<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>SYSTEM</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Detection of Sensor Irregularities in Fitness Time Series</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rayappa David Amar Raj</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bota Dusenbi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kanasottu Anil Naik</string-name>
          <email>anilnaik205@nitw.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sreenu Sunkaraboina</string-name>
          <email>sreenu1792@vardhaman.org</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Anomaly Detection, Time Series Analysis, Wearable Sensors, Unsupervised Learning</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Institute of Technology</institution>
          ,
          <addr-line>Warangal, Telangana</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vardhaman College of Engineering</institution>
          ,
          <addr-line>Hyderabad</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>11</volume>
      <fpage>118</fpage>
      <lpage>126</lpage>
      <abstract>
        <p>Wearable fitness devices are widely used to monitor physiological signals such as heart rate (BPM) and speed during physical activity. However, these signals often sufer from noise, technical inaccuracies, and context-dependent variability. In this study, we investigate unsupervised anomaly detection methods to identify abnormal segments in real-world data collected from runners using wearable sensors. The dataset includes over 180,000 measurements from 43 running sessions, with speed and BPM values aligned and preprocessed to build a multivariate time series. We compare four approaches representative of diferent anomaly detection paradigms: distance-based (k-Nearest Neighbors), classification-based (One-Class SVM), probabilistic (Kernel Density Estimation), and sequence-based deep learning (TadGAN). Classical methods operate on pointwise values and capture global anomalies with high precision, but they fail to detect contextual or collective anomalies. TadGAN, in contrast, is trained on overlapping sequences and demonstrates the ability to identify local patterns of abnormality across time. Our results highlight the complementarity of these methods and the importance of modeling temporal structure when anomalies are subtle or context-dependent. Although TadGAN fails to capture extreme point anomalies, its performance on sequence-level detection suggests promising directions for future research in health-aware fitness monitoring. All analyses were conducted without labels, under purely unsupervised conditions.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>Wearable fitness technologies have become a
cornerstone of modern personal health monitoring, ofering
non-invasive and continuous access to physiological and
kinematic data during exercise. Among the most
frequently collected variables are heart rate (BPM) and
locomotor speed, which are commonly used as indicators
of training intensity, cardiovascular load, and overall
physical condition. These metrics are especially critical
in endurance disciplines such as running, where
performance, safety, and adaptation must be balanced in real
time.</p>
      <p>
        However, despite their utility, such measurements are
inherently subject to various sources of uncertainty [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
These include instrumental inaccuracies (e.g., sensor
resolution, sampling delay), environmental noise (e.g., GPS
instability, skin reflectance), and inter-individual
variability (e.g., age, fitness level, recovery status). Consequently,
the raw data streams acquired from commercial devices
may contain errors, inconsistencies, or even misleading
information. From a data science perspective, such
irregularities can be interpreted as anomalies — values or
patterns that deviate from expected physiological
behavior.
      </p>
      <p>Detecting these anomalies is of dual importance. On</p>
      <sec id="sec-2-1">
        <title>These types are illustrated in Figure 1, adapted from the survey by Ruf et al. [ 3].</title>
      </sec>
      <sec id="sec-2-2">
        <title>The practical relevance of such analysis is evident in many use cases: performance tracking, adaptive training programs, fatigue detection, and sensor validation.</title>
        <p>Attribution 4.0 International (CC BY 4.0).
