{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:57:12Z","timestamp":1743091032132,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030042110"},{"type":"electronic","value":"9783030042127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04212-7_48","type":"book-chapter","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T12:01:33Z","timestamp":1542369693000},"page":"545-554","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Actor Model Anomaly Detection Using Kernel Principal Component Analysis"],"prefix":"10.1007","author":[{"given":"Chunze","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiwei","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,17]]},"reference":[{"issue":"5","key":"48_CR1","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/s11390-006-0665-9","volume":"21","author":"GL Chen","year":"2006","unstructured":"Chen, G.L., Zhong, G.: Study on parallel computing. J. Comput. Sci. Technol. 21(5), 665\u2013673 (2006)","journal-title":"J. Comput. Sci. Technol."},{"issue":"10","key":"48_CR2","first-page":"160","volume":"25","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y.: On conversion mechanism of asynchronous communication message based on time decoupling in distributed object-oriented middleware. Comput. Appl. Softw. 25(10), 160\u2013162 (2008)","journal-title":"Comput. Appl. Softw."},{"key":"48_CR3","unstructured":"Hewitt, C., Bishop, P., Steiger, R.: A universal modular ACTOR formalism for artificial intelligence. In: International Joint Conference on Artificial Intelligence, pp. 235\u2013245 (1973)"},{"issue":"1","key":"48_CR4","first-page":"12","volume":"39","author":"XW Zhang","year":"2018","unstructured":"Zhang, X.W., Jia, X.Y., Chang, L., Liu, Q.C., Hu, X.H.: Parallel dynamic symbolic execution method based on actor model. J. Chin. Comput. Syst. 39(1), 12\u201316 (2018)","journal-title":"J. Chin. Comput. Syst."},{"issue":"34","key":"48_CR5","first-page":"161","volume":"26","author":"ZB Wang","year":"2010","unstructured":"Wang, Z.B., Li, C.Y.: A survey of the technique for software fault diagnosis. Microcomput. Inf. 26(34), 161\u2013163 (2010)","journal-title":"Microcomput. Inf."},{"key":"48_CR6","unstructured":"Sun, T.: Data stream outlier detection study based on time series analysis. University of Electronic Science and Technology of China, Xi\u2019an (2016)"},{"issue":"C","key":"48_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58(C), 121\u2013134 (2016)","journal-title":"Pattern Recogn."},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"Chen, F., Liu, Z., Sun, M.T.: Anomaly detection by using random projection forest. In: IEEE International Conference on Image Processing, pp. 1210\u20131214 (2015)","DOI":"10.1109\/ICIP.2015.7350992"},{"issue":"3","key":"48_CR9","first-page":"21","volume":"18","author":"A Lahrache","year":"2017","unstructured":"Lahrache, A., Cocconcelli, M., Rubini, R.: Anomaly detection in a cutting tool by K-means clustering and support vector machines. Pol. Towarz. Diagn. Tech. 18(3), 21\u201329 (2017)","journal-title":"Pol. Towarz. Diagn. Tech."},{"issue":"s1","key":"48_CR10","first-page":"1509","volume":"51","author":"R Yang","year":"2011","unstructured":"Yang, R., Jin, D.H., Gong, Y.Z., Ma, Y.: Static analysis method for detecting null pointer deference in Java. J. Tsinghua Univ. (Sci. Technol.) 51(s1), 1509\u20131514 (2011)","journal-title":"J. Tsinghua Univ. (Sci. Technol.)"},{"issue":"12","key":"48_CR11","first-page":"59","volume":"33","author":"DH Song","year":"2013","unstructured":"Song, D.H., Chen, E.H.: A call-chain-based static data race detection algorithm for java program. Ship Electron. Eng. 33(12), 59\u201363 (2013)","journal-title":"Ship Electron. Eng."},{"issue":"06","key":"48_CR12","first-page":"97","volume":"34","author":"D Wang","year":"2013","unstructured":"Wang, D., Yang, M., Zhou, X.: An object-centric concurrency bug detection framework for Java. J. Chin. Comput. Syst. 34(06), 97\u2013102 (2013)","journal-title":"J. Chin. Comput. Syst."