{"id":"https://openalex.org/W4403512878","doi":"https://doi.org/10.1145/3689429","title":"A New Tensor Summary Statistic for Real-Time Detection of Stealthy Anomaly in Avatar Interaction","display_name":"A New Tensor Summary Statistic for Real-Time Detection of Stealthy Anomaly in Avatar Interaction","publication_year":2024,"publication_date":"2024-10-17","ids":{"openalex":"https://openalex.org/W4403512878","doi":"https://doi.org/10.1145/3689429"},"language":"en","primary_location":{"id":"doi:10.1145/3689429","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3689429","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3689429","source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3689429","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034080994","display_name":"Jiuzhen Zeng","orcid":"https://orcid.org/0000-0001-5351-3895"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiuzhen Zeng","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049154222","display_name":"Laurence T. Yang","orcid":"https://orcid.org/0000-0002-7986-4244"},"institutions":[{"id":"https://openalex.org/I197191942","display_name":"St. Francis Xavier University","ror":"https://ror.org/01wcaxs37","country_code":"CA","type":"education","lineage":["https://openalex.org/I197191942"]},{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Laurence T. Yang","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China, the School of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, China, the Department of Computer Science, St. Francis Xavier University, Antigonish, Canada","Huazhong University of Science and Technology, China, Zhengzhou University, China, St. Francis Xavier University, Canada"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China, the School of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, China, the Department of Computer Science, St. Francis Xavier University, Antigonish, Canada","institution_ids":["https://openalex.org/I197191942"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, China, Zhengzhou University, China, St. Francis Xavier University, Canada","institution_ids":["https://openalex.org/I197191942","https://openalex.org/I47720641","https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406940","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0002-1071-378X"},"institutions":[{"id":"https://openalex.org/I91935597","display_name":"University of South China","ror":"https://ror.org/03mqfn238","country_code":"CN","type":"education","lineage":["https://openalex.org/I91935597"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["School of Electrical Engineering, University of South China, Hengyang, China","University of South China, China"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, University of South China, Hengyang, China","institution_ids":["https://openalex.org/I91935597"]},{"raw_affiliation_string":"University of South China, China","institution_ids":["https://openalex.org/I91935597"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junjie Su","orcid":"https://orcid.org/0009-0002-7635-7391"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Su","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102831516","display_name":"Xianjun Deng","orcid":"https://orcid.org/0000-0003-2641-1708"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianjun Deng","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5034080994"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":1.0245,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81179725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"21","issue":"2","first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8453288078308105},{"id":"https://openalex.org/keywords/avatar","display_name":"Avatar","score":0.7292816638946533},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6961735486984253},{"id":"https://openalex.org/keywords/statistic","display_name":"Statistic","score":0.5573620796203613},{"id":"https://openalex.org/keywords/tensor","display_name":"Tensor (intrinsic definition)","score":0.5461063385009766},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5087066292762756},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36531341075897217},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.35566169023513794},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.12484481930732727},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0723007321357727},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.071409672498703}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8453288078308105},{"id":"https://openalex.org/C2777365542","wikidata":"https://www.wikidata.org/wiki/Q83090","display_name":"Avatar","level":2,"score":0.7292816638946533},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6961735486984253},{"id":"https://openalex.org/C89128539","wikidata":"https://www.wikidata.org/wiki/Q1949963","display_name":"Statistic","level":2,"score":0.5573620796203613},{"id":"https://openalex.org/C155281189","wikidata":"https://www.wikidata.org/wiki/Q3518150","display_name":"Tensor (intrinsic definition)","level":2,"score":0.5461063385009766},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5087066292762756},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36531341075897217},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.35566169023513794},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.12484481930732727},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0723007321357727},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.071409672498703},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3689429","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3689429","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3689429","source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3689429","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3689429","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3689429","source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G765258713","display_name":null,"funder_award_id":"2022YFE0138600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4403512878.pdf"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W792141054","https://openalex.org/W1798398164","https://openalex.org/W2124861999","https://openalex.org/W2512573859","https://openalex.org/W2606429533","https://openalex.org/W2766702586","https://openalex.org/W2790496887","https://openalex.org/W2792029691","https://openalex.org/W2792169732","https://openalex.org/W2912919760","https://openalex.org/W2949469590","https://openalex.org/W2962799002","https://openalex.org/W2963885538","https://openalex.org/W2997965215","https://openalex.org/W3003532075","https://openalex.org/W3089039808","https://openalex.org/W3094345499","https://openalex.org/W3099086397","https://openalex.org/W3104616090","https://openalex.org/W3119217665","https://openalex.org/W3120598853","https://openalex.org/W3129165467","https://openalex.org/W3155567600","https://openalex.org/W3197913691","https://openalex.org/W4226504281","https://openalex.org/W4236907935","https://openalex.org/W4285225680","https://openalex.org/W4286750031","https://openalex.org/W4293371020","https://openalex.org/W4295308370","https://openalex.org/W4321790408","https://openalex.org/W4321835840","https://openalex.org/W4366985305","https://openalex.org/W4388196927"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Avatar":[0],"is":[1,41,57,83,116,152],"one":[2],"of":[3,30,128,135,143,158,210],"the":[4,18,28,33,37,63,86,94,107,121,126,133,141,144,155,159,192,208],"most":[5],"intuitive":[6],"central":[7],"components":[8],"in":[9,36,47,125,207],"Metaverse":[10],"and":[11,45,68,173,180,186,201],"faces":[12],"serious":[13],"security":[14,44],"problems,":[15],"particularly":[16,206],"during":[17],"interaction":[19,70,99,161],"with":[20,189,213],"each":[21],"other.":[22],"In":[23],"this":[24,50],"article,":[25],"we":[26],"consider":[27],"problem":[29],"timely":[31],"detecting":[32],"stealthy":[34,160,211],"anomaly":[35],"avatar":[38],"interaction,":[39],"which":[40,91],"crucial":[42],"for":[43,154],"privacy":[46],"Metaverse.":[48],"With":[49],"goal,":[51],"a":[52,112,148,214],"new":[53],"tensor":[54,80,87,108,122,137,145],"summary":[55,81,138,146],"statistic":[56,82,150],"proposed":[58,79,193],"first":[59],"to":[60,118],"well":[61],"depict":[62],"statistical":[64,95],"discrepancy":[65],"between":[66],"normal":[67],"anomalous":[69,129],"volume":[71,100,162],"samples,":[72,130],"even":[73],"when":[74],"anomalies":[75,212],"are":[76],"stealthy.":[77],"The":[78],"established":[84],"from":[85,106],"linear":[88],"representation":[89],"residual,":[90],"naturally":[92],"implies":[93],"probability":[96],"that":[97],"an":[98],"sample":[101],"lies":[102],"within":[103],"or":[104],"deviates":[105],"lateral":[109,123],"space.":[110],"Moreover,":[111],"convex":[113],"optimization":[114],"programme":[115],"introduced":[117],"robustly":[119],"recover":[120],"space":[124],"presence":[127],"thereby":[131],"enhancing":[132],"robustness":[134],"our":[136,184],"statistic.":[139],"On":[140],"basis":[142],"statistic,":[147],"non-parametric":[149],"framework":[151],"developed":[153],"real-time":[156],"detection":[157,171,194,199,209],"anomaly.":[163],"We":[164],"also":[165],"provide":[166],"theoretical":[167],"analysis":[168],"concerning":[169],"its":[170],"performance":[172],"parameter":[174],"selection.":[175],"Extensive":[176],"experiments":[177],"using":[178],"synthetic":[179],"real-world":[181],"datasets":[182],"verify":[183],"effectiveness":[185],"superiority.":[187],"Compared":[188],"benchmark":[190],"methods,":[191],"scheme":[195],"achieves":[196],"significantly":[197],"lower":[198],"delay":[200],"higher":[202],"false":[203],"alarm":[204],"period,":[205],"low":[215],"change":[216],"rate.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
