Skip to main content
Log in

An overview on trajectory outlier detection

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

The task of trajectory outlier detection is to discover trajectories or their segments which differ substantially from or are inconsistent with the remaining set. In this paper, we make an overview on trajectory outlier detection algorithms from three aspects. Firstly, algorithms considering multi-attribute. In this kind of algorithms, as many key attributes as possible, such as speed, direction, position, time, are explored to represent the original trajectory and to compare with the others. Secondly, suitable distance metric. Many researches try to find or develop suitable distance metric which can measure the divergence between trajectories effectively and reliably. Thirdly, other studies attempt to improve existing algorithms to find outliers with less time and space complexity, and even more reliable. In this paper, we survey and summarize some classic trajectory outlier detection algorithms. In order to provide an overview, we analyze their features from the three dimensions above and discuss their benefits and shortcomings. It is hope that this review will serve as the steppingstone for those interested in advancing moving object outlier detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Anagnostopoulos C, Hadjiefthymiades S (2014) Intelligent trajectory classification for improved movement prediction. IEEE Trans Syst Man Cybern 44(10):1301–1314

    Article  Google Scholar 

  • Ashbrook D, Starner T (2003) Using GPS to learn significant locations and predict movement across multiple users. Pers Ubiquitous Comput 7(5):275–286

    Article  Google Scholar 

  • Basharat A, Gritai A, Shah M (2008) Learning object motion patterns for anomaly detection and improved object detection. In: Proceedings of the 2008 IEEE international conference on computer vision and pattern recognition, Anchorage, Alaska, USA, pp 1–8

  • Bu YY, Chen L, Fu AWC, Liu DW (2009) Efficient anomaly monitoring over moving object trajectory streams. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, Paris, France, pp 159–168

  • Cao KY, Shi LX, Wang GR, Han DH, Bai M (2014) Density-based local outlier detection on uncertain data. In: Proceedings of the 15th web-age information management, Macau, China, pp 67–71

  • Chung S, Chung D (2015) Fault detection and diagnostics using data mining. Lect Notes Mech Eng 9507:823–835

    Article  Google Scholar 

  • Clarke FH (1976) Optimal solutions to differential inclusions. J Optim Theory Appl 19(3):469–478

    Article  MathSciNet  MATH  Google Scholar 

  • Costa C, Laoudias C, Zeinalipouryazti D, Gunopulos D (2011) SmartTrace: finding similar trajectories in smartphone networks without disclosing the traces. In: Processing of the 27th IEEE international conference on data engineering, Hannover, Germany, pp 1288–1291

  • Daneshpazhouh A, Sami A (2014) Entropy-based outlier detection using semi-supervised approach with few positive examples. Pattern Recognit Lett 49:77–84

    Article  Google Scholar 

  • Dubuisson MP, Jain AK (1994) A modified hausdorff distance for object matching. In: Proceedings of the 12th international conference on pattern recognition, Jerusalem, Israel, pp 566–568

  • Fotheringham AS, Crespo R, Yao J (2015) Geographical and temporal weighted regression. Geogr Anal 47:431–452

    Article  Google Scholar 

  • Ge Y, Xiong H, Zhou ZH, Ozdemir H, Yu J, Lee KC (2010) Top-eye: Top-k evolving trajectory outlier detection. In: Proceedings of the 19th ACM international conference on information and knowledge management, Toronto, Canada, pp 1733–1736

  • Guan B, Zhang YP, Liu LX, Chen JY, Guo R (2012) An improving algorithm of trajectory outliers detection. In: Proceedings of the 3rd workshop on teaching and computational science, Baton Rouge, Louisiana, USA, pp 907–914

  • Gupta M, Gao J, Aggarwal CC, Han JW (2013) Outlier detection for temporal data: a survey. IEEE Trans Knowl Data Eng 25(1):1–20

    Article  Google Scholar 

  • Han JW, Kamber M, Pei J (2011) Data mining: concepts and techniques, 3rd edn. Morgan Kaufmann Publishers, San Francisco

    MATH  Google Scholar 

  • Hazel GG (2000) Multivariate Gaussian MRF for multispectral scene segmentation and anomaly detection. IEEE Trans Geosci Remote Sens 38(3):1199–1211

