{"id":"https://openalex.org/W7134890111","doi":"https://doi.org/10.1109/icdmw69685.2025.00185","title":"STREAM-LAD: A Practical Streaming Lifelong Anomaly Detection Algorithm for IoT","display_name":"STREAM-LAD: A Practical Streaming Lifelong Anomaly Detection Algorithm for IoT","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7134890111","doi":"https://doi.org/10.1109/icdmw69685.2025.00185"},"language":null,"primary_location":{"id":"doi:10.1109/icdmw69685.2025.00185","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdmw69685.2025.00185","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Data Mining Workshops (ICDMW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111371579","display_name":"Ruitao Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ruitao Xue","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128783865","display_name":"Devki Nandan Jha","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Devki Nandan Jha","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128754664","display_name":"Tomasz Szydlo","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tomasz Szydlo","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128779951","display_name":"Rajiv Ranjan","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rajiv Ranjan","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111371579"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88299036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1546","last_page":"1550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.2662999927997589,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.2662999927997589,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.14659999310970306,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.11580000072717667,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.519599974155426},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4036000072956085},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3043999969959259},{"id":"https://openalex.org/keywords/algorithm-design","display_name":"Algorithm design","score":0.2563000023365021}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6445000171661377},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.519599974155426},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4050000011920929},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4036000072956085},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31709998846054077},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30309998989105225},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2874999940395355},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdmw69685.2025.00185","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdmw69685.2025.00185","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Data Mining Workshops (ICDMW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2296509296","https://openalex.org/W2296719434","https://openalex.org/W2939423850","https://openalex.org/W2988337058","https://openalex.org/W3030364939","https://openalex.org/W3205303036","https://openalex.org/W3217458064","https://openalex.org/W4254182148","https://openalex.org/W4319586606","https://openalex.org/W4384407578","https://openalex.org/W4391915405","https://openalex.org/W4392902599","https://openalex.org/W4405429950","https://openalex.org/W4409567096","https://openalex.org/W4414360563"],"related_works":[],"abstract_inverted_index":{"Lifelong":[0],"anomaly":[1],"detection":[2],"holds":[3],"immense":[4],"promise":[5],"for":[6,158],"enabling":[7,135],"on-device":[8],"intelligence":[9],"in":[10,41,128],"the":[11,32,75,145,159],"Internet":[12],"of":[13,83,150,162],"Things":[14],"(IoT),":[15],"as":[16],"devices":[17],"need":[18],"to":[19,21,93],"adapt":[20],"evolving":[22],"environments":[23],"continuously.":[24],"State-of-the-art":[25],"algorithms":[26],"based":[27],"on":[28,46,62,138,168],"random":[29],"sub-sampling":[30],"and":[31,48,97,133],"Local":[33],"Outlier":[34],"Factor":[35],"(LOF)":[36],"have":[37],"demonstrated":[38],"high":[39],"accuracy":[40,106],"experiments.":[42],"However,":[43],"their":[44,60],"reliance":[45],"Python":[47,91],"resourceintensive":[49],"scientific":[50],"computing":[51],"libraries":[52],"has":[53],"created":[54],"a":[55,89,117,139,155],"critical":[56],"deployment":[57,129,137],"gap,":[58],"preventing":[59],"use":[61],"real-world,":[63],"resourceconstrained":[64],"microcontrollers":[65],"(MCUs).":[66],"This":[67],"paper":[68],"bridges":[69],"this":[70,84,151],"gap":[71],"by":[72],"presenting":[73],"STREAM-LAD,":[74],"first":[76,146],"high-performance,":[77],"self-contained":[78],"<tex":[79],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[80],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathbf{C}$</tex>":[81],"implementation":[82,103,149],"lifelong":[85,166],"learning":[86,167],"framework,":[87,152],"with":[88],"seamless":[90],"wrapper":[92],"facilitate":[94],"rapid":[95],"prototyping":[96],"evaluation.":[98],"We":[99],"demonstrate":[100],"that":[101,112],"our":[102,113],"achieves":[104],"full":[105],"parity.":[107],"More":[108],"importantly,":[109],"we":[110,153],"show":[111],"C-accelerated":[114],"version":[115],"provides":[116],"modest":[118],"but":[119],"consistent":[120],"latency":[121],"reduction":[122,127],"while":[123],"achieving":[124],"an":[125],"order-of-magnitude":[126],"footprint":[130],"(binary":[131],"size":[132],"memory),":[134],"its":[136],"real":[140],"MCU-based":[141],"hardware.":[142],"By":[143],"providing":[144],"open-source,":[147],"stream-native":[148],"provide":[154],"foundational":[156],"tool":[157],"next":[160],"wave":[161],"research":[163],"into":[164],"practical,":[165],"continuous":[169],"data":[170],"streams.":[171]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2026-03-12T00:00:00"}
