{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T20:10:01Z","timestamp":1746475801456,"version":"3.40.4"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319119991"},{"type":"electronic","value":"9783319120003"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12000-3_9","type":"book-chapter","created":{"date-parts":[[2014,10,29]],"date-time":"2014-10-29T12:43:16Z","timestamp":1414586596000},"page":"181-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Low-Rank Outlier Detection"],"prefix":"10.1007","author":[{"given":"Sheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Ming","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,30]]},"reference":[{"key":"9_CR1","first-page":"1019","volume":"9","author":"FR Bach","year":"2008","unstructured":"F.R. Bach, Consistency of trace norm minimization. J. Mach. Learn. Res. 9, 1019\u20131048 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"A. Banerjee, P. Burlina, R. Meth, Fast hyperspectral anomaly detection via svdd, in ICIP, vol 4, pp. 101\u2013104 (2007)","DOI":"10.1109\/ICIP.2007.4379964"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"D. Barbar\u00e1, P. Chen, Using the fractal dimension to cluster datasets, in KDD, pp. 260\u2013264 (2000)","DOI":"10.1145\/347090.347145"},{"key":"9_CR4","volume-title":"Outliers in Statistical Data","author":"V Barnett","year":"1994","unstructured":"V. Barnett, T. Lewis, Outliers in Statistical Data (Wiley, New York, 1994)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"S.D. Bay, M. Schwabacher, Mining distance-based outliers in near linear time with randomization and a simple pruning rule, in KDD, pp. 29\u201338 (2003)","DOI":"10.1145\/956750.956758"},{"key":"9_CR6","volume-title":"Constrained Optimization and Lagrange Multiplier Methods","author":"D Bertsekas","year":"1982","unstructured":"D. Bertsekas, Constrained Optimization and Lagrange Multiplier Methods (Athena Scientific, Belmont, 1982)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"M. Breitenbach, G.Z. Grudic, Clustering through ranking on manifolds, in ICML, pp. 73\u201380 (2005)","DOI":"10.1145\/1102351.1102361"},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1137\/080738970","volume":"20","author":"JF Cai","year":"2010","unstructured":"J.F. Cai, E.J. Candes, Z.W. Shen, A singular value thresholding algorithm for matrix completion. SIAM J. Optim. 20(4), 1956\u20131982 (2010)","journal-title":"SIAM J. Optim."},{"issue":"3","key":"9_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1970392.1970395","volume":"58","author":"EJ Cand\u00e8s","year":"2011","unstructured":"E.J. Cand\u00e8s, X.D. Li, Y. Ma, J. Wright, Robust principal component analysis? J. ACM 58(3), 11 (2011)","journal-title":"J. ACM"},{"issue":"7","key":"9_CR10","doi-asserted-by":"publisher","first-page":"3343","DOI":"10.1016\/j.eswa.2013.11.025","volume":"41","author":"M Cha","year":"2014","unstructured":"M. Cha, J.-S. Kim, J.-G. Baek, Density weighted support vector data description. Expert Syst. Appl. 41(7), 3343\u20133350 (2014)","journal-title":"Expert Syst. Appl."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"M. Elahi, K. Li, W. Nisar, X. Lv, H. Wang, Efficient clustering-based outlier detection algorithm for dynamic data stream, in FSKD, vol. 5, pp. 298\u2013304 (2008)","DOI":"10.1109\/FSKD.2008.374"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"P.-Y. Hao, Y.-H. Lin, A new multi-class support vector machine with multi-sphere in the feature space, in IEA\/AIE, pp. 756\u2013765 (2007)","DOI":"10.1007\/978-3-540-73325-6_75"},{"key":"9_CR13","volume-title":"Constrained Optimization and Lagrange Multiplier Methods","author":"DM Hawkins","year":"1982","unstructured":"D.M. Hawkins, Constrained Optimization and Lagrange Multiplier Methods (Athena Scientific, Belmont, 1982)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"S. Hawkins, H. He, G. J. Williams, R.A. Baxter, Outlier detection using replicator neural networks, in DaWaK, pp. 170\u2013180 (2002)","DOI":"10.1007\/3-540-46145-0_17"},{"key":"9_CR15","unstructured":"K.A. Heller, K.M. Svore, A.D. Keromytis, S.J. Stolfo, One class support vector machines for detecting anomalous windows registry accesses, in The Workshop on Data Mining for Computer Security (2003)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"W. Jin, A.K.H. Tung, J. Han, Mining top-n local outliers in large databases, in KDD, pp. 293\u2013298 (2001)","DOI":"10.1145\/502512.502554"},{"issue":"2","key":"9_CR17","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10618-009-0148-z","volume":"20","author":"A Koufakou","year":"2010","unstructured":"A. Koufakou, M. Georgiopoulos, A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes. Data Min. Knowl. Discov. 20(2), 259\u2013289 (2010)","journal-title":"Data Min. Knowl. Discov."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"T. Le, D. Tran, W. Ma, D. Sharma, A theoretical framework for multi-sphere support vector data description, in ICONIP, vol. 2, pp. 132\u2013142 (2010)","DOI":"10.1007\/978-3-642-17534-3_17"},{"issue":"7\u20138","key":"9_CR19","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1007\/s00521-012-1001-7","volume":"22","author":"T Le","year":"2013","unstructured":"T. Le, D. Tran, P. Nguyen, W. Ma, D. Sharma, Proximity multi-sphere support vector clustering. Neural Comput. Appl. 22(7\u20138), 1309\u20131319 (2013)","journal-title":"Neural Comput. Appl."