<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Improving Accuracy of Anomaly Detection in Spatial-Temporal Population Data through SHAP Values of Reconstruction Errors⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ryo Koyama</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomohiro Mimura</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Shin Ishiguro</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Keisuke Kiritoshi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Takashi Suzuki</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Akira Yamada</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>NTT Communications Corporation</institution>
          ,
          <addr-line>Otemachi Place West Tower, 2-3-1 Otemachi, Chiyoda-ku, Tokyo</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>NTT DOCOMO, INC</institution>
          ,
          <addr-line>Sanno Park Tower, 2-11-1 Nagatacho, Chiyoda-ku, Tokyo</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>When accidents, disasters, or other large-scale events occur, they significantly disrupt trafic, leading to congestion and reduced mobility. To efectively address these issues, it is crucial to precisely detect the underlying causes of these disruptions through the analysis of human mobility data. A common approach in anomaly detection is to employ dimensionality reduction techniques to compute reconstruction errors. However, the reconstruction errors generated by traditional methods are influenced by the correlations among features, which may obscure the true causes of anomalies. To overcome this limitation, we introduce an approach that calculates the SHAP (SHapley Additive exPlanations) values associated with the reconstruction errors resulting from dimensionality reduction. We conducted experiments using a dataset of human mobility patterns to evaluate the efectiveness of this method. The results demonstrate that our approach provides a more accurate explanation of anomalies compared to conventional methods.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Anomaly Detection</kwd>
        <kwd>Spatial-Temporal</kwd>
        <kwd>SHAP</kwd>
        <kwd>Dimensionality Reduction</kwd>
        <kwd>Reconstruction Error</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Anomaly detection in spatial-temporal population data has
gained significant attention in recent years due to its
potential applications in urban planning, disaster management,
and public safety. Accurate identification of unusual
patterns in human mobility can help authorities respond more
efectively to disruptive events such as accidents and
disasters. However traditional anomaly detection methods often
face challenges in capturing the complex spatial and
temporal dependencies in high dimensional population data.</p>
      <p>
        Previous studies have explored various approaches to
anomaly detection in spatial temporal data. Ochiai et al.[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
proposed a method that utilizes mesh-based population data
derived from mobile communication records to detect
nondesignated evacuation centers during disasters. Their
approach relies on significant reconstruction errors in anomaly
scenarios, which are trained only with data representing
normal conditions. While this method demonstrates
potential, it may not efectively capture the underlying causes of
anomalies.
      </p>
      <p>
        On the other hand, Takeishi[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] demonstrated the
efectiveness of using Shapley values to explain the causes of
anomalies in dimensionality reduction scenarios. By
applying Shapley values to one-dimensional health data, such as
myocardial infarction and breast cancer records, Takeishi’s
method provides a more interpretable understanding of
anomaly detection results. However, the applicability of
this approach to high-dimensional spatial-temporal data
has not been explored.
      </p>
      <p>Building upon the insights from Ochiai et al. and Takeishi,
we propose a novel anomaly detection framework that
combines the strengths of both approaches. Our method
integrates SHAP (SHapley Additive exPlanations) values with
dimensionality reduction to identify and explain anomalies
in spatial-temporal population data. By leveraging the
explanatory power of SHAP values, we aim to improve the
accuracy and interpretability of anomaly detection results,
while also extending the applicability of Takeishi’s approach
to high-dimensional data.</p>
      <p>The main contributions of this paper are as follows:
• We introduce a novel anomaly detection method
that integrates dimensionality reduction with SHAP
values to identify anomalies in spatialtemporal
population data.
• We evaluate the efectiveness of our approach using
a real-world dataset of human mobility patterns in
a major urban area, demonstrating its superiority
compared to traditional reconstruction error-based
methods.
• We extend the applicability of Takeishi’s Shapley
value-based approach to high-dimensional
spatialtemporal data, enhancing its utility for real-world
scenarios.</p>
      <p>
        The remainder of this paper is organized as follows.
Section 2 provides an overview of related work in anomaly
detection and spatial-temporal data analysis. Section 3
describes our proposed methodology in detail. Section 4
presents the experimental setup. Section 5 discusses the
experimental results. Finally, Section 6 concludes the paper
and discusses future research directions.
