Next Article in Journal
The 3-Omega Method for the Measurement of Fouling Thickness, the Liquid Flow Rate, and Surface Contact
Next Article in Special Issue
Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks
Previous Article in Journal
Ratiometric Dissolved Oxygen Sensors Based on Ruthenium Complex Doped with Silver Nanoparticles
Previous Article in Special Issue
Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS)
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets

1
Beijing Key Laboratory of IOT Information Security, Institute of Information Engineering, CAS, Beijing 100093, China
2
School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(3), 550; https://doi.org/10.3390/s17030550
Submission received: 8 December 2016 / Revised: 15 February 2017 / Accepted: 23 February 2017 / Published: 9 March 2017

Abstract

:
Road traffic anomaly denotes a road segment that is anomalous in terms of traffic flow of vehicles. Detecting road traffic anomalies from GPS (Global Position System) snippets data is becoming critical in urban computing since they often suggest underlying events. However, the noisy and sparse nature of GPS snippets data have ushered multiple problems, which have prompted the detection of road traffic anomalies to be very challenging. To address these issues, we propose a two-stage solution which consists of two components: a Collaborative Path Inference (CPI) model and a Road Anomaly Test (RAT) model. CPI model performs path inference incorporating both static and dynamic features into a Conditional Random Field (CRF). Dynamic context features are learned collaboratively from large GPS snippets via a tensor decomposition technique. Then RAT calculates the anomalous degree for each road segment from the inferred fine-grained trajectories in given time intervals. We evaluated our method using a large scale real world dataset, which includes one-month GPS location data from more than eight thousand taxicabs in Beijing. The evaluation results show the advantages of our method beyond other baseline techniques.

1. Introduction

Smart vehicles equipped with communication modules and various types of sensors are becoming an important deployment scenario of IoT (Internet of Things) technology. Harvesting data collected by sensors mounted on vehicles has been quite fruitful in urban computing [1] and a lot of new applications have been proposed. Among them, road traffic anomaly detection is critical since they often suggest underlying events, e.g., accidents, traffic controls, terrorist attacks, protests, disasters, violent riots, to name a few. The effective detection of road traffic anomaly can not only provide knowledge for applications such as vehicular ad hoc networks [2,3] but, more importantly, facilitate the government to deal with the possible emergencies timely.
A road traffic anomaly behaves as a state for a road segment in a specific time when the volume of vehicles on the segment is significantly unusual. To effectively monitor and summarize the volume of vehicles on each road segment, traditional techniques are developed including video surveillance [4] and radio frequency identification devices (RFID) [5]. However, in the urban environment, usually only a small number of road segments have deployed video surveillance system or RFID readers, leaving the data of uncovered segments missing. With the profusion of GPS sensors mounted on vast amount of vehicles, the big location data generated from these sensors will provide a citywide solution on traffic flow monitoring and anomaly detection.
Location data collected by vehicles are often in the form of “GPS snippet” which is defined as a set of timestamped GPS coordinates [6]. Directly using GPS snippets data to find road traffic anomalies is a particularly challenging task for several reasons. First, the nature of GPS devices makes measured locations very noisy, where errors may range from meters to tens of meters. Thus the GPS measurements may not lie in road segments. Second, although the number of vehicles is large, they often report location records in low-sample-rate time intervals (e.g., in the order of 30–60 s). As a result, many GPS snippets are very sparse, namely, too coarse-grained for mining road traffic anomalies. To address these issues, this paper reconstructs fine-grained trajectories from coarse-grained GPS snippets via a path inference model and then find road traffic anomalies from the inferred trajectories.
For example, Figure 1 shows the basic process of road anomaly detection. In Figure 1a, there are three vehicles whose GPS snippets are drawn in red, blue and green respectively. Then the full paths (the solid lines of different colors in Figure 1b) of all vehicles are inferred. Next the fine-grained trajectories of vehicles are reconstructed. In Figure 1c, the smaller dots on each path of vehicles are the possible location at given time. According to the fine-grained trajectories, we count the volume of vehicles on each road segment and detect the suspicious segments through volume data analytics (Figure 1d).
Reconstructing fine-grained trajectories from noisy and sparse GPS snippets, is often referred to as map matching [7] or path inference [8]. However, previous studies often overlook road dynamic context information which is particularly important for path inference. Combined with dynamic context features (e.g., popularity and average velocity of road segments), path inference algorithms could evaluate the latent path selections more preciously. Recent advances in data mining domain, especially the collaborative filter techniques [9], have provided methods of inferring latent dynamic context from snippets data. The basic idea of collaborative filter is to measure the temporal and spatial “similarities” between vehicles to infer the probability a vehicle appearing in one specific road segment at a given time span. In other words, it can discover latent factors of both road segments and vehicles, that together determine the generation of GPS snippets in different time spans.
In this paper, we propose a method for road traffic anomaly detection via collaborative path inference from GPS snippets. Our method consists of two main components: a Collaborative Path Inference (CPI) model and a Road Anomaly Detection (RAD) algorithm. Our CPI model not only utilize static features for path inference, but learning dynamic features collaboratively via a tensor decomposition technique. We summarize the contributions of our work as follows:
  • Collaborative path inference. CPI model performs collaborative path inference incorporating both static and dynamic feature into a Conditional Random Field (CRF), and then reconstructs sparse GPS snippets to fine-grained trajectories;
  • Dynamic feature learning. We aim to collaboratively learn dynamic context features hidden in data via tensor decomposition [10] technique. To tackle the data sparsity problem in the GPS snippets dataset, we exploit two normalization terms, which are robust and can avert over-fitting;
  • Road anomaly detection. We calculate the anomalous degree for each road segment from counting the volumes of fine-grained trajectories in given time intervals. Two kinds of road anomalies are defined in this paper and we devise an algorithm to detect them effectively;
  • Real evaluation. We evaluate our solution using a real world dataset including a large number of taxi traces. Experimental results show that our solutions are effective in path inference and road anomaly detection especially under low sampling rate between GPS locations.
The rest of the paper is organized as follows. We briefly review related work in Section 2. In Section 3, we introduce some concept in this paper and give an overview of our method. Section 4 defines the path inference problem and presents our CRF model. We also propose a collaborative dynamic feature learning method under tensor decomposition in this section. In Section 5, we recognize two types of road anomalies and perform a statistic test on the volume of road segments for detection. In Section 6, we evaluate our solution using a large-scale dataset and report the analysis results. Finally in Section 7 we conclude the paper and envisage the future work.

