2021
DOI: 10.1109/tits.2020.3022612
|View full text |Cite
|
Sign up to set email alerts
|

A Two-Phase Anomaly Detection Model for Secure Intelligent Transportation Ride-Hailing Trajectories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(13 citation statements)
references
References 47 publications
0
13
0
Order By: Relevance
“…The method in this paper uses the Kalman filter to predict the next position and bounding box size of the current basketball target position and obtains the trajectory prediction result of the basketball target. Similarity completes the tracking of multiple targets of the same category and corrects the problem of target occlusion in the tracking process and the problem of abnormal trajectory tracking caused by target occlusion, so the correction effect on abnormal target trajectories is better [21,22].…”
Section: Trajectory Correction Resultsmentioning
confidence: 99%
“…The method in this paper uses the Kalman filter to predict the next position and bounding box size of the current basketball target position and obtains the trajectory prediction result of the basketball target. Similarity completes the tracking of multiple targets of the same category and corrects the problem of target occlusion in the tracking process and the problem of abnormal trajectory tracking caused by target occlusion, so the correction effect on abnormal target trajectories is better [21,22].…”
Section: Trajectory Correction Resultsmentioning
confidence: 99%
“…If these kinds of data are provided, we could also match the event and taxi travel demand changing rule. This matching work could help to detect anomalies according to taxi data, such as indicated in the work of Davis et al [ 37 ] and Belhadi et al [ 38 ]. Moreover, in some situations the degree of dependency depends also on the operational conditions of the travel system.…”
Section: Discussionmentioning
confidence: 99%
“…It investigated the various correlations between the sequence data and identified the frequent patterns to create and train the isolation forest structure. In the intelligent transportation context, Belhadi et al [22] suggested a twophase secure-based method for identifying abnormalities from ride-hailing trajectories. The first phase seeks to identify taxi fraud by computing the distance between each stop point in each taxi route, while the second seeks to enhance the mining process via the use of both feature selection and sliding windows techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Table I presents the merit and the limitation of the relevant works to this research study. Simple, contextual, collective outliers Use traditional techniques Yu et al [13] Both anomaly detection and forecasting Hard to estimate the time window Yamanishi et al [15] Use incremental learning Hard to build the training data Xie et al [16] Identify different kind of outliers Use traditional techniques Nesa et al [17] Detecting Outliers from IoT data Hard to build the training data Na et al [18] Less memory consumption Use tradition techniques Zhang et al [20] Use hybrid deep learning models Hard to build the training data Feremans et al [21] Study pattern correlation High time consuming Belhadi et al [22] Application to taxi frauds High time consuming Javed et al, [23] Use hybrid deep learning models Hard to build the training data Wang et al [24] Detecting anomaly sensors Use traditional techniques…”
Section: Related Workmentioning
confidence: 99%