{"id":"https://openalex.org/W4407953162","doi":"https://doi.org/10.1145/3701551.3703548","title":"Density-aware and Cluster-based Federated Anomaly Detection on Data Streams","display_name":"Density-aware and Cluster-based Federated Anomaly Detection on Data Streams","publication_year":2025,"publication_date":"2025-02-26","ids":{"openalex":"https://openalex.org/W4407953162","doi":"https://doi.org/10.1145/3701551.3703548"},"language":"en","primary_location":{"id":"doi:10.1145/3701551.3703548","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3701551.3703548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100654795","display_name":"Bin Li","orcid":"https://orcid.org/0000-0003-0876-2694"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bin Li","raw_affiliation_strings":["Intelligent Game and Decision Lab (IGDL), Beijing, China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Intelligent Game and Decision Lab (IGDL), Beijing, China, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100753411","display_name":"Li Cheng","orcid":"https://orcid.org/0000-0002-7666-8184"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Cheng","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100695329","display_name":"Zheng Qin","orcid":"https://orcid.org/0000-0003-4373-4111"},"institutions":[{"id":"https://openalex.org/I2802541053","display_name":"Academy of Military Medical Sciences","ror":"https://ror.org/02bv3c993","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2802541053"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Qin","raw_affiliation_strings":["Defense Innovation Institute, Academy of Military Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Defense Innovation Institute, Academy of Military Sciences, Beijing, China","institution_ids":["https://openalex.org/I2802541053"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101706134","display_name":"Yunlong Wu","orcid":"https://orcid.org/0000-0002-6911-954X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yunlong Wu","raw_affiliation_strings":["Intelligent Game and Decision Lab (IGDL), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Intelligent Game and Decision Lab (IGDL), Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100654795"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4849,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88424769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"651","last_page":"658"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7380355000495911},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6832793354988098},{"id":"https://openalex.org/keywords/streams","display_name":"STREAMS","score":0.6591414213180542},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.6168136596679688},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.6086231470108032},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4826710522174835},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4490148723125458},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3253520131111145},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13951906561851501},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13451790809631348}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7380355000495911},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6832793354988098},{"id":"https://openalex.org/C42090638","wikidata":"https://www.wikidata.org/wiki/Q4048907","display_name":"STREAMS","level":2,"score":0.6591414213180542},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.6168136596679688},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.6086231470108032},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4826710522174835},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4490148723125458},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3253520131111145},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13951906561851501},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13451790809631348}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3701551.3703548","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3701551.3703548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2122646361","https://openalex.org/W2584316068","https://openalex.org/W2899235912","https://openalex.org/W2951761524","https://openalex.org/W3008631145","https://openalex.org/W3013371665","https://openalex.org/W3023547461","https://openalex.org/W3086809868","https://openalex.org/W3133814152","https://openalex.org/W3164393065","https://openalex.org/W3189654197","https://openalex.org/W3190606159","https://openalex.org/W4223529215","https://openalex.org/W4285236840","https://openalex.org/W4289655069","https://openalex.org/W4361854852","https://openalex.org/W4390873433","https://openalex.org/W4393114579"],"related_works":["https://openalex.org/W2010317732","https://openalex.org/W2483328176","https://openalex.org/W2061705145","https://openalex.org/W4293083682","https://openalex.org/W3190734578","https://openalex.org/W1595351371","https://openalex.org/W2061507057","https://openalex.org/W91065195","https://openalex.org/W2964556660","https://openalex.org/W3191523773"],"abstract_inverted_index":{"Federated":[0,93],"active":[1,66],"anomaly":[2,35,67,95,108,123,189],"detection":[3,68,96,109,124],"on":[4,34,83,97,201],"data":[5,18,21,26,98,119,193,204],"streams":[6],"becomes":[7],"a":[8,46,104,140,148],"crucial":[9],"research":[10,85],"problem,":[11],"since":[12],"it":[13],"attempts":[14],"to":[15,217],"discover":[16],"anomalous":[17],"with":[19,111,129],"protecting":[20],"privacy":[22,52,194],"and":[23,63,91,159,168],"avoiding":[24],"extensive":[25,29],"labeling.":[27],"Although":[28],"work":[30,80],"has":[31,81],"been":[32],"conducted":[33],"detection,":[36],"distinguishing":[37,186],"similar":[38],"anomalies":[39,167],"of":[40,51,76,182],"different":[41],"categories":[42],"still":[43],"remains":[44],"quite":[45],"challenging":[47],"issue.":[48,72],"The":[49,121],"requirement":[50],"protection":[53],"in":[54,65,179,195],"federated":[55,107,122,197],"settings":[56],"aggravates":[57],"the":[58,74,170,177,196],"difficulties":[59],"for":[60,172],"instance":[61],"query":[62],"scoring":[64],"when":[69],"solving":[70],"this":[71,84],"To":[73],"best":[75],"our":[77],"knowledge,":[78],"limited":[79],"focused":[82],"area.":[86],"Therefore,":[87],"we":[88,138],"propose":[89,139],"Density-aware":[90],"cluster-based":[92],"Active":[94],"Streams,":[99],"called":[100],"DFAS.":[101],"We":[102],"design":[103],"novel":[105],"lightweight":[106],"clusters":[110,125],"density-aware":[112],"hash":[113,180],"cells,":[114],"which":[115,152],"successfully":[116],"capture":[117],"evolving":[118],"distribution.":[120],"are":[126],"incrementally":[127],"updated":[128],"an":[130],"acceptable":[131],"theoretical":[132],"reconstruction":[133],"error":[134],"guarantee.":[135],"In":[136],"addition,":[137],"straightforward":[141],"but":[142],"effective":[143],"metric":[144],"divergences":[145],"accompanied":[146],"by":[147,175,215],"greedy":[149],"search":[150],"algorithm,":[151],"takes":[153],"both":[154],"global":[155],"aggregation":[156],"bias":[157],"mitigation":[158],"efficiency":[160],"into":[161],"account.":[162],"At":[163],"last,":[164],"DFAS":[165,208],"detects":[166],"queries":[169],"instances":[171],"manual":[173],"labels":[174],"measuring":[176],"density":[178],"cells":[181],"each":[183],"cluster,":[184],"effectively":[185],"closely":[187],"distributed":[188],"classes":[190],"while":[191],"maintaining":[192],"setting.":[198],"Comprehensive":[199],"experiments":[200],"several":[202],"real-world":[203],"sets":[205],"show":[206],"that":[207],"outperforms":[209],"previous":[210],"methods,":[211],"improving":[212],"F1":[213],"scores":[214],"up":[216],"26.7%.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
