{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:07:35Z","timestamp":1757779655576},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030323875"},{"type":"electronic","value":"9783030323882"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32388-2_1","type":"book-chapter","created":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T10:04:40Z","timestamp":1572170680000},"page":"3-17","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["High-Dimensional Data Anomaly Detection Framework Based on Feature Extraction of Elastic Network"],"prefix":"10.1007","author":[{"given":"Yang","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jue","family":"Bo","sequence":"additional","affiliation":[]},{"given":"KeXin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"DM Hawkins","year":"1980","unstructured":"Hawkins, D.M.: Identification of Outliers, 1st edn, pp. 11\u201312. Springer, Berlin (1980). \n                    https:\/\/doi.org\/10.1007\/978-94-015-3994-4","edition":"1"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.chaos.2018.03.010","volume":"110","author":"L Li","year":"2018","unstructured":"Li, L., Hao, Z., Peng, H., et al.: Nearest neighbors based density peaks approach to intrusion detection. Chaos Solitons Fractals 110, 33\u201340 (2018)","journal-title":"Chaos Solitons Fractals"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-012-0243-6","volume":"16","author":"C Wang","year":"2018","unstructured":"Wang, C., Dong, H.: Credit card fraud forecasting model based on clustering analysis and integrated support vector machine. Cluster Comput. 16, 1\u20136 (2018)","journal-title":"Cluster Comput."},{"key":"1_CR4","unstructured":"Gao, X., Fang, Y.: Penalized weighted least squares for outlier detection and robust regression (2016)"},{"issue":"10","key":"1_CR5","doi-asserted-by":"publisher","first-page":"3706","DOI":"10.1016\/j.csda.2009.03.014","volume":"53","author":"T Chen","year":"2009","unstructured":"Chen, T., Martin, E., Montague, G.: Robust probabilistic PCA with missing data and contribution analysis for outlier detection. Comput. Stat. Data Anal. 53(10), 3706\u20133716 (2009)","journal-title":"Comput. Stat. Data Anal."},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-1-4614-6396-2_3","volume-title":"Outlier Analysis","author":"CC Aggarwal","year":"2013","unstructured":"Aggarwal, C.C.: Linear models for outlier detection. In: Aggarwal, C.C. (ed.) Outlier Analysis, pp. 75\u201399. Springer, New York (2013). \n                    https:\/\/doi.org\/10.1007\/978-1-4614-6396-2_3"},{"key":"1_CR7","first-page":"316","volume-title":"Advances in Intelligent Systems and Computing","author":"Paul Inuwa Dalatu","year":"2016","unstructured":"Dalatu, P.I., Fitrianto, A., Mustapha, A.: A comparative study of linear and nonlinear regression models for outlier detection (2016)"},{"issue":"12","key":"1_CR8","doi-asserted-by":"publisher","first-page":"2652","DOI":"10.1080\/00949655.2013.811669","volume":"84","author":"B P\u00e9rez","year":"2014","unstructured":"P\u00e9rez, B., Molina, I., Pe\u00f1a, D.: Outlier detection and robust estimation in linear regression models with fixed group effects. J. Stat. Comput. Simul. 84(12), 2652\u20132669 (2014)","journal-title":"J. Stat. Comput. Simul."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Xu, H., Mao, R., Liao, H., et al.: Closest neighbors excluded outlier detection. In: Online Analysis & Computing Science, pp. 105\u2013110. IEEE (2016)","DOI":"10.1109\/ICOACS.2016.7563058"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Liu, J., Wang, G.: Outlier detection based on local minima density. In: IEEE Information Technology, Networking, Electronic & Automation Control Conference, pp. 718\u2013723. IEEE (2016)","DOI":"10.1109\/ITNEC.2016.7560455"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Vwema, P., Yadava, R.D.S.: Fuzzy c-means clustering based outlier detection for SAW electronic nose. In: Convergence in Technology, pp. 513\u2013519. IEEE (2017)","DOI":"10.1109\/I2CT.2017.8226182"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.knosys.2015.05.014","volume":"86","author":"V Bol\u00f3n-Canedo","year":"2015","unstructured":"Bol\u00f3n-Canedo, V., S\u00e1nchez-Maro, N., Alonso-Betanzos, A.: Recent advances and emerging challenges of feature selection in the context of big data. Knowl.-Based Syst. 86, 33\u201345 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Du, L., Shen, Y.D.: Unsupervised feature selection with adaptive structure learning (2015)","DOI":"10.1145\/2783258.2783345"},{"key":"1_CR14","first-page":"16","volume":"11","author":"K Yu","year":"2015","unstructured":"Yu, K., Wu, X., Ding, W., et al.: Scalable and accurate online feature selection for big data. ACM Trans. Knowl. Discovery Data 11, 16 (2015)","journal-title":"ACM Trans. Knowl. Discovery Data"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, C., Wang, G., Zhou, Y., et al.: Feature selection for high dimensional imbalanced class data based on F-measure optimization. In: International Conference on Security. IEEE (2018)","DOI":"10.1109\/SPAC.2017.8304290"},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1103\/PhysRevLett.52.216","volume":"52","author":"S Feng","year":"1984","unstructured":"Feng, S., Sen, P.N.: Percolation on elastic networks: new exponent and threshold. Phys. Rev. Lett. 52(3), 216\u2013219 (1984)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1_CR17","first-page":"1556","volume":"6","author":"F Liu","year":"2012","unstructured":"Liu, F., Ting, K.M., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discovery Data 6(1), 1556\u20134681 (2012)","journal-title":"ACM Trans. Knowl. Discovery Data"},{"key":"1_CR18","unstructured":"Yang, Z., Zheng, Y., Gao, Y., et al.: Abnormal data detection for an e-business using object-oriented approach. In: Integration and Innovation Orient to E-Society, vol. 1 (2007)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Zimek, A., Gaudet, M., Campello, R.J.G.B., et al.: Subsampling for efficient and effective unsupervised outlier detection ensembles. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2013)","DOI":"10.1145\/2487575.2487676"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Machine Learning and Intelligent Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32388-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T10:04:53Z","timestamp":1572170693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32388-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030323875","9783030323882"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32388-2_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLICOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Intelligent Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mlicom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mlicom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}