{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:11Z","timestamp":1773511031972,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030615338","type":"print"},{"value":"9783030615345","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61534-5_17","type":"book-chapter","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T08:04:34Z","timestamp":1603181074000},"page":"188-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["n-ary Isolation Forest: An Experimental Comparative Analysis"],"prefix":"10.1007","author":[{"given":"Pawe\u0142","family":"Karczmarek","sequence":"first","affiliation":[]},{"given":"Adam","family":"Kiersztyn","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Pedrycz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-45681-3_2","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"F Angiulli","year":"2002","unstructured":"Angiulli, F., Pizzuti, C.: Fast outlier detection in high dimensional spaces. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) PKDD 2002. LNCS, vol. 2431, pp. 15\u201327. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45681-3_2"},{"key":"17_CR2","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. \narXiv:1901.03407"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"de la Hoz, E., de la Hoz, E., Ortiz, A., Ortega, J., Mart\u00ednez-\u00c1lvarez, A.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps. Knowl.-Based Syst. 71, 322\u2013338 (2014)","DOI":"10.1016\/j.knosys.2014.08.013"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/j.ins.2019.07.100","volume":"505","author":"P D\u2019Urso","year":"2019","unstructured":"D\u2019Urso, P., Massari, R.: Fuzzy clustering of mixed data. Inf. Sci. 505, 513\u2013534 (2019)","journal-title":"Inf. Sci."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linearone-class SVM with deep learning. Pattern Recogn. 58, 121\u2013134 (2016)","journal-title":"Pattern Recogn."},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0022-0000(82)90004-6","volume":"25","author":"P Flajolet","year":"1982","unstructured":"Flajolet, P., Odlyzko, A.: The average height of binary trees and other simple trees. J. Comput. Syst. Sci. 25(2), 171\u2013213 (1982)","journal-title":"J. Comput. Syst. Sci."},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.ijinfomgt.2018.08.006","volume":"45","author":"RAA Habeeb","year":"2019","unstructured":"Habeeb, R.A.A., Nasaruddin, F., Gani, A., Hashem, I.A.T., Ahmed, E., Imran, M.: Real-time big data processing for anomaly detection: a survey. Int. J. Inf. Manag. 45, 289\u2013307 (2019)","journal-title":"Int. J. Inf. Manag."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Izakian, H., Pedrycz, W.: Anomaly detection in time series data using a fuzzy c-means clustering. In: 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA\/NAFIPS), Edmonton, AB, pp. 1513\u20131518 (2013)","DOI":"10.1109\/IFSA-NAFIPS.2013.6608627"},{"issue":"5","key":"17_CR9","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TFUZZ.2012.2233479","volume":"21","author":"H Izakian","year":"2013","unstructured":"Izakian, H., Pedrycz, W., Jamal, I.: Clustering spatiotemporal data: an augmented fuzzy c-means. IEEE Trans. Fuzzy Syst. 21(5), 855\u2013868 (2013)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"6","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/TFUZZ.2014.2302456","volume":"22","author":"H Izakian","year":"2014","unstructured":"Izakian, H., Pedrycz, W.: Anomaly detection and characterization in spatial time series data: a cluster-centric approach. IEEE Trans. Fuzzy Syst. 22(6), 1612\u20131624 (2014)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Karczmarek, P., Kiersztyn, A., Pedrycz, W., Al, E.: K-means-based isolation forest. Knowl.-Based Syst. 195, 105659 (2020)","DOI":"10.1016\/j.knosys.2020.105659"},{"issue":"3\u20134","key":"17_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"EB Knorr","year":"2000","unstructured":"Knorr, E.B., Ng, R.T., Tucakov, V., et al.: Distance-based outliers: algorithms and applications. VLDB Int. J. Very Large Data Bases 8(3\u20134), 237\u2013253 (2000)","journal-title":"VLDB Int. J. Very Large Data Bases"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422 (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data (TKDD) 6(1) (2012). article no. 3","DOI":"10.1145\/2133360.2133363"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Liu, J., Tian, J., Cai, Z., Zhou, Y., Luo, R., Wang, R.: A hybrid semi-supervised approach for financial fraud detection. In: 2017 International Conference on Machine Learning and Cybernetics (ICMLC), Ningbo, pp. 217\u2013222 (2017)","DOI":"10.1109\/ICMLC.2017.8107767"},{"key":"17_CR16","unstructured":"Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, pp. 89\u201394 (2015)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 427\u2013438 (2000)","DOI":"10.1145\/335191.335437"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u0308ock, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: IPMI 2017: Information Processing in Medical Imaging, pp. 146\u2013157 (2017)","DOI":"10.1007\/978-3-319-59050-9_12"},{"issue":"7","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, C., Paffenroth, R.C.: Anomaly detection with robust deep autoencoders. In: KDD 2017 Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, pp. 665\u2013674 (2017)","DOI":"10.1145\/3097983.3098052"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61534-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T08:28:41Z","timestamp":1603182521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61534-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030615338","9783030615345"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61534-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}