{"id":"https://openalex.org/W2162233434","doi":"https://doi.org/10.1145/2494091.2499774","title":"FLEAD","display_name":"FLEAD","publication_year":2013,"publication_date":"2013-09-08","ids":{"openalex":"https://openalex.org/W2162233434","doi":"https://doi.org/10.1145/2494091.2499774","mag":"2162233434"},"language":"en","primary_location":{"id":"doi:10.1145/2494091.2499774","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2494091.2499774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/5457034/pucaa24-le.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047387494","display_name":"Viet Duc Le","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Viet Duc Le","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036090733","display_name":"Hans Scholten","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Hans Scholten","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067566830","display_name":"Paul Havinga","orcid":"https://orcid.org/0000-0002-3399-1790"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Paul Havinga","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047387494"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":0.9955,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.83687142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1159","last_page":"1166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7860507965087891},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.7607756853103638},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6868963837623596},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6570632457733154},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5965102910995483},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5459070801734924},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44301486015319824},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.41788822412490845},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.36104726791381836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3069823682308197},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29480665922164917},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.07285720109939575}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7860507965087891},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.7607756853103638},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6868963837623596},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6570632457733154},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5965102910995483},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5459070801734924},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44301486015319824},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.41788822412490845},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.36104726791381836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3069823682308197},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29480665922164917},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.07285720109939575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2494091.2499774","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2494091.2499774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:publications/40f20196-6603-44d0-bff6-70c9e0b23d4e","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/40f20196-6603-44d0-bff6-70c9e0b23d4e","pdf_url":"https://ris.utwente.nl/ws/files/5457034/pucaa24-le.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Le Viet Duc, L D, Scholten, J & Havinga, P J M 2013, FLEAD: online frequency likelihood estimation anomaly detection for mobile sensing. in Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13. Association for Computing Machinery, New York, pp. 1159-1166, ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, Zurich, Switzerland, 8/09/13. https://doi.org/10.1145/2494091.2499774","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:publications/40f20196-6603-44d0-bff6-70c9e0b23d4e","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/40f20196-6603-44d0-bff6-70c9e0b23d4e","pdf_url":"https://ris.utwente.nl/ws/files/5457034/pucaa24-le.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Le Viet Duc, L D, Scholten, J & Havinga, P J M 2013, FLEAD: online frequency likelihood estimation anomaly detection for mobile sensing. in Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13. Association for Computing Machinery, New York, pp. 1159-1166, ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, Zurich, Switzerland, 8/09/13. https://doi.org/10.1145/2494091.2499774","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8999999761581421,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2162233434.pdf","grobid_xml":"https://content.openalex.org/works/W2162233434.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W1964375680","https://openalex.org/W2000832852","https://openalex.org/W2005746827","https://openalex.org/W2038819732","https://openalex.org/W2050351426","https://openalex.org/W2101916222","https://openalex.org/W2122646361","https://openalex.org/W2131904035","https://openalex.org/W2150882603"],"related_works":["https://openalex.org/W2394004323","https://openalex.org/W2398764543","https://openalex.org/W2027335291","https://openalex.org/W4210328553","https://openalex.org/W2105642232","https://openalex.org/W1980417906","https://openalex.org/W2165251242","https://openalex.org/W2171784184","https://openalex.org/W2007994675","https://openalex.org/W4367857133"],"abstract_inverted_index":{"With":[0],"the":[1,30,73,95,104],"rise":[2],"of":[3,75,84,88,99],"smartphone":[4],"platforms,":[5],"adaptive":[6],"sensing":[7,116],"becomes":[8],"an":[9],"predominant":[10],"key":[11],"to":[12,25,37],"overcome":[13],"intricate":[14],"constraints":[15],"such":[16,41],"as":[17,42],"smartphone's":[18],"capabilities":[19],"and":[20,59,108],"dynamic":[21],"data.":[22],"One":[23],"way":[24],"do":[26],"this":[27],"is":[28,106],"estimating":[29],"event":[31],"probability":[32,98],"based":[33],"on":[34,44,121],"anomaly":[35,53,68],"detection":[36,54,69],"invoke":[38],"heavy":[39],"processes,":[40],"switching":[43],"more":[45],"sensors":[46,87],"or":[47],"retrieving":[48],"information.":[49],"However,":[50],"most":[51],"conventional":[52],"methods":[55],"are":[56,124],"power":[57],"hungry":[58],"computation":[60],"consuming.":[61],"This":[62],"paper":[63],"proposes":[64],"a":[65,82],"new":[66],"online":[67],"algorithm":[70,92,105],"by":[71],"capturing":[72],"likelihood":[74],"frequency":[76],"histogram":[77],"given":[78],"features":[79],"extracted":[80],"from":[81,86],"stream":[83],"measurements":[85],"multiple":[89],"smartphones.":[90],"The":[91],"then":[93],"estimates":[94],"mixed":[96],"density":[97],"anomalies.":[100],"By":[101],"doing":[102],"so,":[103],"lightweight":[107],"energy":[109],"efficient,":[110],"which":[111],"underpins":[112],"large":[113],"scale":[114],"mobile":[115],"applications.":[117],"Experimental":[118],"results":[119],"run":[120],"Android":[122],"phones":[123],"consistent":[125],"with":[126],"our":[127],"theoretical":[128],"analysis.":[129]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2016-06-24T00:00:00"}