    Article  Google Scholar 

  • Hoang MX, Zheng Y, Singh AK (2016) FCCF: forecasting citywide crowd flows based on big data. In: Proceedings of the 24th international conference on advances in geographic information systems, Burlingame, USA, pp 1–10

  • Huang TQ, Yu YQ, Guo GD, Yu XL (2011) Trajectory outlier detection based on semi-supervised technology. J Comput Res Dev 48(11):2074–2082

    Google Scholar 

  • Hubballi N, Patra BK, Nandi S (2011) NDoT: nearest neighbor distance based outlier detection technique. In: Processing of the 4th international conference on Pattern recognition and machine intelligence, Russia, Moscow, pp 36–42

  • Huttenlocher DP, Klanderman GA, Rucklidge WJ (1993) Comparing images using the hausdorff distance. IEEE Trans Pattern Anal Mach Intell 15(9):850–863

    Article  Google Scholar 

  • Jiang F, Wu Y, Katsaggelos AK (2007) Abnormal event detection from surveillance video by dynamic hierarchical clustering. In: Proceedings of the 2007 IEEE international conference on image processing, San Antonio, USA, pp 145–148

  • Keogh EJ, Pazzani, MJ (2000) Scaling up dynamic time warping for data mining applications. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, Washington, USA, pp 285–289

  • Knorr EM, Ng RT, Tucakov V (2000) Distance-based outliers: algorithms and applications. VLDB J 8(3–4):237–253

    Article  Google Scholar 

  • Kokkula S, Musti NM (2013) Classification and outlier detection based on topic based pattern synthesis. Lect Notes Comput Sci 7988:99–114

    Article  Google Scholar 

  • Lee JG, Han JW, Whang KY (2007) Trajectory clustering: a partition-and-group framework. In: Proceedings of the 2007ACMSIGMOD international conference on management of data, Beijing, China, pp 593–604

  • Lee JG, Han JW, Li XL (2008a) Trajectory outlier detection: a partition-and-detect framework. In: Proceedings of the 24th IEEE international conference on data engineering, Cancun, Mexico, pp 140–149

  • Lee JG, Han JW, Li XL, Gonzalez H (2008b) TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering. Proc VLDB Endow 1(1):1081–1094

    Article  Google Scholar 

  • Li XL, Han JW, Kim, S (2006) Motion-alert: automatic anomaly detection in massive moving objects. In: Intelligence and Security Informatics, pp 166–177

  • Li XL, Han JW, Kim S, Gonzalez H (2007) ROAM: rule and motif-based anomaly detection in massive moving object data sets. In: SDM, vol 7, pp 273–284

  • Li XL, Li ZH, Han, JW, Lee JG (2009) Temporal outlier detection in vehicle traffic data. In: Proceedings of the 25th IEEE international conference on data engineering, Shanghai, China, pp 1319–1322

  • Li ZH, Ji M, Lee JG, Tang LA, Yu YT, Han JW, Kays R (2010) MoveMine: mining moving object databases. In: Proceedings of the 2010 ACM SIGMOD international conference on management of data, Indianapolis, Indiana, USA, pp 1203–1206

  • Li C, Han Z, Ye Q, Jiao J (2011a) Abnormal behavior detection via sparse reconstruction analysis of trajectory. In: Proceedings of the 6th IEEE international conference on image and graphics, Hefei, Anhui, China, pp 807–810

  • Li ZH, Han JW, Ji M, Tang LA, Yu YT, Ding BL, Lee JG, Kays R (2011b) MoveMine: mining moving object data for discovery of animal movement patterns. J ACM Trans Intell Syst Technol 2(4):1–37

    Article  Google Scholar 

  • Liao TW (2005) Clustering of time series data—a survey. Pattern Recognit 38:1857–1874

    Article  MATH  Google Scholar 

  • Liu LX, Qiao SJ, Liu B, Le JJ, Tang CJ (2009) Efficient trajectory outlier detection algorithm based on R-tree. J Softw 20(9):2426–2435

    Google Scholar 

  • Liu LX, Fan J, Qiao SJ, Song J, Guo R (2010) Efficiently mining outliers from trajectories of unrestraint movement. In: Proceedings of the 3rd IEEE international conference on advanced computer theory and engineering, Chengdu, China, vol 2, pp 261–265