The detection of anomalies in urban population flows has
been extensively explored using diverse data sources,
including road sensors[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], surveillance cameras[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and social
media data[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. While road sensors and surveillance
cameras prove efective for identifying local abnormalities, their
broader application for city-wide anomaly detection is
hampered by high installation and maintenance costs. On the
other hand, social media data facilitates multimodal anomaly
detection methods, such as the integration of bike-sharing
and taxi usage history[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and the semantic interpretation
of location-based anomalies identified through social media
analytics[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        This research leverages population data extracted from
communication logs between mobile devices and base
stations to enhance anomaly detection capabilities. In contrast
to road sensors and surveillance cameras, mobile device data
captures a wide array of individual behaviors throughout the
entire city, thus ofering a more comprehensive solution for
detecting anomalies. For instance, Yabe et al.[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] utilized
statistical methods to detect the emergence of non-designated
shelters during disasters, although their studies lacked a
quantitative assessment of accuracy. Similarly, Ochiai et
al. used mobile phone-based population data to detect
nondesignated evacuation sites during disasters by focusing on
reconstruction errors. However, as Takeishi has pointed
out, these reconstruction errors, significantly influenced by
feature interactions, may not accurately pinpoint anomaly
locations. To overcome this limitation, Takeishi introduced
a method that employs Shapley Values to elucidate the
origins of anomalies within dimensionality reduction models.
      </p>
    </sec>
    <sec id="sec-2">
      <title>3. Methodologies</title>
      <p>This section details our proposed methodology, SHAP
Values of Reconstruction Error, for anomaly detection,
incorporating SHAP values derived from reconstruction errors. We
begin by describing Principal Component Analysis (PCA) as
the foundation for dimensionality reduction. Subsequently,
we outline the traditional method based on reconstruction
errors. Then, we introduce our enhanced approach that
integrates SHAP values to improve the accuracy and
effectiveness of anomaly detection. Finally, we explain the
calculation of SHAP values for multi-dimensional
objective variables, extending the methodology to more complex
scenarios.</p>
      <sec id="sec-2-1">
        <title>3.1. Principal Component Analysis</title>
        <p>PCA is a widely-used technique for reducing the
dimensionality of high-dimensional data while preserving the most
significant features. By projecting the data onto a
lowerdimensional space, PCA identifies the principal components
that capture the maximum variance in the data.</p>
        <p>Given a dataset X ∈ R×  with  samples and  features,
the PCA process involves the following steps:
1. Standardize the Data: Subtract the mean of each
feature from the dataset to center the data around
the origin.
2. Compute the Covariance Matrix: Calculate the
covariance matrix C = 1 X X.
3. Perform Eigenvalue Decomposition:
Decompose the covariance matrix into eigenvalues and
eigenvectors: C = VΛV , where Λ is a diagonal
matrix containing the eigenvalues, and V is a matrix
whose columns are the corresponding eigenvectors.
4. Select Principal Components: Choose the top
 eigenvectors corresponding to the largest
eigenvalues to form the principal components. These
components maximize the variance retained in the
lower-dimensional space.</p>
        <p>In this study, we set the threshold for the variance to be
retained at 90%. This means that we select the number of
principal components  such that the cumulative variance
explained by these components is at least 90%. By retaining
the principal components that explain the majority of the
variance, PCA ensures that the most important features of
the data are preserved, allowing for efective dimensionality
reduction and subsequent analysis.</p>
      </sec>
      <sec id="sec-2-2">
        <title>3.2. Reconstruction Error</title>
        <p>Using the principal components obtained from PCA, we
can perform dimensionality reduction and reconstruction.
