{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:13:59Z","timestamp":1742944439988,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031220630"},{"type":"electronic","value":"9783031220647"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22064-7_25","type":"book-chapter","created":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T19:02:04Z","timestamp":1669230124000},"page":"337-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Method for\u00a0Outlying Aspect Mining Based on\u00a0Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Zihao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Lei","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Xinye","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,24]]},"reference":[{"issue":"3","key":"25_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.4018\/IJISP.2020070107","volume":"14","author":"JR Beulah","year":"2020","unstructured":"Beulah, J.R., Punithavathani, D.S.: An efficient mixed attribute outlier detection method for identifying network intrusions. Int. J. Inf. Secur. Priv. 14(3), 115\u2013133 (2020)","journal-title":"Int. J. Inf. Secur. Priv."},{"issue":"5","key":"25_CR2","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1214\/10-AOS799","volume":"38","author":"ZI Botev","year":"2010","unstructured":"Botev, Z.I., Grotowski, J.F., Kroese, D.P.: Kernel density estimation via diffusion. Ann. Stat. 38(5), 2916\u20132957 (2010)","journal-title":"Ann. Stat."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Carvalho, E.D., Silva, R.R.V., Ara\u00fajo, F.H.D., de A. L. Rabelo, R., de Carvalho Filho, A.O.: An approach to the classification of COVID-19 based on CT scans using convolutional features and genetic algorithms. Comput. Biol. Med. 136, 104744 (2021)","DOI":"10.1016\/j.compbiomed.2021.104744"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Dang, X., Assent, I., Ng, R.T., Zimek, A., Schubert, E.: Discriminative features for identifying and interpreting outliers. In: ICDE, pp. 88\u201399 (2014)","DOI":"10.1109\/ICDE.2014.6816642"},{"issue":"5","key":"25_CR5","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1007\/s10618-014-0398-2","volume":"29","author":"L Duan","year":"2015","unstructured":"Duan, L., Tang, G., Pei, J., Bailey, J., Campbell, A., Tang, C.: Mining outlying aspects on numeric data. Data Min. Knowl. Disc. 29(5), 1116\u20131151 (2015). https:\/\/doi.org\/10.1007\/s10618-014-0398-2","journal-title":"Data Min. Knowl. Disc."},{"issue":"17","key":"25_CR6","doi-asserted-by":"publisher","first-page":"4609","DOI":"10.1093\/bioinformatics\/btaa259","volume":"36","author":"WG Jenkinson","year":"2020","unstructured":"Jenkinson, W.G., Li, Y.I., Basu, S., Cousin, M.A., Oliver, G.R., Klee, E.W.: Leafcuttermd: an algorithm for outlier splicing detection in rare diseases. Bioinform. 36(17), 4609\u20134615 (2020)","journal-title":"Bioinform."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Keller, F., M\u00fcller, E., B\u00f6hm, K.: HICS: high contrast subspaces for density-based outlier ranking. In: ICDE, pp. 1037\u20131048 (2012)","DOI":"10.1109\/ICDE.2012.88"},{"key":"25_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107391","volume":"107","author":"PZ Lappas","year":"2021","unstructured":"Lappas, P.Z., Yannacopoulos, A.N.: A machine learning approach combining expert knowledge with genetic algorithms in feature selection for credit risk assessment. Appl. Soft Comput. 107, 107391 (2021)","journal-title":"Appl. Soft Comput."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Micenkov\u00e1, B., Ng, R.T., Dang, X., Assent, I.: Explaining outliers by subspace separability. In: ICDM, pp. 518\u2013527 (2013)","DOI":"10.1109\/ICDM.2013.132"},{"issue":"6","key":"25_CR10","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1007\/s10618-016-0453-2","volume":"30","author":"NX Vinh","year":"2016","unstructured":"Vinh, N.X., et al.: Discovering outlying aspects in large datasets. Data Min. Knowl. Disc. 30(6), 1520\u20131555 (2016). https:\/\/doi.org\/10.1007\/s10618-016-0453-2","journal-title":"Data Min. Knowl. Disc."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"do Prado Ribeiro, K., Fontes, C.H., de Melo, G.J.A.: Genetic algorithm-based fuzzy clustering applied to multivariate time series. Evol. Intell. 14(4), 1547\u20131563 (2021)","DOI":"10.1007\/s12065-020-00422-8"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Samariya, D., Aryal, S., Ting, K.M., Ma, J.: A new effective and efficient measure for outlying aspect mining. In: WISE, pp. 463\u2013474 (2020)","DOI":"10.1007\/978-3-030-62008-0_32"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Samariya, D., Ma, J.: Mining outlying aspects on healthcare data. In: HIS, pp. 160\u2013170 (2021)","DOI":"10.1007\/978-3-030-90885-0_15"},{"key":"25_CR14","unstructured":"Silverman, B.W.: Density estimation for statistics and data analysis (1986)"},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.patrec.2018.12.020","volume":"122","author":"JR Wells","year":"2019","unstructured":"Wells, J.R., Ting, K.M.: A new simple and efficient density estimator that enables fast systematic search. Pattern Recognit. Lett. 122, 92\u201398 (2019)","journal-title":"Pattern Recognit. Lett."},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gao, Q., Wang, H.H.: A novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm. In: ICDM, pp. 731\u2013740 (2006)","DOI":"10.1109\/ICDM.2006.6"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, J., Lou, M., Ling, T.W., Wang, H.H.: HOS-Miner: a system for detecting outlying subspaces of high-dimensional data. In: VLDB, pp. 1265\u20131268 (2004)","DOI":"10.1016\/B978-012088469-8\/50123-6"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, C., Kitagawa, H., Faloutsos, C.: Example-based robust outlier detection in high dimensional datasets. In: ICDM, pp. 829\u2013832 (2005)","DOI":"10.2197\/ipsjdc.1.234"},{"issue":"2","key":"25_CR19","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1504\/IJSN.2018.092473","volume":"13","author":"N Zrira","year":"2018","unstructured":"Zrira, N., Mekouar, S., Bouyakhf, E.: A novel approach for graph-based global outlier detection in social networks. Int. J. Secur. Networks 13(2), 108\u2013128 (2018)","journal-title":"Int. J. Secur. Networks"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22064-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T12:31:17Z","timestamp":1728477077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22064-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031220630","9783031220647"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22064-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brisbane, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2022.uqcloud.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT3","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"198","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}