2. Related Work

2.1. Path Inference

With the growing popularity of GPS-based applications such as VANETs [3,11], the requirements for fine-grained trajectories are more ubiquitous. The problem of mapping GPS points onto a map is first studied in [12], which uses several simple approaches to match GPS points to nearest road segments. We categorize existing methods into two class: deterministic and probabilistic. Deterministic approaches associate each observation to a segment in road network. They utilize geometric information of road network by considering the shape of the roads [13], or the connectivity and contiguity information [7]. In [14], frèchet distance is used to match partial trajectories to road segments. All those algorithms are very fast, however, they are sensitive to noisy GPS observations.
To overcome the uncertainty of observations, many probabilistic algorithms have been proposed by adopting the idea of particle filter [15], Kalman filter [16] and Interactive-Voting [17]. Under the assumption of Markov independence relations, Hidden Markov Model (HMM) [18] and Conditional Random Fields (CRF) [8] have been explored. Both HMM and CRF need to utilize various features for designing the transition probability of states, which encourage the weight learning algorithm using inverse reinforcement learning [19]. However, these algorithms show that the performance is poor when the intervals of GPS observations exceed 5 min [18].
One of the problems of HMM and CRF is that they use context-unaware features when computing the transition probability. These features could not reflect the real traffic condition spatially and temporally. In this paper, we introduce the collaborative method [9] to extract dynamic context-aware features from observations. Two influential collaborative filter techniques are matrix factorization and tensor decomposition [10], which have become increasingly popular recently. Tensor decomposition is adopted to process mobile network data for a number of data mining tasks, such as travel time estimation [20], demographic attributes inference [21], social networks [22], and link pattern prediction [23], to name a few. In this paper, we utilize incomplete GPS snippets with different time intervals to extract dynamic features using tensor decomposition, and then construct a CRF model for path inference.

2.2. Road Anomaly Detection

Over the past decades, road traffic patterns or anomaly detections have been extensively studied [24,25]. Many traditional tools are developed such as video surveillance [4], sensor networks [26] and RFID [5] technique. With the profusion of GPS devices driven location-based techniques, the spatio-temporal data have ushered road anomaly detection problems very challenging and attracted many researches. Given GPS observations, one class of anomaly detection technique is to discover individual suspicious vehicles such as wandering round vehicles [27]. The other class is road traffic based anomaly detection, whose aim is to monitor the inflows or outflows of road segments and extrapolate possible events from volumes of stay vehicles. For example, the authors of [28] used GPS data from taxicabs to find out the emergence of unexpected or abnormal traffic behavior. The authors of [29] focused on inferring the root cause in road traffic anomalies, and the authors of [30] discovered the spatio-temporal causal interactions from traffic data streams. However, all these studies assume the GPS data are fine-grained. In this paper, we detect road traffic anomalies from original GPS snippets by inferring fine-grained trajectories.
To judge the anomaly degree, threshold-based methods always set the upper and lower limits learned from historical data [31,32]. An alternative way to determine the anomaly degree is Likelihood Ratio Test (LRT) [33] which is a statistical hypothesis test based method. One of the advantages of LRT technique is that it doesn’t need a hard threshold, but a statistical significance level. Thus we adopt LRT to detect two kinds of road traffic anomalies defined in this paper.

3. Background

In this section, we define several concepts for path inference and anomaly detection used throughout this paper and give problem definitions of road traffic anomaly detection. Finally we overview the system framework of our method.

3.1. Path Inference

We first introduce related concepts in this subsection. Figure 2 shows an example to illustrate these concepts.
Road Network. A Road Network is an undirected graph N = { V , E } , where E is a set of edges denoting the road segments and V is a set of vertices representing the intersections or terminal points of the road segments. Each road segment e E is associated with a number of attributes such as segment ID, start node, end node, and length.
GPS Observation and Snippet. Millions of GPS measurements can be organized by vehicles within a time span [ 1 , T ] . A GPS observation g is represented as a triple: (latitude, longitude, time stamp). For a given vehicle, we denote a GPS snippet with n observations as G = { g 1 , g 2 , , g n } where g t denotes the observation at t. The time span between two neighbouring observations is sampling interval, which can be different for different vehicles.
State. Due to the noisy nature of GPS measurements, state x = ( l , o ) is a projection of observation g to a road segment l, where o is the offset of projection from the start node of l. As one observation g t can be projected to a number of roads, we can get I t different candidate states x t = { x 1 t , x 2 t , , x I t t } .
Path. Between two adjacent states x i t x t and x i t + 1 x t + 1 , only a small number of road segments can be taken by a vehicle. We denote the set of candidate path selections between two consecutive observations g t and g t + 1 as Ω t = { ξ 1 t , ξ 2 t , , ξ J t t } , where J t is the number of candidate selections at time stamp t. Note that a candidate path selection ξ j t may be one road segment or consists of several conjoint road segments. If the distance of two observations is close (e.g., on one segment), ξ j t is a road segment. Otherwise if this distance is very far, then ξ j t can be a set of conjoint road segments.
Then we define Path for GPS snippet G as a sequence of latent states and road segments, starting and ending with a state, denoted as τ = x 1 ξ 1 x 2 ξ 2 ξ n 1 x n , where x t and ξ t are element of x t and Ω t respectively. We denote the path space as T , whose dimensions are I 1 × J 1 × I 2 × J 2 J n 1 × I n .
In Figure 2, three locations labeled in red solid circles constitute a GPS snippet, in which each location is defined as observation. Each observation may generate a small different number of states, which are labeled as red hollow circles. A path is a set of road segments passing through states for every observations, e.g., three candidate paths colored in purple, blue and green. The path inference problem then can be defined as:
Definition 1 (Path Inference).
Given the road network N and the raw GPS snippets G, Path Inference is to find the most likely path τ * in the latent variable space T for the vehicle that generates GPS snippets G.
Given an inferred full path, our next aim is to reconstruct a fine-grained trajectory for every snippet. We consider the trajectory of a path to be a dense synthetic GPS snippet, which is formally defined as:
Trajectory. Given a time interval [ 1 , T ] , for every granularity 1 < t 1 < t 2 < < t m < T , a trajectory is a set of consecutive locations on road segments L = { l 1 , l 2 , , l m } , where l i = ( t i , r i , o i ) , t i is a specific time stamp, r i indicates a road segment in road network and o i is the offset from the start node of the segment.
Note that once the full paths of vehicles are inferred, the trajectories can be estimated from paths. We leave the details in Section 5.1.

3.2. Road Anomaly Detection

After the process of path inference, the fine-grained trajectories for all vehicles are reconstructed. We can naturally count the volumes staying on every segment e E of road network N . Specifically, segment e is associated with a set of vehicle volumes during recent time interval [ 1 , T ] . From all volume sets of road segments in E , we aim to detect two types of anomalies.
  • Self-Evolving Anomaly (SEA). Given time interval [ 1 , T ] , assume all road segments have the same type of expected volume distribution. A Self-Evolving Anomaly is a road segment e E , such that in time interval [ 1 , T ] the values of associated volume set deviate from the expected distribution according to its historical values.
  • Context-Evolving Anomaly (CEA). A Context-Evolving Anomaly is a road segment e E , such that in time interval [ 1 , T ] the values of associated volume set deviate from the values of its connected neighbors in a region. Note that since we focus on road segments within local area, even two remote road segments could behave similarly but we leave this out of scope.
Figure 3 shows an example for the two types of anomalies. In Figure 3a, the segment in red is a SEA in time interval [18,20]. We can see the volumes of staying vehicles are evidently lower than the mean values. However, in Figure 3b, the segment in red color is not a SEA, but a CEA in the context of the selected region. The volumes of the test segment in time interval [19,20] are much higher than other segments in the region. Both SEA and CEA anomalies may suggest an event such as a parade or traffic control. Therefore, the goal of this paper is to find out road traffic anomalies of both types. We define this problem as follows.
Definition 2 (Road Traffic Anomaly Detection).
Given a road network N and large amount of GPS snippets in recent time interval [ 1 , T ] , detect all the Self-Evolving Anomalies and Context-Evolving Anomalies from segments set E .