},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"L. Li, S. Li, Y. Fu, Discriminative dictionary learning with low-rank regularization for face recognition, in FG, pp. 1\u20136 (2013)","DOI":"10.1109\/FG.2013.6553696"},{"key":"9_CR21","unstructured":"S. Li, Y. Fu, Low-rank coding with b-matching constraint for semi-supervised classification, in IJCAI, pp. 1472\u20131478 (2013)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"S. Li, Y. Fu, Robust subspace discovery through supervised low-rank constraints, in SDM (2014)","DOI":"10.1137\/1.9781611973440.19"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"S. Li, M. Shao, Y. Fu, Locality linear fitting one-class svm with low-rank constraints for outlier detection, in International Joint Conference on Neural Networks (IJCNN) (2014)","DOI":"10.1109\/IJCNN.2014.6889446"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"S. Li, I.W. Tsang, Maximum margin\/volume outlier detection, in ICTAI, pp. 385\u2013392 (2011)","DOI":"10.1109\/ICTAI.2011.63"},{"key":"9_CR25","unstructured":"Z.C. Lin, M.M. Chen, L.Q. Wu, Y. Ma, The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices (Technique Report, UIUC, 2009)"},{"issue":"3","key":"9_CR26","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/s10115-012-0484-y","volume":"34","author":"B Liu","year":"2013","unstructured":"B. Liu, Y. Xiao, L. Cao, Z. Hao, F. Deng, Svdd-based outlier detection on uncertain data. Knowl. Inf. Syst. 34(3), 597\u2013618 (2013)","journal-title":"Knowl. Inf. Syst."},{"key":"9_CR27","unstructured":"G.C. Liu, Z.C. Lin, Y. Yu, Robust subspace segmentation by low-rank representation, in ICML, pp. 663\u2013670 (2010)"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"G.C. Liu, S.C. Yan, Latent low-rank representation for subspace segmentation and feature extraction, in ICCV (2011)","DOI":"10.1109\/ICCV.2011.6126422"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"H.M. Lukashevich, S. Nowak, P. Dunker, Using one-class svm outliers detection for verification of collaboratively tagged image training sets, in IEEE International Conference on Multimedia and Expo (ICME), pp. 682\u2013685 (2009)","DOI":"10.1109\/ICME.2009.5202588"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"E.J. Pauwels, O. Ambekar, One class classification for anomaly detection: support vector data description revisited, in ICDM, pp. 25\u201339 (2011)","DOI":"10.1007\/978-3-642-23184-1_3"},{"key":"9_CR31","doi-asserted-by":"publisher","DOI":"10.1002\/0471725382","volume-title":"Robust Regression and Outlier Detection","author":"PJ Rousseeuw","year":"1987","unstructured":"P.J. Rousseeuw, A.M. Leroy, Robust Regression and Outlier Detection (Wiley, New York, 1987)"},{"issue":"7","key":"9_CR32","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"B. Sch\u00f6lkopf, J.C. Platt, J. Shawe-Taylor, A.J. Smola, R.C. Williamson, Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"S. Shekhar, C.T. Lu, P. Zhang, Detecting graph-based spatial outliers: algorithms and applications (a summary of results), in KDD, pp. 371\u2013376 (2001)","DOI":"10.1145\/502512.502567"},{"issue":"12","key":"9_CR34","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPAMI.2003.1251154","volume":"25","author":"T Sim","year":"2003","unstructured":"T. Sim, S. Baker, M. Bsat, The cmu pose, illumination, and expression database. IEEE Trans. Pattern Anal. Mach. Intell. 25(12), 1615\u20131618 (2003)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"9_CR35","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DMJ Tax","year":"2004","unstructured":"D.M.J. Tax, R.P.W. Duin, Support vector data description. Mach. Learn. 54(1), 45\u201366 (2004)","journal-title":"Mach. Learn."},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"G.J. Williams, R.A. Baxter, H. He, S. Hawkins, L. Gu, A comparative study of rnn for outlier detection in data mining, in ICDM, pp. 709\u2013712 (2002)","DOI":"10.1109\/ICDM.2002.1184035"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Y. Xiao, B. Liu, L. Cao, X. Wu, C. Zhang, Z. Hao, F. Yang, J. Cao, Multi-sphere support vector data description for outliers detection on multi-distribution data, in ICDM Workshops, pp. 82\u201387 (2009)","DOI":"10.1109\/ICDMW.2009.87"},{"issue":"14","key":"9_CR38","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1016\/j.patrec.2010.07.006","volume":"31","author":"B Zhang","year":"2010","unstructured":"B. Zhang, L. Zhang, D. Zhang, L. Shen, Directional binary code with application to polyu near-infrared face database. Pattern Recogn. Lett. 31(14), 2337\u20132344 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Y. Zhang, Z. Jiang, L.S. Davis, Learning structured low-rank representations for image classification, in CVPR, pp. 676\u2013683 (2013)","DOI":"10.1109\/CVPR.2013.93"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"X. Zhou, C. Yang, W. Yu, Automatic mitral leaflet tracking in echocardiography by outlier detection in the low-rank representation, in CVPR, pp. 972\u2013979 (2012)","DOI":"10.1109\/CVPR.2012.6247773"},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.neucom.2013.07.002","volume":"123","author":"F Zhu","year":"2014","unstructured":"F. Zhu, N. Ye, W. Yu, S. Xu, G. Li, Boundary detection and sample reduction for one-class support vector machines. Neurocomputing 123, 166\u2013173 (2014)","journal-title":"Neurocomputing"}],"container-title":["Low-Rank and Sparse Modeling for Visual Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12000-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T19:41:08Z","timestamp":1746474068000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12000-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319119991","9783319120003"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12000-3_9","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"30 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}