{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:41:18Z","timestamp":1743154878057,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031843525"},{"type":"electronic","value":"9783031843532"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84353-2_29","type":"book-chapter","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:48:40Z","timestamp":1740491320000},"page":"339-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving Anomaly Detection Methods Through Attribute Exclusion Using Isolation Forest"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1093-4275","authenticated-orcid":false,"given":"Albert","family":"Rachwa\u0142","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6215-297X","authenticated-orcid":false,"given":"Pawe\u0142","family":"Karczmarek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107667","volume":"129","author":"H Alqahtani","year":"2024","unstructured":"Alqahtani, H., Kumar, G.: Machine learning for enhancing transportation security: a comprehensive analysis of electric and flying vehicle systems. Eng. Appl. Artif. Int. 129, 107667 (2024)","journal-title":"Eng. Appl. Artif. Int."},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/s11831-023-09996-9","volume":"31","author":"DD Solomon","year":"2023","unstructured":"Solomon, D.D., Sonia, K., Kumar, K., Kanwar, K., Iyer, S., Kumar, M.: Extensive review on the role of machine learning for multifactorial genetic disorders prediction. Arch. Comput. Methods Eng. 31, 623\u2013640 (2023)","journal-title":"Arch. Comput. Methods Eng."},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"401","DOI":"10.35784\/jcsi.2285","volume":"17","author":"B \u0141ach","year":"2020","unstructured":"\u0141ach, B., \u0141ukasik, E.: Faster R-CNN model learning on synthetic images. JCSI 17, 401\u2013404 (2020)","journal-title":"JCSI"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.patrec.2024.02.008","volume":"179","author":"F Lacy","year":"2024","unstructured":"Lacy, F., Ruiz-Reyes, A., Brescia, A.: Machine learning for low signal-to-noise ratio detection. Pat. Recogn. Lett. 179, 115\u2013122 (2024)","journal-title":"Pat. Recogn. Lett."},{"key":"29_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118904","volume":"213","author":"A Abhaya","year":"2023","unstructured":"Abhaya, A., Patra, B.K.: An efficient method for autoencoder based outlier detection. Exp. Syst. Appl. 213, 118904 (2023)","journal-title":"Exp. Syst. Appl."},{"key":"29_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107830","volume":"131","author":"R Singh","year":"2024","unstructured":"Singh, R., Sethi, A., Saini, K., Saurav, S., Tiwari, A., Singh, S.: Attention-guided generator with dual discriminator GAN for real-time video anomaly detection. Eng. Appl. Artif. Intell. 131, 107830 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"3995","DOI":"10.3390\/math11183995","volume":"11","author":"O Gorokhov","year":"2023","unstructured":"Gorokhov, O., Petrovskiy, M., Mashechkin, I., Kazachuk, M.: Fuzzy CNN autoencoder for unsupervised anomaly detection in log data. Mathematics 11, 3995 (2023)","journal-title":"Mathematics"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Dolecki, M., et al.: On the understanding of anomalies in the oculography data and their classification with an application of fuzzy aggregators. In: 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2022)","DOI":"10.1109\/FUZZ-IEEE55066.2022.9882877"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data 6, 1\u201339 (2012)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"29_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105659","volume":"195","author":"P Karczmarek","year":"2020","unstructured":"Karczmarek, P., Kiersztyn, A., Pedrycz, W., Al, E.: K-Means-based isolation forest. Knowl. Based Syst. 195, 105659 (2020)","journal-title":"Knowl. Based Syst."},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"2157","DOI":"10.1109\/TIFS.2021.3050605","volume":"16","author":"P-F Marteau","year":"2021","unstructured":"Marteau, P.-F.: Random partitioning forest for point-wise and collective anomaly detection-application to network intrusion detection. IEEE Trans. Inform. Forensic Secur. 16, 2157\u20132172 (2021)","journal-title":"IEEE Trans. Inform. Forensic Secur."},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"74175","DOI":"10.1109\/ACCESS.2022.3190505","volume":"10","author":"L Galka","year":"2022","unstructured":"Galka, L., Karczmarek, P., Tokovarov, M.: Isolation forest based on minimal spanning tree. IEEE Access. 10, 74175\u201374186 (2022)","journal-title":"IEEE Access."},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.ins.2023.01.104","volume":"628","author":"\u0141 Ga\u0142ka","year":"2023","unstructured":"Ga\u0142ka, \u0141, Karczmarek, P., Tokovarov, M.: Effective enhancement of isolation forest method based on minimal spanning tree clustering. Inf. Sci. 628, 320\u2013338 (2023)","journal-title":"Inf. Sci."},{"key":"29_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101095","volume":"25","author":"L Arnau Mu\u00f1oz","year":"2024","unstructured":"Arnau Mu\u00f1oz, L., Bern\u00e1 Mart\u00ednez, J.V., Maci\u00e1 P\u00e9rez, F., Lorenzo Fonseca, I.: Anomaly detection system for data quality assurance in IoT infrastructures based on machine learning. Internet Things 25, 101095 (2024)","journal-title":"Internet Things"},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"746","DOI":"10.3390\/s24030746","volume":"24","author":"L Benova","year":"2024","unstructured":"Benova, L., Hudec, L.: Comprehensive analysis and evaluation of anomalous user activity in web server logs. Sensors 24, 746 (2024)","journal-title":"Sensors"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Gao, J., Ozbay, K., Hu, Y.: Real-time anomaly detection of short-term traffic disruptions in urban areas through adaptive isolation forest. J. Int. Transp. Syst. 1\u201318 (2024)","DOI":"10.1080\/15472450.2024.2312809"},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"136","DOI":"10.3390\/pr12010136","volume":"12","author":"Z Zhang","year":"2024","unstructured":"Zhang, Z., Dong, S., Li, D., Liu, P., Wang, Z.: Prediction and diagnosis of electric vehicle battery fault based on abnormal voltage: using decision tree algorithm theories and isolated forest. Processes 12, 136 (2024)","journal-title":"Processes"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/s11517-023-02961-5","volume":"62","author":"R Zhang","year":"2023","unstructured":"Zhang, R., Rong, R., Gan, J.Q., Xu, Y., Wang, H., Wang, X.: Reliable and fast automatic artifact rejection of Long-Term EEG recordings based on isolation forest. Med. Biol. Eng. Comput. 62, 521\u2013535 (2023)","journal-title":"Med. Biol. Eng. Comput."},{"key":"29_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108083","volume":"133","author":"S Cu\u00e9llar","year":"2024","unstructured":"Cu\u00e9llar, S., Santos, M., Alonso, F., Fabregas, E., Farias, G.: Explainable anomaly detection in spacecraft telemetry. Eng. Appl. Artif. Int. 133, 108083 (2024)","journal-title":"Eng. Appl. Artif. Int."},{"key":"29_CR21","unstructured":"Preiss, B.R.: Data Structures and Algorithms with Object-oriented Design Patterns in Java. Wiley (1999)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84353-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:48:44Z","timestamp":1740491324000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84353-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031843525","9783031843532"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84353-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}