3.3. System Framework

Figure 4 shows the framework of our method. Our method consists of two main components: a Path Inference component and an Anomaly Detection component.
The first component, namely path inference, is to complete full paths from incomplete or sparse GPS snippets, which are the inputs of our model. We separate the path inference process into two phases. In the first phase, road network and raw GPS snippets are filled into a three order tensor which is also incomplete. A tensor decomposition is employed to construct a completed tensor and extract collaborative dynamic features. To deal with data sparseness, reasonable regularization terms are added to perform the tensor decomposition procedure. In the second phase, dynamic features, as well as the static features, are filled into a conditional random field (CRF) model to run the path inference algorithm. The outputs of path inference process are full paths for all snippets of vehicles.
The goal of second component is to detect road traffic anomalies from the completed full paths of vehicles. First, trajectory reconstruction transforms paths to fine-grained trajectories such that the volumes of staying vehicles on all segments at any specific time are derived. Then second, given recent volume sets of road segments, a Likelihood Ratio Test (LRT) method can determine whether a segment is a road traffic anomaly. Finally, the RN-Scan algorithm searches the whole road network to find out all possible anomalies including SEA and CEA. We show the detailed contents of our method in the following sections.

4. Path Inference

In this section, we firstly propose a probabilistic graphical model for path inference. Then we illustrate how to learn dynamic features using tensor decomposition technique. Under both static and dynamic features, our model can better predict hidden paths that vehicles may pass through.

4.1. CRF model

4.1.1. Model Specification

Conditional Random Fields (CRF) model is one of discriminative undirected probabilistic graphical models. CRF is usually used to encode relationships between observations and hidden variables. For a specific vehicle, given a sequence of GPS observations g 1 : n = g 1 , , g n and an associated path τ = x 1 ξ 1 x n , a CRF encapsulates both GPS observations and unobserved states and paths, as shown in Figure 5.
There are two kinds of cliques in this model. One includes g i and x i , which represent observations and latent states respectively. The other contains x i , x i + 1 and ξ i , which model the relationship among latent states and paths. Instead of modeling the joint probability distribution, the CRF model intends to infer the most likely path among all candidates in the path space T , given the observations g 1 : n . The conditional probability of a candidate path τ can be modeled as the product of factors or potential functions over all cliques. The un-normalized conditional distribution is defined as follows
ϕ ( τ | g 1 : n ) = i = 1 n 1 ω ( g i | x i ) η ( ξ i , x i , x i + 1 ) · ω ( g n | x n )
where ω ( · ) and η ( · ) are potential functions over cliques. ω ( · ) describes a distribution generating noisy observation g i from state x i , while η ( · ) defines an un-normalized joint distribution that assigns weight to the clique from state x i to state x i + 1 via path ξ i .
Then we define the score of a candidate path τ as the normalized conditional probability as follows
π ( τ | g 1 : n ) = 1 Z ϕ ( τ | g 1 : n )
where Z is the partition function denoted by
Z = τ T ϕ ( τ | g 1 : n )
Since Z is a constant for each candidate path τ, we need not calculate it in model inference. Based on this CRF model, the most likely path τ * is the one with the largest conditional probability
τ * = argmax τ T π ( τ | g 1 : n ) = argmax τ T ϕ ( τ | g 1 : n )

4.1.2. Model Inference

Two potential functions are used in Equation (1). First, function ω ( · ) is the observation model, representing the probability distribution of observation g i given the state x i . We assume that this probability is related to the distance between x i and g i , and with the Gaussian noise of GPS device:
ω ( g i | x i ) = 1 2 π σ exp ( | g i x i | 2 2 σ 2 )
where parameter σ denotes the variance, and | · | denotes the Euclidean distance.
Another type of potential functions in π ( · ) is driver model η ( · ) . It models the joint distribution of two adjacent states and their associated path, and assigns a weight to any possible path ξ. We consider the driver model to be an exponential function defined as
η ( · ) exp μ 1 ϕ s ( ξ ) + μ 2 ϕ d ( ξ )
where ϕ s , ϕ d are static and dynamic feature functions respectively, and μ 1 , μ 2 are parameters.
Previous studies [8,18] usually use static feature function ϕ s with static features such as the length of road segments, the turns of a path, the speed limit of roads, etc. There are two problems in using static features. First, it may be difficult to get those features. Second, those features are context-unaware, making the probabilistic inference not reliable especially on large sampling rate of GPS snippets. Unlike these works, we add dynamic feature function ϕ d in Equation (6) such that both static features and dynamic context features can be utilized. Here dynamic context features denote features varying with time for different road segments, e.g., weather, road popularity, road average velocity, etc.
When the feature functions ϕ s and ϕ d are specified, the potential function π ( · ) is defined. The last issue is the inference of our CRF model, which is analogous to a dynamic programming problem that can be solved by Viterbi algorithm. We observe from Figure 5 that the most likely state of x t is determined by ξ t 1 and g t . If denoting the factor of those variables as Ψ t ( x t , ξ t 1 , g t ) , the Viterbi recursion can be defined as
δ t ( j ) = max i Ψ t ( j , i , g t ) δ t 1 ( i )
Once the latest state of δ is determined, we can identify the most likely sequence using the backwards recursion:
x * t = arg max i Ψ t ( x * t + 1 , i , g t + 1 ) δ t ( i )
After a forward and a backward recursion, the most likely path τ * for GPS snippets G is inferred. For the further details, we refer readers to corresponding reference [8].

4.2. Collaborative Tensor Filter

In previous subsection we have proposed a CRF model to incorporate both static and dynamic features. In this subsection, we first introduce Tensor Filter, a collaborative dynamic feature learning model. Then we propose an effective algorithm to optimize the objective for tensor decomposition. Finally, we extract the dynamic features into the CRF path inference model.

4.2.1. Tensor Construction

We firstly illustrate the key idea of collaborative feature learning model. To start with, note that most vehicles are influenced by traffic conditions spatially and temporally. We believe that a vehicle’s appearance is determined by some latent factors not only from the vehicle’s routine behavior, but also from the road traffic conditions and time stamps. Vehicles may select different paths according to the road context at different time.
Based on this intuition, we exploit a large number of GPS snippets from different vehicles to reveal latent factors among road segments, times and vehicles in a collaborative way. Unlike using matrix, we propose a tensor filter, which converts the GPS raw data into a three-order tensor A to represent the relationship among road segments, times and vehicles. Specifically, we firstly assign unique indexes to all vehicles, segments and time stamps. Secondly we fill the tensor A by values under the following rules. If a vehicle i appeared in road segment j at time stamp k, then (i) entry ( i , j , k ) is set to 1; (ii) for all segments j E \ j , entry ( i , j , k ) is set to 0; and (iii) otherwise if we did not observe the location of vehicle i at time stamp k , then entries ( i , j , k ) are missing for all j E . Note that the original tensor A is incomplete for there are missing entries, because the GPS snippets are sparse and we could not observe the locations of all vehicles at every time stamp.
The reason we assign 0 or 1 to an entry is that we consider the value of entry ( i , j , k ) to be the probability of vehicle i appeared in road j at time stamp k. For the missing entries of A , their values can be assigned a probability between 0 and 1 after tensor decomposition. As shown in Figure 6, the original tensor is sparse and a complemented tensor is derived by a tensor decomposition procedure. We can see that A is factorized into a core tensor C and three factor matrices: V,R, and T. Let the core tensor C multiplies factor matrices V,R, and T in different directions, we could get a complemented tensor A * where all values are filled.

