{"id":"https://openalex.org/W4400357636","doi":"https://doi.org/10.1186/s13677-024-00682-0","title":"ASOD: an adaptive stream outlier detection method using online strategy","display_name":"ASOD: an adaptive stream outlier detection method using online strategy","publication_year":2024,"publication_date":"2024-07-05","ids":{"openalex":"https://openalex.org/W4400357636","doi":"https://doi.org/10.1186/s13677-024-00682-0"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-024-00682-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00682-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00682-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00682-0","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101598522","display_name":"Zhichao Hu","orcid":"https://orcid.org/0000-0002-6864-9645"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhichao Hu","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110458901","display_name":"Xiangzhan Yu","orcid":"https://orcid.org/0000-0002-7163-2211"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangzhan Yu","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101913329","display_name":"Likun Liu","orcid":"https://orcid.org/0000-0002-2113-4679"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Likun Liu","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100433765","display_name":"Yu Zhang","orcid":"https://orcid.org/0009-0002-6422-8066"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010753025","display_name":"Haining Yu","orcid":"https://orcid.org/0000-0002-4996-3233"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haining Yu","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101598522"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.772,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86795047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"13","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.799717903137207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7539305090904236},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.636731743812561},{"id":"https://openalex.org/keywords/concept-drift","display_name":"Concept drift","score":0.6140229105949402},{"id":"https://openalex.org/keywords/mahalanobis-distance","display_name":"Mahalanobis distance","score":0.611892580986023},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.5604892373085022},{"id":"https://openalex.org/keywords/mixture-model","display_name":"Mixture model","score":0.4990677833557129},{"id":"https://openalex.org/keywords/data-stream","display_name":"Data stream","score":0.4799923598766327},{"id":"https://openalex.org/keywords/automatic-summarization","display_name":"Automatic summarization","score":0.46201980113983154},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.4176771342754364},{"id":"https://openalex.org/keywords/change-detection","display_name":"Change detection","score":0.4165748357772827},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.4115796685218811},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.356547087430954},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.18975618481636047}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.799717903137207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7539305090904236},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.636731743812561},{"id":"https://openalex.org/C60777511","wikidata":"https://www.wikidata.org/wiki/Q3045002","display_name":"Concept drift","level":3,"score":0.6140229105949402},{"id":"https://openalex.org/C1921717","wikidata":"https://www.wikidata.org/wiki/Q1334846","display_name":"Mahalanobis distance","level":2,"score":0.611892580986023},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.5604892373085022},{"id":"https://openalex.org/C61224824","wikidata":"https://www.wikidata.org/wiki/Q2260434","display_name":"Mixture model","level":2,"score":0.4990677833557129},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.4799923598766327},{"id":"https://openalex.org/C170858558","wikidata":"https://www.wikidata.org/wiki/Q1394144","display_name":"Automatic summarization","level":2,"score":0.46201980113983154},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.4176771342754364},{"id":"https://openalex.org/C203595873","wikidata":"https://www.wikidata.org/wiki/Q25389927","display_name":"Change detection","level":2,"score":0.4165748357772827},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.4115796685218811},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.356547087430954},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.18975618481636047},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-024-00682-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00682-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00682-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:52c262a5e6d54f6dbf283c7ad06c3603","is_oa":true,"landing_page_url":"https://doaj.org/article/52c262a5e6d54f6dbf283c7ad06c3603","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-20 