Consider a test data vector y ∈ R. The reduced
representation y ∈ R is obtained using the mapping
function  : R → R, and the reconstructed vector
yˆ∈Risc o:mRpu→tedRusainsgfotlhloewrse:construction function
yˆ = ((y))</p>
        <p>The reconstruction error y, a measure of fidelity of
reconstruction, is defined as the squared Euclidean distance
between the original and reconstructed vectors:

y = ‖y − yˆ‖22 = ∑︁( − ˆ)2
=1
This error metric helps identify significant deviations from
normal patterns, which are potential indicators of
anomalies.</p>
        <p>Additionally, the reconstruction error for each feature 
is calculated as:</p>
        <p>= | − ˆ|
This feature-specific error is employed to identify which
specific features are exhibiting anomalies.</p>
      </sec>
      <sec id="sec-2-3">
        <title>3.3. SHAP Values of Reconstruction Error</title>
        <p>Typically, the SHAP value () for each feature  is
calculated using all features of the instance  as explanatory
variables and the prediction ˆ as the objective variable as
follows:</p>
        <p>() = ℎ_(; ˆ, )</p>
        <p>This formulation allows for measuring the impact of
feature  on the prediction ˆ, providing a concrete metric for
understanding the significance of each feature in the model.</p>
        <p>Similarly, the SHAP value of reconstruction error  () is
calculated using all features of the instance  as explanatory
variables and the reconstruction error  as the objective
variable using the following function:</p>
        <p>() = ℎ_(; , )</p>
        <p>This formulation measures the impact of feature  on
the reconstruction error , providing a concrete metric
for evaluating the significance of each feature in anomaly
detection.</p>
      </sec>
      <sec id="sec-2-4">
        <title>3.4. SHAP Values of Reconstruction Error</title>
        <p>for Multidimensional Obejective</p>
      </sec>
      <sec id="sec-2-5">
        <title>Variables</title>
        <p>
          The SHAP value of Reconstructtion Error  () for feature ,
when the objective variable is represented in one dimension,
is calculated using the following equation [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]:
 () =
        </p>
        <p>∑︁
⊆{ 1,...,}∖
( − | | − 1)!||! [ (∪) −  ()]
!
(1)
(2)
(3)
(4)
(5)
(6)</p>
        <p>In this equation,  (∪) denotes the model’s predicted
value when the feature set  includes feature , and  ( )
represents the predicted value when the set  is used
without feature . || denotes the number of elements in the
feature subset , and  is the total number of features.</p>
        <p>Subsequently, the SHAP Values of Reconstruction Error
 ()() for feature  impacting the -th dimension of the
objective variable is calculated as the average diference
between the model predictions with and without feature
, across all combinations of features, thus extending
equation 6 into the multidimensional context of SHAP Values of
Reconstruction Error as follows:
 ()() =
1 ∑︁ ⎡ ∑︁</p>
        <p>⎣
 =1 ⊆{ 1,...,}∖
[ ()(∪) −  ()( )]]︁
( − | | − 1)!||!
!
(7)</p>
        <p>This formulation allows for measuring the impact of
feature  across diferent combinations of features on each
dimension of the recostruction error. By doing so, it
provides a concrete metric for elucidating the significance of
feature  in anomaly detection, ofering detailed insights
into the causes of anomalies in specific dimensions.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Preliminaries</title>
      <sec id="sec-3-1">
        <title>4.1. Definition: Spatial-Temporal</title>
      </sec>
      <sec id="sec-3-2">
        <title>Population Data</title>
        <p>
          This study utilizes Mobile Spatial Statistics (MSS) [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ],
representing population counts recorded across a
twodimensional geographic grid. Each record, denoted as
(, , ,), indicates the population count , at grid
 and timestamp .
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>4.2. Problem Statement</title>
        <p>The goal of this study is to assess the accuracy of anomaly
detection in spatial-temporal population data. We compare
two methodologies: a traditional approach using
reconstruction errors, and a novel approach using SHAP Values
of Reconstruction Errors.</p>
        <sec id="sec-3-3-1">
          <title>4.2.1. Anomaly Insertion Methodology</title>
          <p>During the test phase, artificial anomalies are introduced
by altering population figures within selected grids. For
each timestamp , a grid  is chosen randomly, and ,
is modified to the maximum or minimum value seen during
the training period, defined as:
, =
{︃max(,′ : ′ ∈ train), if max anomaly
min(,′ : ′ ∈ train),
if min anomaly</p>
        </sec>
        <sec id="sec-3-3-2">
          <title>4.2.2. Evaluation Methodology</title>
          <p>The eficacy of each detection method is quantified using
the Hits@ metric, which determines if the true anomalous
grid is among the top  ranks based on anomaly scores. The
scores are calculated using the following equations:
 = | − ˆ| (as defined in Equation 3)
(8)
 ()() =
1 ∑︁ ⎡ ∑︁</p>
          <p>⎣
 =1 ⊆{ 1,...,}∖
[ ()(∪) −  ()( )]]︁
( − | | − 1)!||!</p>
          <p>!