4.2.2. Tensor Decomposition with Regularization

To get the latent factors and complement the missing values, we conduct a tensor decomposition method as well as dealing with the data sparse problem. Assume the original three-order tensor A R I 1 × I 2 × I 3 . , where I 1 , I 2 and I 3 are the number of vehicles, segments and time stamps respectively. We assign random initial values between 0 and 1 to all the missing entries of A and latent matrices. Then A can be factorized by minimizing the objective function below
L ( C , V , R , T ) = 1 2 A C × V V × R R × T T 2 + R 1 + R 2
where C R d V × d R × d T is the core tensor reflecting the link between vehicles, segments and time stamps. V R I 1 × d V , R R I 2 × d R , T R I 3 × d T are three latent factor matrices representing the low dimensional structure of vehicles, segments and time stamps respectively. · denotes the L 2 norm. The symbol × R is introduced to tensor-matrix multiplication, and the subscript R indicates the direction of multiplication. R 1 and R 2 are regularizations.
To deal with data sparseness, reasonable regularizations need to be considered for Equation (9). We introduce the widely used L 2 norm on all latent factor matrices, which encourages the entries of of factor matrices decay to zero unless supported by data:
R 1 ( C , V , R , T ) = 1 2 C 2 + V 2 + R 2 + T 2
In addition, we notice the observation that adjacent road segments always experience similar traffic conditions. Under this observation, a vehicle which appeared in road segment r at time t, would be likely to appear in the neighbors of r in recent time. Thus we normalize the topology of road network as a regularization term denoted by
R 2 ( C , V , R , T ) = 1 2 r i r j R i R j 2
where r i r j means road segments r i and r j are connected directly.
As Equation (9) is non-convex and there is no closed-form solution, we adopt a gradient descent method to compute a local optimum. The details are shown in Algorithm 1.
Algorithm 1: Tensor Decomposition Procedure
Input: tensor A and an error threshold ϵ
Output: core tensor C, latent factor matrices V,R,T
Sensors 17 00550 i001
In Algorithm 1, line 4 updates the initial values to new ones that toward the direction of gradient descent. We can easily compute the derivatives of F with respect to C,V,R and T. Note that from line 4, we use an element-wise estimation instead of a batch gradient descent for efficiency [20]. The n o r m function in line 6 calculates the L 2 norm, denoted by the loss, of original tensor A and the new updated tensor. The procedure stops unless the loss exceeds the threshold ϵ. Moreover, in every iteration of the procedure, tensor-matrix and tensor-vector multiplications are needed for computing intermediate tensors and we use an open tensor toolbox [34] to get the results.

4.2.3. Dynamic Feature Extraction

After tensor decomposition, latent factor matrices are derived. We can not directly use these matrices to infer path as it could not reflect vehicle’s preference. Instead we utilize the complemented tensor A * = C × V V × R R × T T , where entry ( i , j , k ) indicates the probability that vehicle i pass through segment j at time stamp k.
For vehicle i, let a candidate path τ = x 1 ξ 1 x n . We denote the kth candidate segments set by ξ k = r 1 k | r 2 k | | r m k where r i k is the ith segment composing ξ k . We define the dynamic feature function of ξ k as
ϕ d ( ξ k ) = 1 N r j k ξ k A i j k *
where N is the normalization term. In fact, ϕ d ( ξ k ) in Equation (12) can be expressed by the probability of vehicle i pass through path ξ k at time stamp k. Take Equation (12) into Equation (6), we derive all potential functions for our collaborative path inference model. After model inference introduced in Section 4.1.2 for each GPS snippet, we have completed the full paths for vehicles.

5. Road Traffic Anomaly Detection

In this section, we aim to detect road traffic anomalies by three processes. The first process is to reconstruct trajectories from full path of vehicles (Section 5.1). Then we calculate the volume sets of vehicles to perform a Likelihood Ratio Test in Section 5.2. We give an algorithm for road anomaly detection in the end of this section.

5.1. Trajectory Reconstruction

To calculate the volumes of staying vehicles on each segment in recent time interval [1,T], we need to specify the locations of vehicles at every time stamp. However, the full path of a vehicle only consists of several paths and states, which could not reflect the locations at any given time stamp. Hence in this subsection we estimate the locations at any time stamp to construct fine-grained trajectories.
Assume we are given the full path τ = x 1 ξ 1 ξ T 1 x T , for a set of time stamps 1 t 1 < t 2 < < t m T , our aim is to construct a trajectory L = { l 1 , l 2 , , l m } , where l j = ( t j , r j , o j ) , j [ 1 , m ] . To simplify the problem, we assume vehicles travel in a constant speed along sub-path between two consecutive states. Then the average velocity between states x i and x i + 1 along sub-path ξ i can be calculated by v ¯ i = | ξ i | t i + 1 t i , where | · | denotes the length of path. Note that the superscript i indicates the time stamp of states. Let time stamp t j [ t i , t i + 1 ] , we can conclude that segment r j must be in sub-path ξ i . More importantly, since we know the average velocity and the length of every segments in ξ i , we can easily infer which segment r j is and the corresponding offset o j . Then the fine-grained trajectory in time interval [ 1 , T ] is reconstructed by doing this operation iteratively. We perform the same computation on all paths of vehicles and finally derive a large number of fine-grained trajectories.

5.2. Likelihood Ratio Test

Given the fine-grained trajectories, we can get the volume sets of each segment in road network N . For segment e E , we count the volumes of staying vehicles at time stamps 1 t 1 < t 2 < < t m T . We denote the volumes set as S e = { V 1 e , V 2 e , , V m e } . Then the aim of this subsection is to evaluate whether segment e is a SEA or CEA in this time interval.