  • Liu LX, Qiao SJ, Zhang YP, Hu JS (2012) An efficient outlying trajectories mining approach based on relative distance. Int J Geogr Inf Sci 26(10):1789–1810

    Article  Google Scholar 

  • Liu ZP, Pi DC, Jiang JF (2013) Density-based trajectory outlier detection algorithm. J Syst Eng Electron 24(2):335–340

    Article  Google Scholar 

  • Masciari E (2011) Trajectory outlier detection using an analytical approach. In: Proceedings of the 23rd IEEE International Conference on tools with artificial intelligence, Boca Raton, Florida, USA, pp 377–384

  • Piao CH, Huang Z, Su L, Lu S (2014) High-dimensional data stream outlier detection algorithm based on angle distribution. J Shanghai Jiaotong Univ 48(5):647–652

    Google Scholar 

  • Piciarelli C, Foresti GL (2006) On-line trajectory clustering for anomalous events detection. Pattern Recognit Lett 27(15):1835–1842

    Article  Google Scholar 

  • Piciarelli C, Foresti GL (2007) Anomalous trajectory detection using support vector machines. In: Proceedings of the 2007 IEEE international conference on advanced video and signal based surveillance, London, UK, pp 153–158

  • Piciarelli C, Micheloni C, Foresti GL (2008) Trajectory-based anomalous event detection. IEEE Trans Circuits Syst Video Technol 18(11):1544–1554

    Article  Google Scholar 

  • Qiao SJ, Tang CJ, Jin HD, Long T, Dai SC, Ku YC, Chau M (2010) PutMode: prediction of uncertain trajectories in moving objects databases. Appl Intell 33(3):370–386

    Article  Google Scholar 

  • Qiao SJ, Shen DY, Wang XT, Han N, Zhu W (2015a) A Self-adaptive parameter selection trajectory prediction approach via hidden markov models. IEEE Trans Intell Transp Syst 16(1):284–296

    Article  Google Scholar 

  • Qiao SJ, Han N, Zhu W, Gutierrez LA (2015b) TraPlan: an effective three-in-one trajectory prediction model in transportation networks. IEEE Trans Intell Transp Syst 16(3):1188–1198

    Article  Google Scholar 

  • Ramirez-Padron D, Foregger D, Manuel J, Georgiopoulos M, Mederos B (2010) Similarity kernels for nearest neighbor-based outlier detection. In: Proceedings of the 9th international conference on advances in intelligent data analysis, Tucson, USA, pp 159–170

  • Robinson MT (1990) The temporal development of collision cascades in the binary-collision approximation. Nucl Instrum Methods Phys Res Sect B Beam Interact Mater Atoms 48(1):408–413

    Article  Google Scholar 

  • Rote G (1991) Computing the minimum hausdorff distance between two point sets on a line under translation. Inf Process Lett 38(3):123–127

    Article  MathSciNet  MATH  Google Scholar 

  • Said AM, Dominic PDD, Faye I (2015) Data stream outlier detection approach based on frequent pattern mining technique. Int J Bus Inf Syst 20(1):55–70

    Google Scholar 

  • Sankoff D, Kruskal J (1983) Time warps, string edits, and macromolecules: the theory and practice of sequence comparison. Addison Wesley, MA

    MATH  Google Scholar 

  • Sapiezynski P, Stopczynski A, Gatej R, Lehmann S (2015) Tracking human mobility using WiFi signals. PLoS ONE 10(7):e0130824. https://doi.org/10.1371/journal.pone.0130824

    Article  Google Scholar 

  • Shahid N, Naqvi IH, Qaisar SB (2015) Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: a survey. Artif Intell Rev 43(2):193–228

    Article  Google Scholar 

  • Shaikh SA, Kitagawa H (2014) Efficient distance-based outlier detection on uncertain datasets of Gaussian distribution. World Wide Web 17(4):511–538

    Article  Google Scholar 

  • Sillito RR, Fisher RB (2008) Semi-supervised learning for anomalous trajectory detection. In: Proceedings of the 2008 British machine vision conference, Leeds, UK, pp 1–10

  • Silva KM, Souza BA, Brito NSD (2006) Fault detection and classification in transmission lines based on wavelet transform and ANN. IEEE Trans Power Deliv 21(4):2058–2063