(as defined in Equation 7)</p>
          <p>Rankings for each grid are obtained by comparing these
scores against all others in the dataset.</p>
          <p>Hits@k Calculations For both methods, Hits@k is
deifned and calculated separately for each method to assess
the eficacy in identifying the true anomalies within the top
 ranks of predicted anomalies. The total number of test
instances, denoted as  , is used to normalize the calculations,
ensuring that the results are proportional to the size of the
test dataset. The calculations are as follows:
where 1(· ) is the indicator function, and  represents the
total number of test instances. These metrics facilitate a
direct comparison of the methods’ efectiveness in accurately
detecting anomalies.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Experiments</title>
      <p>
        This study utilizes Mobile Spatial Statistics data generated
from communication records between NTT DOCOMO’s
base stations and mobile devices. This data is divided into
mesh units across Japan in accordance with the Regional
Mesh standards provided by the Ministry of Internal
Affairs and Communications Statistics Bureau[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Population
counts for each grid are estimated at 10-minute intervals,
considering factors such as number of devices accessing
each base station, market share rates, residential areas, age,
and gender. To ensure privacy, the data is prepared in
accordance with guidelines published by NTT DOCOMO[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
The experimental area, as shown in figure 1 , comprises 100
grids of 500 square meters each, centered around Shibuya
Station. The population data is treated as 100-dimensional
feature vectors and standardized for each dimension.
      </p>
      <sec id="sec-4-1">
        <title>5.2. Training Phase</title>
        <p>The training data consists of population records with a
10minute resolution from October 17 and October 24, 2022,
totaling 288 instances (6× 24× 2), were prepared. A PCA
model was trained with these data, setting the
dimensionality reduction to retain 90% of the variance.</p>
      </sec>
      <sec id="sec-4-2">
        <title>5.3. Testing Phase</title>
        <p>The test data consists of 144 population records (6× 24) from
October 31, 2022, matching the same month and day of the
week as the training data. Anomalies were inserted using
the method described in Section 4.2.1. For each instance, one
grid was randomly selected, and its population count was
replaced with either the maximum or minimum population
observed for that grid. A total of 288 tests were conducted
to determine if the grid with the altered population could
be accurately identified.</p>
      </sec>
      <sec id="sec-4-3">
        <title>5.4. Experimental Results</title>
        <p>This section presents the results of anomaly detection
experiments conducted using both the traditional reconstruction
error method and the proposed SHAP value method. The
performance of each method is illustrated through selected
examples at various timestamps, as detailed in Table 1.</p>
        <p>The analysis shows varying levels of detection accuracy
for each method, with lower ranking values indicating
higher precision in anomaly detection. Specifically, at 19:10
on October 31, 2022, both methods accurately detected the
anomaly in grid 5339-3588-4, achieving the lowest possible
rank of 1. This instance demonstrates the efectiveness of
both approaches in scenarios where there is a substantial
change in population, from 1.378 to -1.257.</p>
        <p>Conversely, at 10:50 on the same day, the anomaly in grid
5339-3574-1 was detected with lower accuracy, resulting
in ranks of 9 and 8 for the reconstruction error and SHAP
methods, respectively. This indicates a reduced efectiveness
of both methods in detecting anomalies associated with
smaller changes in population, from 1.429 to 2.187.</p>
        <p>Moreover, at 9:10, the SHAP method outperformed the
reconstruction error method by more accurately identifying
the anomaly in grid 5339-3584-1, with a rank of 2 compared
to 6. This demonstrates the SHAP method’s enhanced ability
to detect subtle yet significant changes in population, from
1.536 to 1.682.</p>
        <p>A comprehensive evaluation using the Hits@k metric,
which assesses performance under scenarios of maximum</p>
        <p>MAX
 = 1
0.382
0.417
and minimum population changes, is summarized in Table
2. Hits@k values range from 0 to 1, with higher values
indicating more efective anomaly detection.</p>
        <p>For maximum population changes, the SHAP method
demonstrates superior performance with Hits@k scores of
0.417 at  = 1 and 0.472 at  = 3, exceeding the scores of
the reconstruction error method, which are 0.382 at  = 1
and 0.458 at  = 3. Similarly, in scenarios of minimum
population changes, the SHAP method achieves better scores
of 0.375 at  = 1 and 0.438 at  = 3, outperforming the
reconstruction error method’s scores of 0.340 at  = 1 and
0.410 at  = 3. These findings confirm the efectiveness
of the SHAP method in consistently identifying anomalies
under varied conditions, highlighting its superiority over
the traditional method.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Conclusion</title>
      <p>This paper evaluated the performance of established
reconstruction error techniques and the SHAP value method for
anomaly detection in spatio-temporal population datasets.