5.2.1. Self-Evolving Anomaly Detection

We utilize a Likelihood Ratio Test (LRT) on volumes set S k to detect a SEA. The LRT statistic is one of hypothesis tests that exhibit the comparison of the fitness of two models: the null model versus the alternative model. The comparison result is based on the likelihood ratio, which can be used to extrapolate how many times more likely the data are under one model than the other. The two models have identical likelihood functions, which are specified by a certain distribution with different parameters.
In this paper, the null model is associated with the hypothesis that there is no anomaly on the tested road segment, while the alternative model is associated with the hypothesis that there is an anomaly. For the volumes set S e , we assume the items in it are independently identically distributed (i.i.d.) and follow a Gaussian distribution N ( · | θ ) with parameter θ = ( μ , Σ ) , where μ and Σ are the mean volume and corresponding variance respectively. Let θ 0 = ( μ 0 , Σ 0 ) be the parameters of null model which is already known. The test statistic of two models is:
λ ( e ) = j = 1 m N ( V j e | θ 0 ) sup θ Θ j = 1 m N ( V j e | θ )
where θ is the new parameter in space Θ that fits the observed volume set data best, and sup denotes the supremum function maximizing the likelihood distribution.
According to Equation (13), we need to compute a maximum likelihood estimate (MLE) over space Θ. To directly determine whether the alternative model is anomalous, the test statistic λ ( e ) is often transformed by negative twice the difference in the log-likelihoods as follows:
Λ ( e ) = 2 log λ ( e )
We subsequently refer to Λ as the LRT statistic which can be approximated by an asymptotic Chi-Squared distribution χ 2 ( Λ , d f ) , where d f = p q is called the degree of freedom. p , q are the number of free parameters of the null model and the alternative model, respectively. This indicates that the Λ value of an anomaly possibly lies in the tail of χ 2 distribution. Figure 7 shows the Probability Distribution Function (PDF) of two Chi-Squared distribution with df equals 1 and 3. The shaded area is the tail in which an anomaly may drop in. We define the anomaly degree of SEA as:
d = χ 2 _ c d f ( Λ , d f )
where χ 2 _ c d f ( · ) denotes the cumulative density function of the Chi-Squared distribution. Thus given a significance level α, if d > 1 α , then the segment e is considered as a SEA.
Let us take an example. Suppose there is a volume set S e = { 85 , 88 , 94 , 92 , 96 , 95 } . The null model is a Gaussian with parameters θ 0 = ( 65 , 20 ) . Then the anomaly degree of segment e is calculated as follows:
(a)
The likelihood of null model: L n u l l = j = 1 m N ( V j e | θ 0 ) = 2.7 × 10 13 ;
(b)
Estimate the parameter θ M L E for the alternative model: μ M L E = 1 m j = 1 m V j e = 91.7 , Σ M L E = 1 m j = 1 m V j e μ M L E 2 = 18.7 ;
(c)
The likelihood of alternative model: L a l t e r = j = 1 m N ( V j e | θ M L E ) = 8.3 × 10 11 ;
(d)
Calculate Λ ( e ) and d: Λ ( e ) = 2 log ( 2 . 7 × 10 13 8 . 3 × 10 11 ) = 11.46 , d = χ 2 _ c d f ( 11.46 , d f = 2 ) = 0.9968 .
Note that given a significance level α = 0.05 , d = 0.9968 > 0.95 . We can confidently say that segment e is a SEA.

5.2.2. Context-Evolving Anomaly Detection

A Context-Evolving Anomaly (CEA) is a segment who significantly deviates the volumes distribution of its neighbor segments in a given region. To contrast the volume datasets, we also utilize the LRT technique. Unlike the Self-Evolving Anomaly detection, both the null model and the alternative model are not known beforehand and need to be estimated from data.
Assume the test segment e has a volume set S e = { V 1 e , V 2 e , , V m e } . The neighboring segments set of e is denoted by N S ( e ) . For each e N S ( e ) , the corresponding volume set is S e = { V 1 e , V 2 e , , V m e } . Then the test statistic of two models is
λ ( e ) = sup θ 0 Θ j = 1 m N ( V j e | θ 0 ) j = 1 m N ( V j e | θ * )
where θ 0 is the parameter in space Θ that best fits the observed volume set data S e of tested segment e; θ * is the parameter in space Θ = Θ θ 0 that best fits all the neighborhood segments volume sets data of e. θ * can be derived by maximizing the likelihood as follows:
θ * = sup θ Θ e N S ( e ) j = 1 m N ( V j e | θ )
The next phase of CEA test is similar to SEA, including the calculation of the test statistic Λ ( e ) and anomaly degree d. They are defined in Equations (14) and (15). We summarize the process of CEA detection as follows:
(a)
Estimate the MLE parameter θ 0 from S e for the null model;
(b)
Calculate the likelihood of null model given θ 0 ;
(c)
Estimate the MLE parameter θ * from the neighbors volume data sets of S e , e N S ( e ) ;
(d)
Calculate the likelihood of alternative model given θ * ;
(e)
Calculate test statistic Λ ( e ) , anomaly degree d, and give judgement.
In the last part of this section, we summarize all the details of anomaly detection component in an algorithm called RN-Scan. The details are listed in Algorithm 2 as follows. Note that the functions S E A ( · ) and C E A ( · ) denote the process of examine a segment e by corresponding LRT defined in Section 5.2.1 and Section 5.2.2 respectively.
Algorithm 2: RN-Scan (Road Traffic Anomaly Detection)
Input: Inferred vehicle path set, Road Network N
Output: SEA set A, CEA set C
Sensors 17 00550 i002

6. Experiments

Our experiments consist of three parts: (1) experimental settings including the data set and experimental environment; (2) the results and discussions of collaborative path inference; and (3) the evaluation effects of proposed road traffic anomaly detection algorithm.

6.1. Dataset

We use a benchmark GPS dataset, the Beijing Taxi Cab dataset which collected GPS data from 8602 taxi cabs in Beijing, China, during one month period in May 2012. It contains over 29,893,141 GPS measurements and the expected sampling rate of GPS snippets is 30 s. However, for many reasons a large number of vehicles have non-uniform sampling intervals ranging from 30 s to 10 min. Besides the GPS data, the map data used in our experiments are obtained from the Open Street Map (http://www.openstreetmap.org) of Beijing urban area, covering the whole Beijing area and storing in geo-database format. We use ArcGIS 10 as the GIS (Geographic Information System) platform to map and visualise those geographical data, as can be seen in Figure 8a.

6.2. Evaluation on Path Inference

6.2.1. Evaluation Approach

We select four different regions in Beijing as our test regions, and each region is about 20 × 10 km2. Figure 8b displays the four regions. These regions have different functions, for example, region 3 (bottom-left of Figure 8b) is Beijing’s administrative center which is inside the Third Ring road.
For each test region, we firstly clean the map data by removing and merging some neighboring road segments to construct an undirected road network for each selected region. Then we pick out vehicles which have GPS measurements in those regions to build a GPS snippets database. We divide the GPS snippets into two subsets: a training set that all snippets are sampled within 1 min, and another test set for evaluation. Note that the test set has non-uniform intervals. To get the dynamic features, in our model both training snippets and test snippets are used to construct the tensor. We will test the effects by adjusting the proportion of training snippets versus test snippets in Section 6.2.2.
We evaluate the performance of proposed path inference method by three typical metrics: error, precision and recall. The error is defined as the route mismatched fraction, which refers to the ratio of the number of different segments both in inferred path τ and in the true path P, against the the total number of the true path in P. The precision of a path τ refers to the ratio of the number of true segments in τ against the total number of all road segments in τ. While the recall refers to the ratio of the number of true road segments in τ against the total number of true road segments P.
We use static CRF (SCRF) model [8] and HMM [18] model for path inference as baseline algorithms, both adopting the static features such as length of road segment. For our tensor filter, we set λ 1 and λ 2 to 0.01 for Equation (9). Next we fix the value of dimensions of latent matrices as d V = d T = d R = 10 . For Equation (12) we set N to be the number of road segments a trajectory have. In the end, we adjust parameters μ 1 and μ 2 in Equation (3) to get the best performance.
To get the ground truths of path inference, we developed a path labeling system helping experts to label the ground truth path according to incomplete GPS snippets. As shown in Figure 9, the blue cross points are GPS measurements and red line is manually labeled path. We recruited 10 experienced drivers who had 3 + years of driving experience in Beijing to label those selected snippets. Each labeler was responsible for 100 snippets and each snippet was labeled by at least 3 labelers. Then the ground truth was derived by majority voting.