© 2025 Copyright for this paper by its authors. Use permitted under Creative Commons License Furthermore, since the data are unlabeled — no ground
truth exists for “normal” versus “anomalous” episodes
— only unsupervised learning techniques are applicable.</p>
        <p>These include density-based, distance-based,
probabilistic, classification-driven, and generative models.</p>
        <p>
          From a physiological standpoint, both BPM and speed
are computed indirectly. Heart rate is commonly
estimated through photoplethysmography (PPG) via optical
sensors on the wrist. This technique relies on green LED
light absorption by pulsating blood flow and is known
to be sensitive to placement, motion, and skin
characteristics [
          <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
          ]. Speed, on the other hand, is estimated
using GPS signals either via positional diferentiation or Figure 1: Illustration of anomaly types: point, contextual,
Doppler shift. The latter ofers greater precision, particu- and collective [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
larly at high velocities [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], but even then, studies report
a 3–8% error margin depending on device settings and
user motion [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. theoretical grounding, computational eficiency,
scalabil
        </p>
        <p>
          Additionally, anomalies may not only stem from the ity, and applicability to temporal or multivariate data.
devices but also from the athlete. For example, during In a broad review by Nassif et al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], which examines
recovery phases, illness, or unexpected fatigue, the phys- 290 research articles published between 2000 and 2020,
iological responses may diverge from usual patterns, pro- the authors classify methods into five main categories:
ducing authentic yet significant anomalies. Thus, dis- classification (e.g., SVM, Bayesian networks, decision
tinguishing between device-induced and body-induced trees, neural networks, kNN), clustering (e.g., k-means,
anomalies is itself a meaningful analytical question. hierarchical clustering), optimization-based approaches,
        </p>
        <p>
          To explore this problem, we test and compare a range ensemble techniques, and regression models. Often,
modof unsupervised techniques: ern systems leverage hybrid combinations of these
categories to enhance robustness.
• Three classical models on pointwise data: Ruf et al. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] emphasize the theoretical motivation for
k-Nearest Neighbors (kNN), One-Class SVM unsupervised anomaly detection, focusing on the
mod(OCSVM), and Kernel Density Estimation (KDE); eling of normality. This perspective leads to a division
• A density-based cluster model: DBSCAN; of techniques into three primary classes: probabilistic
• A probabilistic generative model: Gaussian Mix- models, classification-based models, and
reconstructionture Models (GMM); based models, with distance-based methods often treated
• A modern time-series deep learning model: separately.
        </p>
        <p>TadGAN, a GAN-based approach designed to re- Probabilistic models attempt to fit the probability
disconstruct temporal patterns. tribution of normal data and classify low-probability
regions as anomalous. Classic approaches use Mahalanobis</p>
        <p>
          Each model captures a diferent perspective on distance, Gaussian mixture models [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], kernel density
esanomaly structure, from spatial density and decision timation [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], and histogram estimators [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Generative
boundaries to statistical probability and generative recon- models such as Variational Autoencoders (VAEs) [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] and
struction. Furthermore, we compare their outputs under Generative Adversarial Networks (GANs) [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] represent
both static (pointwise) and sequential (time-series) repre- more recent extensions, though their accuracy often
desentations of the same dataset, to assess the importance teriorates in high-dimensional spaces unless adequately
of temporal information in the detection of anomalies in trained.
physiological data. Classification models, on the other hand, explicitly
attempt to separate normal from anomalous samples.
2. Related Works One-Class SVM (OC-SVM) [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], Support Vector Data
Description (SVDD) [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], and their neural extensions
Anomaly detection is a classical and widely explored such as Deep SVDD [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] are well-established approaches
domain, with roots extending back centuries in statis- in this family.
tical analysis and more recently enriched by machine Reconstruction-based models rely on the premise that
learning and deep learning approaches. As discussed in normal samples can be accurately reconstructed by a
Ruf et al. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] and Nassif et al. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], modern anomaly de- learned function, typically involving dimensionality
retection techniques can be grouped into several families: duction and encoding-decoding schemes. Common
techdistance-based, probabilistic, classification-based, and niques include PCA [18], autoencoders, and GAN-based
reconstruction-based models. These approaches vary in reconstruction [
          <xref ref-type="bibr" rid="ref18">19, 20, 21, 22, 23</xref>
          ]. Higher reconstruction
errors suggest higher likelihood of anomaly, under the as- In conclusion, anomaly detection in physiological and
sumption that anomalies are rare and underrepresented kinetic data remains a complex, interdisciplinary task.