    Article  Google Scholar 

  • Sim DG, Kwon OK, Park RH (1999) Object matching algorithms using robust hausdorff distance measures. IEEE Trans Image Process 8(3):425–429

    Article  Google Scholar 

  • Sun PH, Xia SX, Yuan G, Li DX (2016) An overview of moving object trajectory compression algorithms. Math Probl Eng 2016:1–13

    Google Scholar 

  • Suzuki N, Hirasawa K, Tanaka K, Kobayashi Y, Sato Y, Fujino Y (2007) Learning motion patterns and anomaly detection by human trajectory analysis. In Proceedings of the 2007 IEEE international conference on systems, man and cybernetics, pp 498–503

  • Wang ZQ, Zhu ZC, Li W, Chen GA, Zhou GB (2013a) Total energy growth rate of rolling bearing due to faults during run-up. Adv Mech Eng 2013:502051. https://doi.org/10.1155/2013/502051

  • Wang ZQ, Zhu ZC, Li W (2013b) Decoupling the aliased spectra of rolling bearing with multispeed multiple frequency correlation. J Vibro Eng 15(3):1221–1229

    MathSciNet  Google Scholar 

  • Wang C, Lin HZ, Jiang HB (2014) Trajectory-based multi-dimensional outlier detection in wireless sensor networks using Hidden Markov Models. Wirel Netw 20(8):2409–2418

    Article  Google Scholar 

  • Yuan G, Xia S, Zhang L, Zhou Y, Ji C (2011) Trajectory outlier detection algorithm based on structural features. J Comput Inf Syst 7(11):4137–4144

    Google Scholar 

  • Yuan G, Xia SX, Zhang L, Zhou Y, Ji C (2012a) An efficient trajectory-clustering algorithm based on an index tree. Trans Inst Meas Control 34(7):850–861

    Article  Google Scholar 

  • Yuan G, Xia SX, Zhang L, Zhou Y (2012b) Structural outlier detection in trajectory database based on hierarchical tree. Inf Int Interd J 15(8):3595–3602

    Google Scholar 

  • Yuan G, Xia SX, Zhang YM (2013) Interesting activities discovery for moving objects based on collaborative filtering. Math Probl Eng 2013:1–9

    Article  MathSciNet  MATH  Google Scholar 

  • Yuan G, Sun PH, Zhao J, Li DX, Wang CW (2017a) A review of moving object trajectory clustering algorithms. Artif Intell Rev 47:123–144

    Article  Google Scholar 

  • Yuan G, Zhao J, Xia SX, Zhang YM, Li W (2017b) Multi-granularity periodic activities discovery for moving objects. Int J Geogr Inf Sci 31(3):435–462

    Article  Google Scholar 

  • Zhang Z, Huang K, Tan T (2006) Comparison of similarity measures for trajectory clustering in outdoor surveillance scenes. In: Proceedings of the 18th IEEE international conference on pattern recognition, Hong Kong, China, vol 3, pp 1135–1138

  • Zheng Y (2015) Trajectory data mining: an overview. ACM Trans Intell Syst Technol 6(3):1–41

    Article  Google Scholar 

  • Zheng Y, Zhou XF (2011) Computing with spatial trajectories. Springer, Berlin

    Book  Google Scholar 

  • Zhu J, Jiang W, Liu A, Liu GF, Zhao L (2017) Effective and efficient trajectory outlier detection based on time-dependent popular route. World Wide Web 20(1):111–134

    Article  Google Scholar 

Download references

Acknowledgements

We thank Dr. Daxing Li for his contribution in this paper. This work was supported by the National Natural Science Foundation of China (with grants of 71774159 and U1610124), the State’s Key Project of Research and Development Plan (with grant of 2016YFC0600908), the Fundamental Research Funds for the Central Universities, China (with grant of 2015XKMS085), and Guangxi Key Laboratory of Trusted Software (with grants of KX201613).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Guan Yuan or Zhixiao Wang.

Ethics declarations

Conflict of interest

No potential conflict of interest was reported by the authors.

Additional information

Fanrong Meng and Guan Yuan have contributed equally to this paper.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meng, F., Yuan, G., Lv, S. et al. An overview on trajectory outlier detection. Artif Intell Rev 52, 2437–2456 (2019). https://doi.org/10.1007/s10462-018-9619-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-018-9619-1

Keywords

Navigation