6.2.2. Results

Effect of time interval. As the ratio of snippets in training set can affect the result of experiments, we first fix the ratio to 90% by selecting 450 snippets in training set and 50 snippets in test set. Then we vary the intervals of test snippets and use 5 round cross validations to get the average values. Generally the intervals of test snippets are 30 s, but we let part of GPS measurements missing to meet the test granularity requirement. Figure 10 shows the results that as the intervals between two observations grows, the performances of all methods reduce. But our collaborative method CPI (blue line) outperforms two other methods by all metrics. In detail, we can see that when intervals are lower than 2 min, the error of our CPI method is within 90% while other methods can only achieve 80%. Both precision and recall are more than 95% for our CPI method, outperforming SCRF and HMM. But the difference is not high for these three methods. This is because that the higher sampling rate of GPS snippets, the higher entropy they have for better reconstructing the original hidden trajectories. However, when time intervals increase to more than 5 min, our CPI method greatly outperforms others because it considers the dynamic context spatially and temporally. Even the intervals are 10 min, the error is lower than 30%, and the precision and recall are higher than 80% for our method. Note that if more static features are adopted, SCRF and HMM [19] could have a better performance than depicted in Figure 10, but the improvements are very limited. Our method uses dynamic context features automatically extracted from observations, with little static features but, can achieve high accuracy.
Effect of training vs. testing ratio. We next evaluate the performance by changing the proportion of snippets of training set vs. snippets of testing set. Since the snippets in training set have small intervals, generally 30 or 60 s, the dynamic features extracted from our tensor filter would be affected seriously. But for baselines there are none of affections, as shown in Figure 11 where both the HMM and SCRF are horizonal lines. We can see that when training set ratio decreases, the error grows greatly to 80% as well as the precision and recall dropping to 0.2. When training set ratio is lower than 0.7, the precision and recall of our method are lower than the baselines. However, if the training set ratio is larger than 0.7, our method performs better. That’s because with the “help” of more high-sampling snippets in training set, the collaboration of all vehicles could do better for discovering the latent trajectories for vehicles.

6.3. Evaluation on Anomaly Detection

6.3.1. Settings

We also use previous taxi dataset to verify the effectiveness of the proposed road anomaly detection method. Taxicabs represent one of significant components contributing the traffic volumes on the road network for big city. It is reported that about 20% of traffic on road segments in Beijing is generated by taxicabs [35]. We choose region (3) as the test region (bottom-left in Figure 8b) and retrieve all the GPS snippets of one months data for evaluation. Region (3) is within the third ring road of Beijing area. To simplify the computation, we only take the main roads into consideration and omit some low-class streets. The simplified road network of region (3) contains 185 road segments and all of them are bidirectional.
We use our collaborative path inference (CPI) model to reconstruct the incomplete GPS snippets, and count the traffic volumes for each road segment every ten minutes. Then each road segment has an associated historical volume time series.

6.3.2. Evaluation for SEA

Baseline methods. We introduce three baseline methods: Snippet-Threshold method (ST), Snippets-LRT method (SL) and Trajectory-Threshold method (TT). Snippet-Threshold method first uses the incomplete GPS Snippets to count the volume of vehicles staying in road segments, and the I-threshold (an individual threshold-based method [31]) to detect road anomalies. Snippets-LRT method also uses the incomplete GPS Snippets, but the likelihood ratio test for road anomaly detection. Trajectory-Threshold method utilizes the same path inference model as proposed method to reconstruct trajectories from GPS snippets, but I-threshold to detect anomalies.
We evaluate the proposed method with baselines for Single-Evolving Anomaly. We select three time span for testing: (1) 8:00–9:00; (2) 13:00–14:00; and (3) 18:00–19:00. According to Equation (13), we first learn parameter θ 0 for all segments on tested time span. Note that the values of θ 0 for same segments are different in weekdays and weekends. In this experiment, we use the volume values in weekdays for training and testing. Since there are no ground truth anomalies in our dataset, we adopt two alternative way.
The first way is volume replacement since the volumes of road segments on weekdays are significantly different from on weekends. For all segments, we take their real volumes on a weekend day to replace their corresponding real volumes on the testing weekday. Then we can safely assume all segments are SEA in the testing time span. The detection performance is shown in Figure 12a. We can see that the average precision of proposed method is nearly 90%, which is about 20% higher than the highest average precision of baseline. The variance of proposed method is also the smallest, compared to other baselines.
Note in this scenario, the ground truths are not very accurate. The reason is that although for many time intervals the test volumes of segments are anomalous, they also exist segments whose volumes show little changes. Figure 13 presents the detected abnormal segments in different time spans. The segments in dark blue color are detected road anomalies while segments in light blue color are not. We can see that in the rush hour (Figure 13a,c) we have detected more anomalies especially on the second and third ring road, which indicates that the ring roads are heavy-traffic roads and likely to make congestions. While in the afternoon the volumes of most segments on weekdays are similar to that of weekends, which generate less road anomalies (Figure 13b).
For the second way, we use the anomaly injection technique. That is, we manually generate the volumes for tested segments, with values larger than θ 0 + 3 σ , where θ 0 is the mean and σ is the standard deviation of historical traffic volumes. Thus we can treat all tested segments abnormal. The experimental results are shown in Figure 12b. The precision of proposed method achieves nearly 98%, outperforms other baselines. Although the average precision of Trajectory-Threshold (TT) method is also high, its variance is larger than our method.

6.3.3. Evaluation for CEA

After the evaluation of SEA, we perform experiments for detecting Context-Evolving Anomaly (CEA). The aim of CEA detection is to find out inconsistence of road segments with their neighbor segments within a region. We tested the data in a weekday and report the number of detected anomalies in Table 1. The compared baseline is the Snippet-LRT method, which uses the original GPS snippets and the same LRT anomaly detection algorithm as ours. The results show that the proposed method can find out more Context-Evolving Anomalies than the baseline.
We examine these anomalies according to the traffic reports from Beijing Traffic Management Bureau (BTMB) and find out that Context-Evolving Anomalies can be categorized into two types. For the first type, the volume of detected segment is significantly larger than its neighboring segments (Figure 14a), which means the detected segment was a traffic congestion and an event was likely to happen. For the second type, however, the volume of detected segment is significantly smaller than its neighboring segments (Figure 14b), which indicates that the detected segment may experience a road closure or it is not convenient to direct traffic flows from congested roads.

6.4. Efficiency

Our implemented algorithm ran on a desktop machine with Intel Core I5-3380 2.90 GHz dual core CPU and 8 GB memory. For path inference part, it would cost about 5 min to carry out the tensor decomposition. Once the dynamic context features are derived, the cost time of inference is within 2 min for all snippets in our test set. For anomaly detection part, we can detect all the road traffic anomalies within Beijing’s third ring toad in 100 ms.

