{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:22:40Z","timestamp":1755926560255,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030757618"},{"type":"electronic","value":"9783030757625"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75762-5_5","type":"book-chapter","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T09:07:43Z","timestamp":1620464863000},"page":"53-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Learning Probabilistic Latent Structure for Outlier Detection from Multi-view Data"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ji","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yizheng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chenhao","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Rage Uday","family":"Kiran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,9]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","volume-title":"Computer Vision","author":"S Akcay","year":"2019","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: GANomaly: semi-supervised anomaly detection via adversarial training. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) ACCV 2018. LNCS, vol. 11363, pp. 622\u2013637. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39"},{"key":"5_CR2","unstructured":"Archambeau, C., et al.: Sparse probabilistic projections. In: NIPS, pp. 73\u201380 (2009)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., et al.: Deep learning for anomaly detection: a survey. CoRR (2019)","DOI":"10.1145\/3394486.3406704"},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Chaudhuri, K., Kakade, S.M., Livescu, K., Sridharan, K.: Multi-view clustering via canonical correlation analysis. In: ICML, pp. 129\u2013136 (2009)","DOI":"10.1145\/1553374.1553391"},{"key":"5_CR6","unstructured":"Chen, M., Weinberger, K.Q., Chen, Y.: Automatic feature decomposition for single view co-training. In: ICML (2011)"},{"key":"5_CR7","unstructured":"Christoudias, M., et al.: Bayesian localized multiple kernel learning (2009)"},{"key":"5_CR8","unstructured":"Diethe, T., Hardoon, D.R., Shawe-Taylor, J.: Multiview fisher discriminant analysis. In: NeurIPS Workshop on Learning from Multiple Sources (2008)"},{"issue":"11","key":"5_CR9","first-page":"6844","volume":"52","author":"B Du","year":"2014","unstructured":"Du, B., Zhang, L.: A discriminative metric learning based anomaly detection method. TGRS 52(11), 6844\u20136857 (2014)","journal-title":"TGRS"},{"key":"5_CR10","unstructured":"Fyfe, C., Lai, P.L.: ICA using kernel canonical correlation analysis. In: Proceedings of International Workshop on Independent Component Analysis and Blind Signal Separation (2000)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Gao, J., et al.: A spectral framework for detecting inconsistency across multi-source object relationships. In: ICDM, pp. 1050\u20131055. IEEE (2011)","DOI":"10.1109\/ICDM.2011.16"},{"key":"5_CR12","series-title":"Springer Series in Statistics (Perspectives in Statistics)","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-1-4612-4380-9_14","volume-title":"Breakthroughs in Statistics","author":"H Hotelling","year":"1992","unstructured":"Hotelling, H.: Relations between two sets of variates. In: Kotz, S., Johnson, N.L. (eds.) Breakthroughs in Statistics. Springer Series in Statistics (Perspectives in Statistics), pp. 162\u2013190. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/978-1-4612-4380-9_14"},{"key":"5_CR13","unstructured":"Iwata, T., Yamada, M.: Multi-view anomaly detection via robust probabilistic latent variable models. In: NeurIPS, pp. 1136\u20131144 (2016)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Izakian, H., Pedrycz, W.: Anomaly detection in time series data using a fuzzy c-means clustering. In: IFSA\/NAFIPS, pp. 1513\u20131518. IEEE (2013)","DOI":"10.1109\/IFSA-NAFIPS.2013.6608627"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Ji, Y.X., et al.: Multi-view outlier detection in deep intact space. In: ICDM, pp. 1132\u20131137. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00136"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Li, K., Li, S., Ding, Z., Zhang, W., Fu, Y.: Latent discriminant subspace representations for multi-view outlier detection. In: AAAI (2018)","DOI":"10.1609\/aaai.v32i1.11826"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Li, S., Shao, M., Fu, Y.: Multi-view low-rank analysis for outlier detection. In: SDM, pp. 748\u2013756. SIAM (2015)","DOI":"10.1137\/1.9781611974010.84"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Liu, A.Y., Lam, D.N.: Using consensus clustering for multi-view anomaly detection. In: SPW, pp. 117\u2013124. IEEE (2012)","DOI":"10.1109\/SPW.2012.18"},{"issue":"7","key":"5_CR19","first-page":"1602","volume":"26","author":"B