},{"issue":"8","key":"48_CR13","first-page":"978","volume":"8","author":"Q Yu","year":"2014","unstructured":"Yu, Q., Jiang, S.J., Wang, X.Y., Ju, X.L., Dong, Q.J.: Detection and measurement method of memory leaking objects. J. Front. Comput. Sci. Technol. 8(8), 978\u2013988 (2014)","journal-title":"J. Front. Comput. Sci. Technol."},{"issue":"02","key":"48_CR14","first-page":"63","volume":"20","author":"X Ma","year":"2011","unstructured":"Ma, X., Li, Q.S., Chen, P.G.: Basic information needed in reversing-engineer by Aspect. Comput. Syst. Appl. 20(02), 63\u201367 (2011)","journal-title":"Comput. Syst. Appl."},{"issue":"3","key":"48_CR15","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1111\/1467-9868.00196","volume":"61","author":"ME Tipping","year":"2010","unstructured":"Tipping, M.E., Bishop, C.M.: Probabilistic principal component analysis. J. R. Stat. Soc. 61(3), 611\u2013622 (2010)","journal-title":"J. R. Stat. Soc."},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Sheriff, M.Z., Karim, M.N., Nounou, M.N., Nounou, H., Mansouri, M.: Fault detection of nonlinear systems using an improved KPCA method. In: International Conference on Control, pp. 0036\u20130041 (2017)","DOI":"10.1109\/CoDIT.2017.8102563"},{"issue":"4","key":"48_CR17","first-page":"822","volume":"19","author":"Q Li","year":"2011","unstructured":"Li, Q., Zhou, X.S.: Multivariate time series anomaly detection method based on KPCA. Comput. Measur. Control 19(4), 822\u2013825 (2011)","journal-title":"Comput. Measur. Control"},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"Fezai, R., Jaffel, I., Taouali, O., Harkat, M.F., Bouguil, N.: Online process monitoring based on Kernel method. In: International Conference on Control, pp. 236\u2013241 (2017)","DOI":"10.1109\/CADIAG.2017.8075663"},{"issue":"2","key":"48_CR19","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"T Dave","year":"2008","unstructured":"Dave, T.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"48_CR20","doi-asserted-by":"crossref","unstructured":"Farias, F.N.N., Salvatti, J.J., Cerqueira, E.C., Abelem, A.J.G.: A proposal management of the legacy network environment using OpenFlow control plane. In: Network Operations and Management Symposium, vol. 104, no. 5, pp. 1143\u20131150 (2012)","DOI":"10.1109\/NOMS.2012.6212041"},{"issue":"6","key":"48_CR21","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1037\/h0071325","volume":"24","author":"H Hotelling","year":"1933","unstructured":"Hotelling, H.: Analysis of a complex of statistical variables into principal components. J. Educ. Psychol. 24(6), 417\u2013520 (1933)","journal-title":"J. Educ. Psychol."},{"key":"48_CR22","unstructured":"Zhai, R.: Virtual machine exception detection based on nearest neighbor algorithm. Netw. Secur. Technol. Appl. (6), 55-56 (2016)"},{"key":"48_CR23","unstructured":"Meng, H.D., Ren, J.P.: Clustering algorithm based on cloud computing platform. Comput. Eng. Des. 2990\u20132994 (2015)"},{"key":"48_CR24","doi-asserted-by":"crossref","unstructured":"Breunig, M.M.: LOF: identifying density-based local outliers. In: ACM Sigmod International Conference on Management of Data, vol. 29, no. 2, pp. 93\u2013104 (2000)","DOI":"10.1145\/335191.335388"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04212-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:11:32Z","timestamp":1710263492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-04212-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030042110","9783030042127"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04212-7_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Siem Reap","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambodia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conference.cs.cityu.edu.hk\/iconip\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"575","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"401","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}