7. Conclusions

GPS snippets collected from vehicles are characterized by noisy and sparse measurements which pose challenges on directly using them for road traffic anomaly detection. In this paper, we develop a two-stage method to effectively detect traffic anomalies from GPS snippets. To address the noisy GPS measurements, we adopt a probabilistic graphical model, i.e., Conditional Random Fields to infer the latent states and paths. The advantage of CRF model is that it is robust to noise and it can utilize both static and dynamic context features. Because of the sparse nature of snippets, dynamic features can help promote the accuracy of path inference. To get the latent dynamic features, we design a tensor factorization algorithm with reasonable regularization to collaboratively learn from snippets data. In the stage of anomaly detection, we define and recognize two types of road traffic anomalies, namely SEA and CEA, and propose an algorithm called RN-Scan to effectively find them. Our algorithm leans on the Likelihood Ratio Test (LRT) superseding traditional threshold based method to evaluate the anomaly degree for each segment in road network. In view of real-world experimental results, we discover that our method can effectively achieve the proposed objects, both on path inference and road anomaly detection. We believe that our work will not only advance the research on IoT and urban computing, but also benefit many real-world location-based applications.
However, there could be other road traffic abnormal patterns, such as normal volume of traffic with much slower velocity than usual, or several faraway segments behave abnormal on volumes. A thought is that other traffic pattern related information could be included to the tensor decomposition for refined dynamic feature discovery. Further more, we could collect multi-source location-based datasets such as taxicabs, check-ins, smart card records, etc. Those data could also be utilized to discover abnormal traffic patterns from different points of view. We could combine them into one model and perform multi-task learning to jointly detect traffic anomalies. We leave all these problems for future work.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 61472418), and the “Strategic Priority Research Program” of the Chinese Academy of Sciences (Grant No. XDA06040101).