Liu","year":"2013","unstructured":"Liu, B., Xiao, Y., Philip, S.Y., Hao, Z., Cao, L.: An efficient approach for outlier detection with imperfect data labels. TKDE 26(7), 1602\u20131616 (2013)","journal-title":"TKDE"},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., et al.: Isolation-based anomaly detection. TKDD 6(1), 1\u201339 (2012)","journal-title":"TKDD"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Marcos Alvarez, A., Yamada, M., Kimura, A., Iwata, T.: Clustering-based anomaly detection in multi-view data. In: CIKM, pp. 1545\u20131548. ACM (2013)","DOI":"10.1145\/2505515.2507840"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Na, G.S., Kim, D., Yu, H.: DILOF: Effective and memory efficient local outlier detection in data streams. In: KDD, pp. 1993\u20132002 (2018)","DOI":"10.1145\/3219819.3220022"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Pang, G., Cao, L., Liu, H.: Learning representations of ultrahigh-dimensional data for random distance-based outlier detection. In: KDD, pp. 2041\u20132050 (2018)","DOI":"10.1145\/3219819.3220042"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Pei, Y., Zaiane, O.R., Gao, Y.: An efficient reference-based approach to outlier detection in large datasets. In: ICDM, pp. 478\u2013487. IEEE (2006)","DOI":"10.1109\/ICDM.2006.17"},{"key":"5_CR25","unstructured":"Quadrianto, N., Lampert, C.H.: Learning multi-view neighborhood preserving projections. In: ICML (2011)"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Senator, T.E., et al.: Detecting insider threats in a real corporate database of computer usage activity. In: KDD, pp. 1393\u20131401 (2013)","DOI":"10.1145\/2487575.2488213"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Sheng, X.R., Zhan, D.C., Lu, S., Jiang, Y.: Multi-view anomaly detection: neighborhood in locality matters. In: AAAI, vol. 33, pp. 4894\u20134901 (2019)","DOI":"10.1609\/aaai.v33i01.33014894"},{"key":"5_CR28","unstructured":"Shon, A., Grochow, K., Hertzmann, A., Rao, R.P.: Learning shared latent structure for image synthesis and robotic imitation. In: NeurIPS, pp. 1233\u20131240 (2006)"},{"issue":"2","key":"5_CR29","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2207243.2207252","volume":"13","author":"N Spirin","year":"2012","unstructured":"Spirin, N., Han, J.: Survey on web spam detection: principles and algorithms. ACM SIGKDD Explor. Newsl. 13(2), 50\u201364 (2012)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"5_CR30","unstructured":"Suo, X., et al.: Sparse canonical correlation analysis. CoRR (2017)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Tong, H., Lin, C.Y.: Non-negative residual matrix factorization with application to graph anomaly detection. In: SDM, pp. 143\u2013153. SIAM (2011)","DOI":"10.1137\/1.9781611972818.13"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Inductive multi-view semi-supervised anomaly detection via probabilistic modeling. In: ICBK, pp. 257\u2013264. IEEE (2019)","DOI":"10.1109\/ICBK.2019.00042"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Lan, C.: Towards a hierarchical Bayesian model of multi-view anomaly detection. In: IJCAI (2020)","DOI":"10.24963\/ijcai.2020\/335"},{"issue":"3","key":"5_CR34","first-page":"589","volume":"25","author":"S Wu","year":"2011","unstructured":"Wu, S., Wang, S.: Information-theoretic outlier detection for large-scale categorical data. TKDE 25(3), 589\u2013602 (2011)","journal-title":"TKDE"},{"issue":"6","key":"5_CR35","doi-asserted-by":"publisher","first-page":"1438","DOI":"10.1109\/TSMCB.2009.2039566","volume":"40","author":"T Xia","year":"2010","unstructured":"Xia, T., et al.: Multiview spectral embedding. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 40(6), 1438\u20131446 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"key":"5_CR36","unstructured":"Xu, C., Tao, D., Xu, C.: A survey on multi-view learning. CoRR (2013)"},{"key":"5_CR37","unstructured":"Zhao, H., Fu, Y.: Dual-regularized multi-view outlier detection. In: IJCAI (2015)"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Zimek, A., Gaudet, M., Campello, R.J., Sander, J.: Subsampling for efficient and effective unsupervised outlier detection ensembles. In: KDD, pp. 428\u2013436 (2013)","DOI":"10.1145\/2487575.2487676"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75762-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:11:17Z","timestamp":1710349877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75762-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030757618","9783030757625"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75762-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"673","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"157","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}