in training data. The selected methods must balance sensitivity to real
        </p>
        <p>
          Distance-based methods, such as k-Nearest Neigh- anomalies with robustness to noise. Given the nature of
bors (kNN), Local Outlier Factor (LOF), and related al- our dataset—low-dimensional, sequential, and partially
gorithms, operate by measuring the relative distance or corrupted—we selected kNN, KDE, OC-SVM for
pointdensity deviation of samples with respect to their neigh- wise analysis, and TadGAN for sequential modeling. This
bors. Goldstein et al. [
          <xref ref-type="bibr" rid="ref19">24</xref>
          ] showed that nearest-neighbor hybrid approach aims to leverage both statistical
precimethods tend to outperform clustering-based methods sion and temporal coherence.
across diverse benchmark datasets. However, they
require high computational time and may not scale well to
large datasets. 3. Dataset
        </p>
        <p>
          In temporal anomaly detection, time-series models
become essential. Unlike tabular data, time-series re- Our dataset comprises 43 running sessions, for a total of
tains sequential information, and anomalies may occur 180,876 measurements, split into 137,515 training
samin patterns rather than isolated points. The concept of ples and 43,263 for testing. The data includes heart rate
contextual and collective anomalies, discussed in Chan- (beats per minute, BPM) and speed values, recorded
asyndola et al. [
          <xref ref-type="bibr" rid="ref20">25</xref>
          ] and Al-Qassou et al. [
          <xref ref-type="bibr" rid="ref21">26</xref>
          ], becomes central. chronously by diferent sensors and later aligned over
A collective anomaly corresponds to a subsequence that, a unified timestamp index. BPM files consist of three
while locally consistent, is globally deviant. columns: “value”, “data”, and “startTime”. Speed files
        </p>
        <p>
          GAN-based models like TadGAN [
          <xref ref-type="bibr" rid="ref22">27</xref>
          ] reconstruct time contain four columns: “data”, “startTime”, “delta_T”, and
series using adversarial training. TadGAN learns to map “value”. After excluding infinite values (replaced using
time windows to a latent representation, which is then large constants derived from the median) and applying
used for reconstruction. Discrepancies between real and linear interpolation to handle missing values, both
sigreconstructed sequences provide an anomaly score. This nals were resampled and aggregated.
method is particularly suitable for multivariate time se- Overall, the BPM dataset contains 36,857 valid samples,
ries, even with low dimensionality, such as our case of while the speed dataset contains 61,748. Because the two
two correlated variables: heart rate and speed. series have diferent lengths and inconsistent temporal
        </p>
        <p>It is important to note that for many applications, sampling (e.g., 99.2% of speed delta_T values are 2 or 3
ground-truth labels are missing, so unsupervised learn- seconds, but some anomalous values exist), a matching
ing becomes necessary. Many real-world datasets require step was required. To fuse the datasets, we took the BPM
domain expert labeling, which is expensive or infeasible timestamps as reference and aggregated the speed values
at scale. Therefore, unsupervised models dominate the over those intervals using a mean operation. This
reifeld, often evaluated on synthetic datasets or via indirect sulted in the loss of approximately 21% of BPM rows due
proxy metrics. to misalignment or missing speed data at corresponding</p>
        <p>Our specific application poses several data quality chal- timestamps. The final aligned dataset consisted of 29,147
lenges. Temporal gaps, disjoint session timestamps, and samples.
asynchronous recording of heart rate and speed introduce An exploratory data analysis was conducted on both
artifacts that could mislead anomaly detection models. signals. The BPM values appeared within plausible
physFor example, some training sessions show BPM values iological ranges (60–200 bpm), whereas speed values
while no speed is recorded, indicating diferent sensor exhibited substantial variability. Outliers were initially
systems. In other sessions, high BPM spikes do not corre- visualized using boxplots (Figure 4), but not removed
spond to any physical acceleration, but rather to recovery to preserve diversity and noise for anomaly detection.
states or sensor noise. Speed inconsistencies and their dependence on delta_T</p>
        <p>One example is the session on 10/02, where a runner re- were analyzed (Figure 3).
sumed activity after a one-month break. While the speed Principal Component Analysis (PCA) was employed to
returned to prior levels, BPM values were significantly inspect the structure of the dataset and observe potential
elevated. Although physiologically plausible, a model separability among patterns or noise (Figure 5). It also
not incorporating temporal and contextual information allowed us to monitor the efects of outlier cleaning, as
might flag this as an error. shown in Figure 8.</p>
        <p>Thus, several methods were examined prior to imple- Finally, to prepare the dataset for modeling using
mentation: - Statistical rules, such as the 3-sigma Gaus- GANs, we applied a sliding window approach with a
sian rule. - Exploratory data techniques, such as box window length of 100 and a step size of 5. This generated
plots and rank analysis. - Density-based clustering, e.g., overlapping multivariate sequences from the final dataset,
DBSCAN. - Ensemble frameworks like PyOD. each containing normalized BPM and speed. These
se</p>
      </sec>
      <sec id="sec-2-3">
        <title>An exploratory data analysis was conducted on both</title>
        <p>signals. The BPM values appeared within plausible
physiological ranges (60–200 bpm), whereas speed values
exhibited substantial variability. Outliers were initially
visualized using boxplots (Figure 4), but not removed
to preserve diversity and noise for anomaly detection.
Speed inconsistencies and their dependence on delta_T
were analyzed (Figure 3).</p>
        <p>Principal Component Analysis (PCA) was employed to
inspect the structure of the dataset and observe potential
separability among patterns or noise (Figure 5). It also
allowed us to monitor the efects of outlier cleaning, as
shown in Figure 8).
# runs
# points
# inf speed points
# inf bpm points
# NaN speed points
# NaN bpm points</p>
        <p>Train</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>5. Results and Discussion</title>
      <p>
        Since no ground-truth labels are available in the dataset,
the evaluation of the anomaly detection methods was
carried out through qualitative visual inspection of the
results. In Table 2, we provide a structured comparison
of anomaly scores and detection outputs from all tested
methods. Each method produces scores on diferent
numerical scales; therefore, a MinMaxScaler was applied to
normalize scores in the [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] interval, enabling a direct
comparison.
      </p>
      <p>In the first row of Table 2, we observe the distribution
of the normalized anomaly scores for each method, with
the red horizontal line indicating the 99.9th percentile.</p>
      <p>This threshold was then employed to classify outliers.</p>
      <p>The second row shows the test dataset over time, where
speed and BPM are plotted with marked anomalies based
on the threshold. The third row presents a scatter plot
of BPM vs speed, where colors reflect the anomaly score,
helping to distinguish point and group anomalies.
Finally, the fourth row illustrates one representative test
session in time-series format, comparing raw signals and
detected anomalies.</p>
      <p>K-Nearest Neighbors (KNN) and One-Class SVM
(OCSVM) showed good capability to highlight global
point anomalies but failed to capture more subtle
temporal patterns or contextual outliers. Their scores remained
mostly stable across time, and rapid local variations in
BPM or speed were not reflected in the outputs. As a Figure 13: Number of outliers according to a tolerance level.
result, the methods could only detect extreme values that
deviate globally from the norm.</p>
      <p>The Kernel Density Estimator (KDE), instead, demon- integration, it missed several subtle dips and transient
strated higher sensitivity to group anomalies and moder- events that would qualify as contextual anomalies.
ately abnormal sequences. It successfully identified both TadGAN, a generative model trained over temporal
global point outliers and sustained deviations in BPM windows, exhibited a distinct behavior. The anomaly
or speed. However, due to its lack of temporal context score was highly sensitive to the shape and structure of
the sequence, favoring low variation (plateau) segments.</p>
      <p>As a result, sudden changes or transitions received lower
scores, which contrasts with expectations. This
behavior likely stems from the reconstruction-based scoring
mechanism and the use of overlapping sliding windows.</p>
      <p>Post-processing of overlapping scores into a single
perpoint score may have diluted signal peaks. Further
investigation is needed to refine this post-processing, possibly
by reducing the sliding window step size or aggregating
scores using weighted schemes.</p>
      <p>In conclusion, point-wise methods (KNN, OCSVM,
KDE) are appropriate for detecting global anomalies and
extreme values. Temporal methods like TadGAN are
more suitable for discovering contextually anomalous
patterns, although they require more careful
calibration. The integration of hybrid methods or ensembles
could ofer a more balanced performance across diferent
anomaly types.</p>
    </sec>
    <sec id="sec-4">
      <title>6. Conclusion</title>
      <sec id="sec-4-1">
        <title>In this study, we analyzed runner data including heart</title>
        <p>rate (BPM) and speed, with the objective of
identifying anomalous patterns that could indicate sensor faults,
physiological irregularities, or performance deviations.
We evaluated four unsupervised methods: KNN, OCSVM,
KDE, and TadGAN. The first three operate on individual
datapoints, while TadGAN uses sliding temporal
windows.</p>
        <p>The results showed that point-wise methods excel at
detecting isolated outliers but are limited in capturing
sequential patterns. In contrast, TadGAN was more
sensitive to contextual anomalies and group deviations over
time but struggled with extreme values. Its limitations
are likely tied to the aggregation of reconstruction errors
across windows.</p>
        <p>Future work should investigate improvements in
GANbased models by tuning window size, overlap, and
scoring methods. Moreover, the integration of contextual
metadata or ensemble learning approaches may enhance
robustness. Overall, temporal models show promising
potential for enhancing anomaly detection in
physiological monitoring during exercise.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <sec id="sec-5-1">
        <title>During the preparation of this work, the authors used</title>
        <p>ChatGPT, Grammarly in order to: Grammar and spelling
check, Paraphrase and reword. After using this
tool/service, the authors reviewed and edited the content as
needed and take full responsibility for the publication’s
content.
KNN</p>
        <sec id="sec-5-1-1">
          <title>OCSVM KDE</title>
        </sec>
        <sec id="sec-5-1-2">
          <title>TadGAN</title>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zimatore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Serantoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Gallotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Guidetti</surname>
          </string-name>
          , G. Maulucci,
          <string-name>
            <surname>M. De Spirito</surname>
          </string-name>
          ,
          <article-title>Automatic detection of aerobic threshold through recurrence quantification analysis of heart rate time series</article-title>
          ,
          <source>International Journal of Environmental Research and Public Health</source>
          <volume>20</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/ ijerph20031998.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Gallotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bonavolontà</surname>
          </string-name>
          , G. Zimatore,
          <string-name>
            <given-names>S.</given-names>
            <surname>Iazzoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Guidetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Baldari</surname>
          </string-name>
          ,
          <article-title>Efects of open (racket) and closed (running) skill sports practice on children's attentional performance</article-title>
          ,
          <source>Open Sports Sciences Journal</source>
          <volume>13</volume>
          (
          <year>2020</year>
          )
          <fpage>105</fpage>
          -
          <lpage>113</lpage>
          . doi:
          <volume>10</volume>
          .2174/ 1875399X02013010105.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ruf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Kaufmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Vandermeulen</surname>
          </string-name>
          , G. Montavon,
          <string-name>
            <given-names>W.</given-names>
            <surname>Samek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kloft</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. G.</given-names>
            <surname>Dietterich</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-R. Müller</surname>
          </string-name>
          ,
          <article-title>A unifying review of deep and shallow anomaly detection</article-title>
          ,
          <source>Proceedings of the IEEE</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Montes</surname>
          </string-name>
          , Wearable Technology Devices:
          <article-title>Heart Rate and Step Count Analysis</article-title>
          ,
          <source>Ph.D. thesis</source>
          , University of Nevada, Las Vegas,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Navalta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Montes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. G.</given-names>
            <surname>Bodell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. W.</given-names>
            <surname>Salatto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Manning</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>DeBeliso, Concurrent heart rate validity of wearable technology devices during trail running</article-title>
          ,
          <source>Plos one 15</source>
          (
          <year>2020</year>
          )
          <article-title>e0238569</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Grenfell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Deakin</surname>
          </string-name>
          , Short note:
          <article-title>On the relativistic doppler efect for precise velocity determination using gps</article-title>
          ,
          <source>Journal of Geodesy</source>
          <volume>80</volume>
          (
          <year>2006</year>
          )
          <fpage>104</fpage>
          -
          <lpage>110</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Cardinale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Varley</surname>
          </string-name>
          ,
          <article-title>Wearable trainingmonitoring technology: applications, challenges, and opportunities</article-title>
          ,
          <source>International journal of sports physiology and performance 12</source>
          (
          <year>2017</year>
          )
          <fpage>S2</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Nassif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Talib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Nasir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Dakalbab</surname>
          </string-name>
          ,
          <article-title>Machine learning for anomaly detection: A systematic review</article-title>
          ,
          <source>IEEE Access</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Nassif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Talib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Nasir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Dakalbab</surname>
          </string-name>
          ,
          <article-title>Machine learning for anomaly detection: A systematic review</article-title>
          ,
          <source>IEEE Access</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Póczos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Connolly</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. VanderPlas</surname>
          </string-name>
          ,
          <article-title>Hierarchical probabilistic models for group anomaly detection</article-title>
          ,
          <source>in: Proceedings of the fourteenth international conference on artificial intelligence and statistics</source>
          , JMLR Workshop and
          <article-title>Confer- proved deep svdd model with data structure preserence</article-title>
          <source>Proceedings</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>789</fpage>
          -
          <lpage>797</lpage>
          . vation,
          <source>Pattern Recognition Letters</source>
          <volume>148</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. D.</given-names>
            <surname>Scott</surname>
          </string-name>
          , Robust kernel density estimation, [18]
          <string-name>
            <given-names>H.</given-names>
            <surname>Ringberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Soule</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rexford</surname>
          </string-name>
          , C. Diot,
          <source>SenThe Journal of Machine Learning Research</source>
          <volume>13</volume>
          (
          <year>2012</year>
          )
          <article-title>sitivity of pca for trafic anomaly detection</article-title>
          , in:
          <fpage>2529</fpage>
          -
          <lpage>2565</lpage>
          .
          <source>Proceedings of the 2007 ACM SIGMETRICS inter-</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Nachman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Shih</surname>
          </string-name>
          ,
          <article-title>Anomaly detection with national conference on Measurement and modeling density estimation</article-title>
          ,
          <source>Physical Review D</source>
          <volume>101</volume>
          (
          <year>2020</year>
          )
          <article-title>of computer systems</article-title>
          ,
          <year>2007</year>
          , pp.
          <fpage>109</fpage>
          -
          <lpage>120</lpage>
          .
          <fpage>075042</fpage>
          . [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Zenati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. S.</given-names>
            <surname>Foo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lecouat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Manek</surname>
          </string-name>
          ,
          <string-name>
            <surname>V. R.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>An</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <article-title>Variational autoencoder based Chandrasekhar, Eficient gan-based anomaly detecanomaly detection using reconstruction probability, tion</article-title>
          , arXiv preprint arXiv:
          <year>1802</year>
          .
          <volume>06222</volume>
          (
          <year>2018</year>
          ).
