{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:41Z","timestamp":1740099161671,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000172"},{"type":"electronic","value":"9783030000189"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00018-9_47","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T10:57:49Z","timestamp":1537873069000},"page":"539-550","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Power Data Cleaning Method Based on Isolation Forest and LSTM Neural Network"],"prefix":"10.1007","author":[{"given":"XingNan","family":"Li","sequence":"first","affiliation":[]},{"given":"Yi","family":"Cai","sequence":"additional","affiliation":[]},{"given":"WenHong","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Kai, M.T., Zhou, Z.H.: Isolation forest. In: Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2009)","DOI":"10.1109\/ICDM.2008.17"},{"key":"47_CR2","unstructured":"Wang, C., Xiao, Z.: A data cleaning model for electric power big data based on Spark framework. Electr. Meas. Instrum., 33\u201338 (2017)"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Guo, A., Zhang, N., Sun, T.: Research on exception data cleaning method based on clustering in Hadoop platform. In: International Symposium on Computational Intelligence and Design, pp. 316\u2013320 (2017)","DOI":"10.1109\/ISCID.2017.191"},{"key":"47_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-319-46672-9_19","volume-title":"Neural Information Processing","author":"R Pruengkarn","year":"2016","unstructured":"Pruengkarn, R., Wong, K.W., Fung, C.C.: Data cleaning using complementary fuzzy support vector machine technique. In: Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M., Liu, D. (eds.) ICONIP 2016, Part II. LNCS, vol. 9948, pp. 160\u2013167. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46672-9_19"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Chuck, C., Laskey, M., Krishnan, S., et al.: Statistical data cleaning for deep learning of automation tasks from demonstrations. In: IEEE Conference on Automation Science and Engineering, pp. 1142\u20131149. IEEE (2017)","DOI":"10.1109\/COASE.2017.8256258"},{"issue":"3","key":"47_CR6","first-page":"45","volume":"40","author":"H Qin","year":"2004","unstructured":"Qin, H.: A data cleaning method based on genetic algorithm and neural network. Comput. Eng. Appl. 40(3), 45\u201346 (2004)","journal-title":"Comput. Eng. Appl."},{"issue":"6","key":"47_CR7","first-page":"9","volume":"3","author":"R Dara","year":"2014","unstructured":"Dara, R., Satyanarayana, D.C., Govardhan, D.A.: Front end data cleaning and transformation in standard printed form using neural models. Int. J. Comput. Sci. Appl. 3(6), 9\u201319 (2014)","journal-title":"Int. J. Comput. Sci. Appl."},{"issue":"1","key":"47_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Kai, M.T., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data 6(1), 1\u201339 (2012)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"8","key":"47_CR9","first-page":"25","volume":"20","author":"R Xu","year":"2017","unstructured":"Xu, R., Fang, L., Zhao, D., et al.: Electricity consumption prediction based on LSTM neural networks. Power Syst. Big Data 20(8), 25\u201329 (2017)","journal-title":"Power Syst. Big Data"},{"issue":"8","key":"47_CR10","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"Sepp Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. In: Supervised Sequence Labelling with Recurrent Neural Networks, pp. 1735\u20131780. Springer, Heidelberg (1997)","journal-title":"Neural Computation"},{"issue":"10","key":"47_CR11","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1162\/089976600300015015","volume":"12","author":"FA Gers","year":"2000","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to forget: continual prediction with LSTM. Neural Comput. 12(10), 2451\u20132471 (2000)","journal-title":"Neural Comput."},{"key":"47_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2","volume-title":"Supervised Sequence Labelling with Recurrent Neural Networks","author":"A Graves","year":"2012","unstructured":"Graves, A.: Supervised Sequence Labelling with Recurrent Neural Networks. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-24797-2"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Y.: Long short-term memory with attention and multi-task learning for distant speech recognition. In: NCMMSC 2017, p. 5 (2017)","DOI":"10.21437\/Interspeech.2017-805"},{"issue":"s1","key":"47_CR14","first-page":"92","volume":"44","author":"F Liu","year":"2017","unstructured":"Liu, F., Hao, W., Chen, G., et al.: Attention of bilinear function based Bi-LSTM model for machine reading comprehension. Comput. Sci. 44(s1), 92\u201396 (2017)","journal-title":"Comput. Sci."},{"issue":"11","key":"47_CR15","first-page":"4","volume":"20","author":"C Lu","year":"2017","unstructured":"Lu, C.: Research on the attention mechanism-based bidirectional LSTM model for the sentiment classification of Chinese product reviews. Softw. Eng. 20(11), 4\u20136 (2017)","journal-title":"Softw. Eng."},{"issue":"1","key":"47_CR16","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1186\/1471-2164-7-142","volume":"7","author":"RA Berg van den","year":"2006","unstructured":"van den Berg, R.A., Hoefsloot, H.C., Westerhuis, J.A., et al.: Centering, scaling, and transformations: improving the biological information content of metabolomics data. BMC Genom. 7(1), 142 (2006)","journal-title":"BMC Genom."},{"key":"47_CR17","first-page":"33","volume-title":"Machine Learning","author":"ZH Zhou","year":"2016","unstructured":"Zhou, Z.H.: Machine Learning, pp. 33\u201335. Tsinghua University Press, Beijing (2016)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00018-9_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:57:22Z","timestamp":1571936242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00018-9_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000172","9783030000189"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00018-9_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}