{"id":"https://openalex.org/W2118213996","doi":"https://doi.org/10.1109/isi.2009.5137271","title":"Change point detection based on call detail records","display_name":"Change point detection based on call detail records","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2118213996","doi":"https://doi.org/10.1109/isi.2009.5137271","mag":"2118213996"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2009.5137271","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2009.5137271","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020857648","display_name":"Huiqi Zhang","orcid":"https://orcid.org/0000-0001-8430-691X"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Huiqi Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, University of North Texas, USA","Department of Computer Science and Engineering , University of North Texas , USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of North Texas, USA","institution_ids":["https://openalex.org/I123534392"]},{"raw_affiliation_string":"Department of Computer Science and Engineering , University of North Texas , USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077121598","display_name":"Ram Dantu","orcid":"https://orcid.org/0000-0001-9362-1559"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ram Dantu","raw_affiliation_strings":["Department of Computer Science and Engineering, University of North Texas, USA","Department of Computer Science and Engineering , University of North Texas , USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of North Texas, USA","institution_ids":["https://openalex.org/I123534392"]},{"raw_affiliation_string":"Department of Computer Science and Engineering , University of North Texas , USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031706073","display_name":"Jo\u00e3o W. Cangussu","orcid":null},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joao W. Cangussu","raw_affiliation_strings":["Department of Computer Science, University of Texas, Dallas, USA","Department of Computer Science, University of Texas at Dallas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas, Dallas, USA","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science, University of Texas at Dallas, USA","institution_ids":["https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020857648"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":0.901,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81279856,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"19","issue":null,"first_page":"55","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9718999862670898,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8033778667449951},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.56130450963974},{"id":"https://openalex.org/keywords/noise-reduction","display_name":"Noise reduction","score":0.5412620306015015},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5409427881240845},{"id":"https://openalex.org/keywords/minimax","display_name":"Minimax","score":0.5026483535766602},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.48052725195884705},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.427814781665802},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3395901918411255}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8033778667449951},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.56130450963974},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.5412620306015015},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5409427881240845},{"id":"https://openalex.org/C149728462","wikidata":"https://www.wikidata.org/wiki/Q751319","display_name":"Minimax","level":2,"score":0.5026483535766602},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.48052725195884705},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.427814781665802},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3395901918411255},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isi.2009.5137271","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2009.5137271","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.975.9614","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.975.9614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://cangussu.com/site/publications/PAPERS/ISI09_changepoint.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7200000286102295}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"},{"id":"https://openalex.org/F4320309369","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W187181963","https://openalex.org/W1597681648","https://openalex.org/W1967042859","https://openalex.org/W1978993842","https://openalex.org/W1998962613","https://openalex.org/W2014725859","https://openalex.org/W2022758229","https://openalex.org/W2054640142","https://openalex.org/W2072246452","https://openalex.org/W2079724595","https://openalex.org/W2082313778","https://openalex.org/W2103262698","https://openalex.org/W2116113455","https://openalex.org/W2116214697","https://openalex.org/W2132664270","https://openalex.org/W2135535184","https://openalex.org/W2136690843","https://openalex.org/W2158940042","https://openalex.org/W2164863077","https://openalex.org/W2171166366","https://openalex.org/W4214806317","https://openalex.org/W4238201623","https://openalex.org/W4244579272","https://openalex.org/W4249528953","https://openalex.org/W4255521522","https://openalex.org/W6607563550"],"related_works":["https://openalex.org/W2016058626","https://openalex.org/W2474724840","https://openalex.org/W2963760573","https://openalex.org/W2895916002","https://openalex.org/W1814049089","https://openalex.org/W1977348009","https://openalex.org/W2369683208","https://openalex.org/W2084836983","https://openalex.org/W1530911128","https://openalex.org/W2362133437"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,63],"propose":[4],"a":[5,85],"method":[6,28],"for":[7,14,40,84],"combining":[8],"wavelet":[9],"denoising":[10],"and":[11,37,55],"sequential":[12],"approach":[13],"detecting":[15,50],"change":[16],"points":[17],"on":[18,22],"mobile":[19],"phone":[20],"based":[21],"detailed":[23],"call":[24,38,67],"records.":[25],"The":[26,99],"Minmax":[27],"is":[29,44,92],"used":[30,94],"to":[31,46,95],"estimate":[32],"the":[33,79,97],"thresholds":[34],"of":[35,60,69,87],"frequency":[36],"duration":[39],"denoising.":[41],"This":[42],"work":[43],"useful":[45],"enhance":[47],"homeland":[48],"security,":[49],"unwanted":[51],"calls":[52],"(e.g.,":[53],"spam)":[54],"commercial":[56],"purposes.":[57],"For":[58],"validation":[59],"our":[61,104],"results,":[62],"randomly":[64],"choose":[65],"actual":[66],"logs":[68],"20":[70],"users":[71,74],"from":[72],"100":[73],"collected":[75],"at":[76],"MIT":[77],"by":[78],"Reality":[80],"Mining":[81],"Project":[82],"group":[83],"period":[86],"8":[88],"months.":[89],"Simulation":[90],"data":[91],"also":[93],"validate":[96],"results.":[98],"experimental":[100],"results":[101],"show":[102],"that":[103],"model":[105],"achieves":[106],"good":[107],"performance":[108],"with":[109],"high":[110],"accuracy.":[111]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