          <source>Special Lecture on IE 2</source>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          . [20]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>A fully automatic visual</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.</given-names>
            <surname>Schlegl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Seeböck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Waldstein</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Langs, attention estimation support system for a safer drivU. Schmidt-Erfurth, f-anogan: Fast unsupervised ing experience</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          ,
          <article-title>anomaly detection with generative adversarial net</article-title>
          - volume
          <volume>3695</volume>
          ,
          <year>2023</year>
          , p.
          <fpage>40</fpage>
          -
          <lpage>50</lpage>
          . works,
          <source>Medical image analysis 54</source>
          (
          <year>2019</year>
          )
          <fpage>30</fpage>
          -
          <lpage>44</lpage>
          . [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Goh</surname>
          </string-name>
          , S.
          <article-title>-</article-title>
          K. Ng, Mad-
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>I.</given-names>
            <surname>Steinwart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Hush</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Scovel</surname>
          </string-name>
          ,
          <article-title>A classification gan: Multivariate anomaly detection for time series framework for anomaly detection</article-title>
          .,
          <article-title>Journal of Ma- data with generative adversarial networks</article-title>
          ,
          <source>in: Interchine Learning Research</source>
          <volume>6</volume>
          (
          <year>2005</year>
          ).
          <source>national Conference on Artificial Neural Networks,</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Turkoz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Son</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Jeong</surname>
          </string-name>
          , E. A. El- Springer,
          <year>2019</year>
          , pp.
          <fpage>703</fpage>
          -
          <lpage>716</lpage>
          . sayed,
          <source>Generalized support vector data description</source>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Tibermacine, for anomaly detection</article-title>
          ,
          <source>Pattern</source>
          Recognition 100
          <string-name>
            <given-names>D.</given-names>
            <surname>Chebana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nahili</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Starczewscki</surname>
          </string-name>
          , C. Napoli, (
          <year>2020</year>
          )
          <fpage>107119</fpage>
          .
          <article-title>Analyzing eeg patterns in young adults exposed to</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <article-title>Anomaly detection using im- diferent acrophobia levels: a vr study</article-title>
          ,
          <source>Frontiers in Human Neuroscience</source>
          <volume>18</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3389/ fnhum.
          <year>2024</year>
          .
          <volume>1348154</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [23]
          <string-name>
            <surname>G. De Magistris</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Guercio</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Starna</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Russo</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Kryvinska</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>A real-time support with haptic feedback for safer driving using monocular camera</article-title>
          ,
          <source>in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artiifcial Intelligence and Lecture Notes in Bioinformatics)</source>
          , volume
          <volume>15450</volume>
          LNAI,
          <year>2025</year>
          , p.
          <fpage>161</fpage>
          -
          <lpage>174</lpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>031</fpage>
          - 80607- 0_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Goldstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Uchida</surname>
          </string-name>
          ,
          <article-title>A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data</article-title>
          ,
          <source>PloS one 11</source>
          (
          <year>2016</year>
          )
          <article-title>e0152173</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V.</given-names>
            <surname>Chandola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Banerjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>Anomaly detection: A survey, ACM computing surveys (CSUR) 41 (</article-title>
          <year>2009</year>
          )
          <fpage>1</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>R.</given-names>
            <surname>Al-amri</surname>
          </string-name>
          , R. K. Murugesan,
          <string-name>
            <given-names>M.</given-names>
            <surname>Man</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Abdulateef</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Al-Sharafi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Alkahtani</surname>
          </string-name>
          ,
          <article-title>A review of machine learning and deep learning techniques for anomaly detection in iot data</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <fpage>5320</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
            <surname>Geiger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Alnegheimish</surname>
          </string-name>
          , A. CuestaInfante, K. Veeramachaneni,
          <article-title>Tadgan: Time series anomaly detection using generative adversarial networks</article-title>
          ,
          <source>in: 2020 IEEE International Conference on Big Data (Big Data)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>