Author Contributions

The research was planned by Hongtao Wang and Limin Sun; Hui Wen and Hongtao Wang developed the path inference model; Road traffic anomaly detection were conducted by Feng Yi; Feng Yi and Hongsong Zhu performed the experiments; Hongtao Wang and Limin Sun wrote the paper; All authors contributed in manuscript preparation.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zheng, Y.; Capra, L.; Wolfson, O.; Yang, H. Urban Computing: Concepts, Methodologies, and Applications. ACM Trans. Intell. Syst. Technol. 2014, 5, 38:1–38:55. [Google Scholar] [CrossRef]
  2. Guan, X.; Huang, Y.; Cai, Z.; Ohtsuki, T. Intersection-based forwarding protocol for vehicular ad hoc networks. Telecommun. Syst. 2016, 62, 67–76. [Google Scholar] [CrossRef]
  3. Huang, Y.; Guan, X.; Cai, Z.; Ohtsuki, T. Multicast capacity analysis for social-proximity urban bus-assisted VANETs. In Proceedings of the IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, 9–13 June 2013; pp. 6138–6142.
  4. Wen, H.; Ge, S.; Chen, S.; Wang, H.; Sun, L. Abnormal event detection via adaptive cascade dictionary learning. In Proceedings of the 2015 IEEE International Conference on Image Processing, Quebec City, QC, Canada, 27–30 September 2015; pp. 847–851.
  5. Khan, F.; Akhtar, N.; Qadeer, M.A. RFID Enhancement in Road Traffic Analysis by Augmenting Reciever with TelegraphCQ. In Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23–25 January 2009; pp. 331–334.
  6. Li, M.; Ahmed, A.; Smola, A.J. Inferring Movement Trajectories from GPS Snippets. In Proceedings of the Eighth ACM International Conference on Web Search and Data Mining (WSDM), Shanghai, China, 2–6 February 2015.
  7. Yin, H.; Wolfson, O. A Weight-based Map Matching Method in Moving Objects Databases. In Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM), Santorini Island, Greece, 21–23 June 2004; pp. 437–438.
  8. Hunter, T.; Abbeel, P.; Bayen, A. The Path Inference Filter: Model-Based Low-Latency Map Matching of Probe Vehicle Data. IEEE Trans. Intell. Transp. Syst. 2014, 15, 507–529. [Google Scholar] [CrossRef]
  9. Su, X.; Khoshgoftaar, T.M. A Survey of Collaborative Filtering Techniques. Adv. Artif. Intell. 2009, 2009, 421425. [Google Scholar] [CrossRef]
  10. Karatzoglou, A.; Amatriain, X.; Baltrunas, L.; Oliver, N. Multiverse recommendation: N-dimensional tensor factorization for context-aware collaborative filtering. In Proceedings of the 2010 ACM Conference on Recommender Systems (RecSys), Barcelona, Spain, 26–30 September 2010; pp. 79–86.
  11. Huang, Y.; Chen, M.; Cai, Z.; Guan, X.; Ohtsuki, T.; Zhang, Y. Graph Theory Based Capacity Analysis for Vehicular Ad Hoc Networks. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–5.
  12. White, C.E.; Bernstein, D.; Kornhauser, A.L. Some map matching algorithms for personal navigation assistants. Transp. Res. Part C Emerg. Technol. 2000, 8, 91–108. [Google Scholar] [CrossRef]
  13. Greenfeld, J.S. Matching GPS observations to locations on a digital map. In Proceedings of the Transportation Research Board 81st Annual Meeting, Washington, DC, USA, 13–17 January 2002.
  14. Brakatsoulas, S.; Pfoser, D.; Salas, R.; Wenk, C. On Map-Matching Vehicle Tracking Data. In Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), Trento, Italy, 4–6 October 2005.
  15. Gustafsson, F.; Gunnarsson, F.; Bergman, N.; Forssell, U.; Jansson, J.; Karlsson, R.; Nordlund, P. Particle filters for positioning, navigation, and tracking. IEEE Trans. Signal Process. 2002, 50, 425–437. [Google Scholar] [CrossRef]
  16. Najjar, M.E.E.; Bonnifait, P. A Road-Matching Method for Precise Vehicle Localization Using Belief Theory and Kalman Filtering. Auton. Robots 2005, 19, 173–191. [Google Scholar] [CrossRef]
  17. Yuan, J.; Zheng, Y.; Zhang, C.; Xie, X.; Sun, G. An Interactive-Voting Based Map Matching Algorithm. In Proceedings of the Eleventh International Conference on Mobile Data Management (MDM), Kansas City, MO, USA, 23–26 May 2010.
  18. Newson, P.; Krumm, J. Hidden Markov map matching through noise and sparseness. In Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems (ACM-GIS), Seattle, WA, USA, 4–6 November 2009; pp. 336–343.
  19. Osogami, T.; Raymond, R. Map Matching with Inverse Reinforcement Learning. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI), Beijing, China, 3–9 August 2013.
  20. Wang, Y.; Zheng, Y.; Xue, Y. Travel time estimation of a path using sparse trajectories. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), New York, NY, USA, 24–27 August 2014.
  21. Zhong, Y.; Yuan, N.J.; Zhong, W.; Zhang, F.; Xie, X. You Are Where You Go: Inferring Demographic Attributes from Location Check-ins. In Proceedings of the Eighth ACM International Conference on Web Search and Data Mining (WSDM), Shanghai, China, 2–6 February 2015; pp. 295–304.
  22. Cai, Z.; He, Z.; Guan, X.; Li, Y. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Trans. Dependable Secur. Comput. 2016, PP, 1. [Google Scholar] [CrossRef]
  23. Gao, S.; Denoyer, L.; Gallinari, P. Link Pattern Prediction with tensor decomposition in multi-relational networks. In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Paris, France, 11–15 April 2011; pp. 333–340.
  24. Wang, X.; Guo, L.; Ai, C.; Li, J.; Cai, Z. An Urban Area-Oriented Traffic Information Query Strategy in VANETs. In Proceedings of the 8th International Conference on Wireless Algorithms, Systems, and Applications (WASA), Zhangjiajie, China, 7–10 August 2013; pp. 313–324.
  25. Zheng, X.; Cai, Z.; Li, J.; Gao, H. An Application-Aware Scheduling Policy for Real-Time Traffic. In Proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS), Columbus, OH, USA, 29 June–2 July 2015; pp. 421–430.
  26. Zheng, X.; Cai, Z.; Li, J.; Gao, H. A Study on Application-aware Scheduling in Wireless Networks. IEEE Trans. Mob. Comput. 2016, PP, 1. [Google Scholar] [CrossRef]
  27. Sun, Y.; Zhu, H.; Liao, Y.; Sun, L. Vehicle Anomaly Detection Based on Trajectory Data of ANPR System. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6.
  28. Pang, L.X.; Chawla, S.; Liu, W.; Zheng, Y. On detection of emerging anomalous traffic patterns using GPS data. Data Knowl. Eng. 2013, 87, 357–373. [Google Scholar] [CrossRef]
  29. Chawla, S.; Zheng, Y.; Hu, J. Inferring the Root Cause in Road Traffic Anomalies. In Proceedings of the 12th IEEE International Conference on Data Mining (ICDM), Brussels, Belgium, 10–13 December 2012; pp. 141–150.
  30. Liu, W.; Zheng, Y.; Chawla, S.; Yuan, J.; Xing, X. Discovering spatio-temporal causal interactions in traffic data streams. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, 21–24 August 2011; pp. 1010–1018.
  31. Karnstedt, M.; Klan, D.; Pölitz, C.; Sattler, K.; Franke, C. Adaptive burst detection in a stream engine. In Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, HI, USA, 9–12 March 2009; pp. 1511–1515.
  32. Liu, S.; Chen, L.; Ni, L.M. Anomaly Detection from Incomplete Data. Trans. Knowl. Discov. Data 2014, 9, 11:1–11:22. [Google Scholar] [CrossRef]
  33. Wu, M.; Song, X.; Jermaine, C.; Ranka, S.; Gums, J. A LRT framework for fast spatial anomaly detection. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009; pp. 887–896.
  34. Bader, B.W.; Kolda, T.G. Efficient MATLAB computations with sparse and factored tensors. SIAM J. Sci. Comput. 2007, 30, 205–231. [Google Scholar] [CrossRef]
  35. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of traffic anomalies based on human mobility and social media. In Proceedings of the 21st International Conference on Advances in Geographic Information Systems (SIGSPATIAL), Orlando, FL, USA, 5–8 November 2013; pp. 334–343.
Figure 1. Road Anomaly Detection. (a) GPS Snippets; (b) Full Paths; (c) Trajectories; (d) Anomaly Detection.
Figure 1. Road Anomaly Detection. (a) GPS Snippets; (b) Full Paths; (c) Trajectories; (d) Anomaly Detection.
Sensors 17 00550 g001
Figure 2. Concepts on path inference.
Figure 2. Concepts on path inference.
Sensors 17 00550 g002
Figure 3. Two types of road anomalies. (a) Self-Evolving Anomaly; (b) Context-Evolving Anomaly.
Figure 3. Two types of road anomalies. (a) Self-Evolving Anomaly; (b) Context-Evolving Anomaly.
Sensors 17 00550 g003
Figure 4. Overview of our method.
Figure 4. Overview of our method.
Sensors 17 00550 g004
Figure 5. A conditional random field (CRF) model with n observations.
Figure 5. A conditional random field (CRF) model with n observations.
Sensors 17 00550 g005
Figure 6. Tensor Decomposition.
Figure 6. Tensor Decomposition.
Sensors 17 00550 g006
Figure 7. Chi-Squared Distribution.
Figure 7. Chi-Squared Distribution.
Sensors 17 00550 g007
Figure 8. Map and Data Visualization. (a) Beijing Urban Area; (b) Selected Regions.
Figure 8. Map and Data Visualization. (a) Beijing Urban Area; (b) Selected Regions.
Sensors 17 00550 g008
Figure 9. Path Labeling.
Figure 9. Path Labeling.
Sensors 17 00550 g009
Figure 10. Experimental results by different sampling time intervals. (a) Error; (b) Precision; (c) Recall.
Figure 10. Experimental results by different sampling time intervals. (a) Error; (b) Precision; (c) Recall.
Sensors 17 00550 g010
Figure 11. Experimental results by different training ratios. (a) Error; (b) Precision; (c) Recall.
Figure 11. Experimental results by different training ratios. (a) Error; (b) Precision; (c) Recall.
Sensors 17 00550 g011
Figure 12. Performance of Single-Evolving Anomaly Detection. (a) The first way; (b) The second way.
Figure 12. Performance of Single-Evolving Anomaly Detection. (a) The first way; (b) The second way.
Sensors 17 00550 g012
Figure 13. Single-Evolving Anomaly within the third ring road in different time. Segments in dark blue are anomalies. (a) 8:00–9:00; (b) 13:00–14:00; (c) 18:00–19:00.
Figure 13. Single-Evolving Anomaly within the third ring road in different time. Segments in dark blue are anomalies. (a) 8:00–9:00; (b) 13:00–14:00; (c) 18:00–19:00.
Sensors 17 00550 g013
Figure 14. Two types of Context-Evolving Anomaly. The segments indicated by arrow is the test segments, and the area in the dotted oval is the context region. (a) Higher volume than neighbors; (b) Lower volume than neighbors.
Figure 14. Two types of Context-Evolving Anomaly. The segments indicated by arrow is the test segments, and the area in the dotted oval is the context region. (a) Higher volume than neighbors; (b) Lower volume than neighbors.
Sensors 17 00550 g014
Table 1. The number of detected CEA in a day.
Table 1. The number of detected CEA in a day.
8–1011–1314–1617–1920–22
proposed76455
Snippet-LRT method33413

Share and Cite

MDPI and ACS Style

Wang, H.; Wen, H.; Yi, F.; Zhu, H.; Sun, L. Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. Sensors 2017, 17, 550. https://doi.org/10.3390/s17030550

AMA Style

Wang H, Wen H, Yi F, Zhu H, Sun L. Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. Sensors. 2017; 17(3):550. https://doi.org/10.3390/s17030550

Chicago/Turabian Style

Wang, Hongtao, Hui Wen, Feng Yi, Hongsong Zhu, and Limin Sun. 2017. "Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets" Sensors 17, no. 3: 550. https://doi.org/10.3390/s17030550

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop