https://openalex.org/C42090638","wikidata":"https://www.wikidata.org/wiki/Q4048907","display_name":"STREAMS","level":2,"score":0.5389516949653625},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.5241960883140564},{"id":"https://openalex.org/C74270461","wikidata":"https://www.wikidata.org/wiki/Q1625299","display_name":"Locality-sensitive hashing","level":4,"score":0.5128591060638428},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.5025990009307861},{"id":"https://openalex.org/C2777611316","wikidata":"https://www.wikidata.org/wiki/Q39045282","display_name":"Streaming data","level":2,"score":0.4330669045448303},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.37522077560424805},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.11663278937339783},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.07883420586585999},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/bigdata47090.2019.9006354","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006354","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers1-4516","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers1/3492","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part B","raw_type":"presentation"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30135536","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:figshare.com:article/20713270","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Fast_Anomaly_Detection_in_Multiple_Multi-Dimensional_Data_Streams/20713270","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/148870","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/148870","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},{"id":"pmh:oai:researchbank.swinburne.edu.au:f5394fae-f46c-424c-b7a1-622ac1af3a7f/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/454664","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2019  IEEE International Conference on Big Data (Big Data 2019), Los Angeles, United States, 9-12 December 2019 / C. Baru, J. Huan, L. Khan, X. T. Hu, R. Ak, Y. Tian, R. Barga, C. Zaniolo, K. Lee and Y. F. Ye (eds.), pp. 1218-1223, article no. 9006354","raw_type":""}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20713270","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Fast_Anomaly_Detection_in_Multiple_Multi-Dimensional_Data_Streams/20713270","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1560256462","https://openalex.org/W1598260899","https://openalex.org/W1965395441","https://openalex.org/W1974561058","https://openalex.org/W1986332411","https://openalex.org/W1990537115","https://openalex.org/W1995443851","https://openalex.org/W2012833704","https://openalex.org/W2026493302","https://openalex.org/W2040263621","https://openalex.org/W2040574519","https://openalex.org/W2082938293","https://openalex.org/W2096552750","https://openalex.org/W2122646361","https://openalex.org/W2129281431","https://openalex.org/W2144182447","https://openalex.org/W2162006472","https://openalex.org/W2295268030","https://openalex.org/W2296719434","https://openalex.org/W2541635437","https://openalex.org/W2616332741","https://openalex.org/W2794689483","https://openalex.org/W4230940751","https://openalex.org/W4245050711","https://openalex.org/W6660556005"],"related_works":["https://openalex.org/W2734503711","https://openalex.org/W2888412392","https://openalex.org/W3123856595","https://openalex.org/W2108660516","https://openalex.org/W1582424504","https://openalex.org/W150715854","https://openalex.org/W4312370755","https://openalex.org/W4245250958","https://openalex.org/W2784309627","https://openalex.org/W3001464562"],"abstract_inverted_index":{"Multiple":[0],"multi-dimensional":[1,53,64,68,93],"data":[2,23,41,54,94],"streams":[3,24,55],"are":[4],"ubiquitous":[5],"in":[6,21,25,52,91,126],"the":[7,60],"modern":[8],"world,":[9],"such":[10,22],"as":[11],"IoT":[12],"applications,":[13],"GIS":[14],"applications":[15],"and":[16,30,42,110],"social":[17],"networks.":[18],"Detecting":[19],"anomalies":[20],"real-time":[26],"is":[27,34,74,97],"an":[28,76],"important":[29,77],"challenging":[31],"task.":[32],"It":[33],"able":[35],"to":[36],"provide":[37],"valuable":[38],"information":[39],"from":[40],"then":[43],"assists":[44],"decision-making.":[45],"However,":[46],"exiting":[47],"approaches":[48,132],"for":[49,67],"anomaly":[50,88],"detection":[51,72,89,136],"have":[56],"not":[57],"properly":[58],"considered":[59],"correlations":[61],"among":[62],"multiple":[63,92],"streams.":[65,95],"Moreover,":[66],"streaming":[69],"data,":[70],"online":[71],"speed":[73],"often":[75],"concern.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"propose":[83],"a":[84,100,123],"fast":[85],"yet":[86],"effective":[87],"approach":[90,121],"This":[96],"based":[98],"on":[99,115],"combination":[101],"of":[102],"ideas,":[103],"i.e.,":[104],"stream":[105],"pre-processing,":[106],"locality":[107],"sensitive":[108],"hashing":[109],"dynamic":[111],"isolation":[112],"forest.":[113],"Experiments":[114],"real":[116],"datasets":[117],"demonstrate":[118],"that":[119],"our":[120],"achieves":[122],"magnitude":[124],"increase":[125],"its":[127],"efficiency":[128],"compared":[129],"with":[130],"state-of-the-art":[131],"while":[133],"maintaining":[134],"competitive":[135],"accuracy.":[137]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
