Computer Science ›› 2023, Vol. 50 ›› Issue (3): 121-128.doi: 10.11896/jsjkx.220100086
• Database & Big Data & Data Science • Previous Articles Next Articles
RAO Dan, SHI Hongwei
CLC Number:
[1]WANG D,MIWA T,MORIKAWA T.Big trajectory data mi-ning:A survey of methods,applications,and services[J].Sensors,2020,20(16):4571. [2]LLOYD S.Least squares quantization in PCM[J].IEEE Tran-sactions on Information Theory,1982,28(2):129-137. [3]ESTER M,KRIEGEL H P,SANDER J,et al.A density-based algorithm for discovering clusters in large spatial databases with noise[C]//KDD.1996:226-231. [4]BARRATT S T,KOCHENDERFER M J,BOYD S P.Learning probabilistic trajectory models of aircraft in terminal airspace from position data[J].IEEE Transactions on Intelligent Transportation Systems,2018,20(9):3536-3545. [5]ENRIQUEZ M.Identifying temporally persistent flows in theterminal airspace via spectral clustering[C]//Tenth USA/Europe Air Traffic Management Research and Development Seminar(ATM2013)/Federal Aviation Administration(FAA) and EUROCONTROL.Chicago,IL,USA,2013:10-13. [6]LI S,ZHAO H.A Survey on Representation Learning for User Modeling[C]//IJCAI.2020:4997-5003. [7]FANG Z,DU Y,CHEN L,et al.E 2 DTC:An End to End Deep Trajectory Clustering Framework via Self-Training[C]//2021 IEEE 37th International Conference on Data Engineering(ICDE).IEEE,2021:696-707. [8]SCHÄFER M,STROHMEIER M,LENDERS V,et al.Bringing up OpenSky:A large-scale ADS-B sensor network for research[C]//IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.IEEE,2014:83-94. [9]YANAGISAWA Y,SATOH T.Clustering multidimensionaltrajectories based on shape and velocity[C]//22nd Interna-tional Conference on Data Engineering Workshops(ICDEW’06).IEEE,2006. [10]CHEN J Y,SONG J T,LIU L X,et al.Trajectory clustering algorithm based on improved hausdorff distance[J].Computer Engineering,2012,38(17):157-161. [11]AGRAWAL R,FALOUTSOS C,SWAMI A.Efficient similarity search in sequence databases[C]//International Conference on Foundations of Data Organization and Algorithms.Springer,1993:69-84. [12]AYHAN S,SAMET H.Diclerge:Divide-cluster-merge frame-work for clustering aircraft trajectories[C]//Proceedings of the 8th ACM SIGSPATIAL International Workshop on Computational Transportation Science.2015:7-14. [13]MAHBOUBI Z,KOCHENDERFER M J.Learning traffic patterns at small airports from flight tracks[J].IEEE Transactions on Intelligent Transportation Systems,2016,18(4):917-926. [14]LI C Q,LI S M,MA W Y,et al.Research on automatic identification method of air traffic flow based on trajectory clustering [J].Computer Simulation,2021,38(10):73-77. [15]OLIVE X,BASORA L.Identifying anomalies in past en-route trajectories with clustering and anomaly detection methods[C]//ATM Seminar.2019. [16]ZENG W,XU Z,CAI Z,et al.Aircraft Trajectory Clustering in Terminal Airspace Based on Deep Autoencoder and Gaussian Mixture Model[J].Aerospace,2021,8(9):266. [17]BASORA L,OLIVE X,DUBOT T.Recent advances in anomaly detection methods applied to aviation[J].Aerospace,2019,6(11):117. [18]DAS S,MATTHEWS B L,SRIVASTAVA A N,et al.Multiple kernel learning for heterogeneous anomaly detection:algorithm and aviation safety case study[C]//Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Disco-very and Data Mining.2010:47-56. [19]LI L,HANSMAN R J,PALACIOS R,et al.Anomaly detection via a Gaussian Mixture Model for flight operation and safety monitoring[J].Transportation Research Part C:Emerging Technologies,2016,64:45-57. [20]JANAKIRAMAN V M,NIELSEN D.Anomaly detection in aviation data using extreme learning machines[C]//2016 International Joint Conference on Neural Networks(IJCNN).IEEE,2016:1993-2000. [21]XIE J,GIRSHICK R,FARHADI A.Unsupervised deep embedding for clustering analysis[C]//International Conference on Machine Learning.PMLR,2016:478-487. [22]ZENG J,KRUGER U,GELUK J,et al.Detecting abnormal si-tuations using the Kullback-Leibler divergence[J].Automatica,2014,50(11):2777-2786. [23]RENDÓN E,ABUNDEZ I,ARIZMENDI A,et al.Internal versus external cluster validation indexes[J].International Journal of Computers and Communications,2011,5(1):27-34. [24]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.Imagenetclassification with deep convolutional neural networks[J].Communications of the ACM,2017,60(6):84-90. [25]GHASEDI DIZAJI K,HERANDI A,DENG C,et al.Deep clustering via joint convolutional autoencoder embedding and relative entropy minimization[C]//Proceedings of the IEEE International Conference on Computer Vision.2017:5736-5745. [26]GUO X,GAO L,LIU X,et al.Improved deep embedded clustering with local structure preservation[C]//IJCAI.2017:1753-1759. |
[1] | CUI Jingsong, ZHANG Tongtong, GUO Chi, GUO Wenfei. Network Equipment Anomaly Detection Based on Time Delay Feature [J]. Computer Science, 2023, 50(3): 371-379. |
[2] | WANG Xiangwei, HAN Rui, Chi Harold LIU. Hierarchical Memory Pool Based Edge Semi-supervised Continual Learning Method [J]. Computer Science, 2023, 50(2): 23-31. |
[3] | WANG Guan-yu, ZHONG Ting, FENG Yu, ZHOU Fan. Collaborative Filtering Recommendation Method Based on Vector Quantization Coding [J]. Computer Science, 2022, 49(9): 48-54. |
[4] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[5] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[6] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[7] | DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178. |
[8] | YU Shu-hao, ZHOU Hui, YE Chun-yang, WANG Tai-zheng. SDFA:Study on Ship Trajectory Clustering Method Based on Multi-feature Fusion [J]. Computer Science, 2022, 49(6A): 256-260. |
[9] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[10] | JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278. |
[11] | GAO Jie, LIU Sha, HUANG Ze-qiang, ZHENG Tian-yu, LIU Xin, QI Feng-bin. Deep Neural Network Operator Acceleration Library Optimization Based on Domestic Many-core Processor [J]. Computer Science, 2022, 49(5): 355-362. |
[12] | SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151. |
[13] | HAN Jie, CHEN Jun-fen, LI Yan, ZHAN Ze-cong. Self-supervised Deep Clustering Algorithm Based on Self-attention [J]. Computer Science, 2022, 49(3): 134-143. |
[14] | WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151. |
[15] | LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148. |
|