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-024-00682-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00682-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00682-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production"}],"awards":[{"id":"https://openalex.org/G5863375644","display_name":null,"funder_award_id":"2018YFB1800702","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400357636.pdf"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W1995443851","https://openalex.org/W2076063813","https://openalex.org/W2161920802","https://openalex.org/W2212753854","https://openalex.org/W2255466643","https://openalex.org/W2296719434","https://openalex.org/W2437112748","https://openalex.org/W2620661538","https://openalex.org/W2753539327","https://openalex.org/W2766761849","https://openalex.org/W2768148056","https://openalex.org/W2808656506","https://openalex.org/W2809409545","https://openalex.org/W2870670057","https://openalex.org/W2901773810","https://openalex.org/W2903106924","https://openalex.org/W2911200746","https://openalex.org/W2945012921","https://openalex.org/W2951401720","https://openalex.org/W2964139938","https://openalex.org/W3016340415","https://openalex.org/W3039539327","https://openalex.org/W3048624869","https://openalex.org/W3080273007","https://openalex.org/W3082431408","https://openalex.org/W3113056265","https://openalex.org/W3114378557","https://openalex.org/W3120331202","https://openalex.org/W3121951581","https://openalex.org/W3123859009","https://openalex.org/W3123951230","https://openalex.org/W3136173905","https://openalex.org/W3137846090","https://openalex.org/W3173538657","https://openalex.org/W3192648431","https://openalex.org/W3194553186","https://openalex.org/W4200629745","https://openalex.org/W4206268729","https://openalex.org/W4225508567","https://openalex.org/W4225526013","https://openalex.org/W4226214891","https://openalex.org/W4226263557","https://openalex.org/W4254182148","https://openalex.org/W4300672471","https://openalex.org/W4313886597","https://openalex.org/W4393305293"],"related_works":["https://openalex.org/W2940903377","https://openalex.org/W4229924696","https://openalex.org/W3108897387","https://openalex.org/W4386121812","https://openalex.org/W4307392573","https://openalex.org/W2912132049","https://openalex.org/W2186919162","https://openalex.org/W2981673118","https://openalex.org/W4389493326","https://openalex.org/W3087340304"],"abstract_inverted_index":{"Abstract":[0],"In":[1,81,192],"the":[2,16,19,24,35,56,95,132,143,148,157,167,194,197,201,211,220,235,246,257,262],"current":[3],"era":[4],"of":[5,18,23,28,51,59,134,150,153,159,241],"information":[6],"technology,":[7],"blockchain":[8,25,52],"is":[9,27,114,269],"widely":[10],"used":[11],"in":[12,42],"various":[13],"fields,":[14],"and":[15,21,49,61,77,107,119,156,182,200,207,214,217,232,243,271],"monitoring":[17,43],"security":[20],"status":[22,50],"system":[26],"great":[29],"concern.":[30],"Online":[31],"anomaly":[32,65,190,202,275],"detection":[33,66,90,276],"for":[34,116,204,273],"real-time":[36,60],"stream":[37,88,278],"data":[38,136],"plays":[39],"vital":[40],"role":[41],"strategy":[44,158],"to":[45,93,163,166,188,249],"find":[46],"abnormal":[47],"events":[48],"system.":[53],"However,":[54],"as":[55,71],"high":[57],"requirements":[58],"online":[62,64,109,117,274],"scenario,":[63],"faces":[67],"many":[68],"problems":[69],"such":[70],"limited":[72,78],"training":[73,125,253],"data,":[74],"distribution":[75,168],"drift,":[76],"update":[79],"frequency.":[80],"this":[82],"paper,":[83],"we":[84],"propose":[85],"an":[86,184,239],"adaptive":[87],"outlier":[89],"method":[91,187],"(ASOD)":[92],"overcome":[94],"limitations.":[96],"It":[97],"first":[98],"designs":[99],"a":[100,174],"K-nearest":[101,128],"neighbor":[102,129],"Gaussian":[103,154],"mixture":[104],"model":[105],"(KNN-GMM)":[106],"utilizes":[108],"learning":[110],"strategy.":[111],"So,":[112],"it":[113,223,268],"suitable":[115],"scenarios":[118],"does":[120],"not":[121],"rely":[122],"on":[123,179,234,277],"large":[124],"data.":[126,254,279],"The":[127],"optimization":[130],"limits":[131],"influence":[133],"new":[135],"locally":[137],"rather":[138],"than":[139],"globally,":[140],"thus":[141],"improving":[142],"stability.":[144],"Then,":[145],"ASOD":[146,172,228,255],"applies":[147],"mechanism":[149],"dynamic":[151,160],"maintenance":[152],"components":[155],"context":[161],"control":[162],"achieve":[164],"self-adaptation":[165],"drift.":[169],"And":[170],"finally,":[171],"adopts":[173],"dimensionless":[175],"distance":[176,181],"metric":[177],"based":[178],"Mahalanobis":[180],"proposes":[183],"automatic":[185],"threshold":[186],"accomplish":[189],"detection.":[191],"addition,":[193],"KNN-GMM":[195],"provides":[196],"life":[198],"cycle":[199],"index":[203],"continuous":[205],"tracking":[206],"analysis,":[208],"which":[209],"facilities":[210],"cause":[212],"analysis":[213],"further":[215],"interpretation":[216],"traceability.":[218],"From":[219],"experimental":[221],"results,":[222],"can":[224],"be":[225],"seen":[226],"that":[227,267],"achieves":[229],"near-optimal":[230],"F1":[231,259],"recall":[233],"NAB":[236],"dataset":[237],"with":[238,251],"improvement":[240],"6%":[242],"20.3%":[244],"over":[245],"average,":[247],"compared":[248],"baselines":[250],"sufficient":[252],"has":[256],"lowest":[258],"variance":[260],"among":[261],"five":[263],"best":[264],"methods,":[265],"indicating":[266],"effective":[270],"stable":[272]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
