{"id":"https://openalex.org/W2294074492","doi":"https://doi.org/10.1109/icip.2015.7350992","title":"Anomaly detection by using random projection forest","display_name":"Anomaly detection by using random projection forest","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2294074492","doi":"https://doi.org/10.1109/icip.2015.7350992","mag":"2294074492"},"language":"en","primary_location":{"id":"doi:10.1109/icip.2015.7350992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip.2015.7350992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103421963","display_name":"Fan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"education","lineage":["https://openalex.org/I177738480"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Fan Chen","raw_affiliation_strings":["Japan Adv. Insti. Sci. Tech.(JAIST)"],"affiliations":[{"raw_affiliation_string":"Japan Adv. Insti. Sci. Tech.(JAIST)","institution_ids":["https://openalex.org/I177738480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101728117","display_name":"Zicheng Liu","orcid":"https://orcid.org/0000-0001-5894-7828"},"institutions":[{"id":"https://openalex.org/I4210164937","display_name":"Microsoft Research (United Kingdom)","ror":"https://ror.org/05k87vq12","country_code":"GB","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zicheng Liu","raw_affiliation_strings":["Microsoft Research Redmond"],"affiliations":[{"raw_affiliation_string":"Microsoft Research Redmond","institution_ids":["https://openalex.org/I4210164937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109127966","display_name":"Ming\u2013Ting Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming-ting Sun","raw_affiliation_strings":["University of Washington"],"affiliations":[{"raw_affiliation_string":"University of Washington","institution_ids":["https://openalex.org/I201448701"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103421963"],"corresponding_institution_ids":["https://openalex.org/I177738480"],"apc_list":null,"apc_paid":null,"fwci":1.2943,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.86688638,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1210","last_page":"1214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-projection","display_name":"Random projection","score":0.788283109664917},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.7741068005561829},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7482775449752808},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7093493342399597},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.701086699962616},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5881115198135376},{"id":"https://openalex.org/keywords/projection","display_name":"Projection (relational algebra)","score":0.5409245491027832},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5219357013702393},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4869493246078491},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.48372605443000793},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.43598946928977966},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.40466779470443726},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21971791982650757}],"concepts":[{"id":"https://openalex.org/C2777036070","wikidata":"https://www.wikidata.org/wiki/Q18393452","display_name":"Random projection","level":2,"score":0.788283109664917},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.7741068005561829},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7482775449752808},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7093493342399597},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.701086699962616},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5881115198135376},{"id":"https://openalex.org/C57493831","wikidata":"https://www.wikidata.org/wiki/Q3134666","display_name":"Projection (relational algebra)","level":2,"score":0.5409245491027832},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5219357013702393},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4869493246078491},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.48372605443000793},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.43598946928977966},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.40466779470443726},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21971791982650757},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icip.2015.7350992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip.2015.7350992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W278712781","https://openalex.org/W1967456674","https://openalex.org/W1972743048","https://openalex.org/W2022614480","https://openalex.org/W2102625004","https://openalex.org/W2106425441","https://openalex.org/W2110383222","https://openalex.org/W2111548551","https://openalex.org/W2118123209","https://openalex.org/W2118877769","https://openalex.org/W2122361470","https://openalex.org/W2145508099","https://openalex.org/W2149629196","https://openalex.org/W2170932168","https://openalex.org/W2296719434","https://openalex.org/W2533601739","https://openalex.org/W4293171766","https://openalex.org/W6677548441","https://openalex.org/W6682027995"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W1980222719","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,51],"present":[4],"a":[5,28,39],"novel":[6],"method":[7],"for":[8,20,79,89],"detecting":[9],"anomalies":[10],"from":[11],"surveillance":[12],"videos,":[13],"which":[14,76],"utilizes":[15],"the":[16,22,32,36,44,48,86,92,96,104],"random":[17,40,49],"projection":[18,41],"forest":[19,71],"evaluating":[21],"rarity":[23],"of":[24,35,56,98,103],"visual":[25],"clues":[26],"in":[27,38,47],"video":[29],"frame.":[30],"Given":[31],"hierarchical":[33],"clustering":[34],"data":[37],"tree":[42],"and":[43,59,64,95,116],"aggregation":[45],"process":[46],"forest,":[50],"achieve":[52],"both":[53],"efficient":[54],"estimation":[55],"incoming":[57],"samples":[58],"improved":[60],"robustness":[61],"against":[62],"under-fitting":[63],"over-fitting":[65],"under":[66],"improperly":[67],"selected":[68],"models.":[69],"Random":[70],"is":[72,77],"also":[73],"online":[74,81],"updatable,":[75],"meaningful":[78],"future":[80],"anomaly":[82,90,99],"detection.":[83],"We":[84],"designed":[85],"splitting":[87],"rule":[88],"detection,":[91],"system":[93],"framework":[94],"criterion":[97],"determination.":[100],"The":[101],"efficiency":[102],"proposed":[105],"methods":[106],"has":[107],"been":[108],"validated":[109],"by":[110],"experiments":[111],"on":[112],"public":[113],"UCSD":[114],"datasets":[115],"compared":[117],"with":[118],"previously":[119],"reported":[120],"results.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