The study highlighted the SHAP method’s enhanced
capability for precise anomaly identification, which is crucial
for high-accuracy applications such as urban planning and
emergency management. The experimental datasets were
synthetically modified to include anomalies, ofering a
controlled setting to examine and contrast the performance of
these methods. Future research aims to extend the
application of these techniques to real-world data, particularly
in scenarios impacted by events like accidents, disasters, or
significant public gatherings.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Ochiai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Terada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hanashima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Sano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Usuda</surname>
          </string-name>
          ,
          <article-title>Detection of non-designated shelters by extracting population concentrated areas after a disaster (industrial paper)</article-title>
          ,
          <source>in: Proceedings of the 30th International Conference on Advances in Geographic Information Systems</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Takeishi</surname>
          </string-name>
          ,
          <article-title>Shapley values of reconstruction errors of pca for explaining anomaly detection</article-title>
          ,
          <source>in: Proceedings of the International Conference on Data Mining Workshops</source>
          , Beijing, China,
          <year>2019</year>
          , pp.
          <fpage>793</fpage>
          -
          <lpage>798</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>A genetic programming model for real-time crash prediction on freeways</article-title>
          ,
          <source>IEEE Transactions on Intelligent Transportation Systems</source>
          <volume>14</volume>
          (
          <year>2013</year>
          )
          <fpage>574</fpage>
          -
          <lpage>586</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Adam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Rivlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Shimshoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Reinitz</surname>
          </string-name>
          ,
          <article-title>Robust real-time unusual event detection using multiple fixedlocation monitors</article-title>
          ,
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          <volume>30</volume>
          (
          <year>2008</year>
          )
          <fpage>555</fpage>
          -
          <lpage>560</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>X.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Kenneth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Spence</surname>
          </string-name>
          ,
          <article-title>Exploring extreme events on social media: A comparison of user reposting/retweeting behaviors on twitter and weibo</article-title>
          ,
          <source>Computers in Human Behavior</source>
          <volume>65</volume>
          (
          <year>2016</year>
          )
          <fpage>576</fpage>
          -
          <lpage>581</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Detecting collective anomalies from multiple spatio-temporal datasets across different domains</article-title>
          ,
          <source>in: Proceedings of the 23rd SIGSPATIAL international conference on advances in geographic information systems</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wilkie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Shahabi</surname>
          </string-name>
          ,
          <article-title>Crowd sensing of trafic anomalies based on human mobility and social media</article-title>
          ,
          <source>in: Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>344</fpage>
          -
          <lpage>353</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Yabe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Tsubouchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sudo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sekimoto</surname>
          </string-name>
          ,
          <article-title>A framework for evacuation hotspot detection after large scale disasters using location data from smartphones: case study of kumamoto earthquake</article-title>
          ,
          <source>in: Proceedings of the 24th SIGSPATIAL International Conference on Advances in Geographic Information Systems</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Lundberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-I.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>A unified approach to interpreting model predictions</article-title>
          ,
          <source>in: Proceedings of the 31st International Conference on Neural Information Processing Systems</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>4768</fpage>
          -
          <lpage>4777</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Terada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Nagata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kobayashi</surname>
          </string-name>
          ,
          <article-title>Population estimation technology for mobile spatial statistics</article-title>
          ,
          <source>NTT DOCOMO Technical Journal</source>
          <volume>14</volume>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] Statistics Bureau of Japan, Area mesh statistics, https: //www.stat.go.jp/data/mesh/m_tuite.html,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>NTT</surname>
            <given-names>DOCOMO</given-names>
          </string-name>
          , Mobile spatial statistics guideline, https://www.docomo.ne.jp/english/binary/ pdf/service/world/inroaming/inroaming_service/ Mobile_Kukan_Toukei_Guidelines.pdf ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>