{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T21:40:02Z","timestamp":1748382002611,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319180311"},{"type":"electronic","value":"9783319180328"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18032-8_13","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T05:41:54Z","timestamp":1431063714000},"page":"165-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Contextual Anomaly Detection Using Log-Linear Tensor Factorization"],"prefix":"10.1007","author":[{"given":"Alpa Jayesh","family":"Shah","sequence":"first","affiliation":[]},{"given":"Christian","family":"Desrosiers","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Sabourin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Bader, B.W., Berry, M.W., Browne, M.: Discussion tracking in enron email using parafac. In: Survey of Text Mining II, pp. 147\u2013163. Springer (2008)","DOI":"10.1007\/978-1-84800-046-9_8"},{"key":"13_CR2","unstructured":"Bader, B.W., Kolda, T.G., et al.: Matlab tensor toolbox version 2.5 (2012). http:\/\/www.sandia.gov\/~tgkolda\/TensorToolbox\/"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Benezeth, Y., Jodoin, P.M., Saligrama, V., Rosenberger, C.: Abnormal events detection based on spatio-temporal co-occurences. In: IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), pp. 2458\u20132465 (2009)","DOI":"10.1109\/CVPR.2009.5206686"},{"issue":"4","key":"13_CR4","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.1137\/110859063","volume":"33","author":"EC Chi","year":"2012","unstructured":"Chi, E.C., Kolda, T.G.: On tensors, sparsity, and nonnegative factorizations. SIAM Journal on Matrix Analysis and Applications 33(4), 1272\u20131299 (2012)","journal-title":"SIAM Journal on Matrix Analysis and Applications"},{"issue":"5","key":"13_CR5","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1016\/j.patcog.2007.10.022","volume":"41","author":"PC Chung","year":"2008","unstructured":"Chung, P.C., Liu, C.D.: A daily behavior enabled hidden markov model for human behavior understanding. Pattern Recognition 41(5), 1572\u20131580 (2008)","journal-title":"Pattern Recognition"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal and Ubiquitous Computing 10(4), 255\u2013268 (2006)","journal-title":"Personal and Ubiquitous Computing"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Hara, K., Omori, T., Ueno, R.: Detection of unusual human behavior in intelligent house. In: 12th IEEE Workshop on Neural Networks for Signal Processing, pp. 697\u2013706 (2002)","DOI":"10.1109\/NNSP.2002.1030081"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Hayashi, K., Takenouchi, T., Shibata, T., Kamiya, Y., Kato, D., Kunieda, K., Yamada, K., Ikeda, K.: Exponential family tensor factorization for missing-values prediction and anomaly detection. In: 10th IEEE Int. Conf. on Data Mining (ICDM), pp. 216\u2013225 (2010)","DOI":"10.1109\/ICDM.2010.39"},{"key":"13_CR9","unstructured":"Hu, D.H., Zhang, X.X., Yin, J., Zheng, V.W., Yang, Q.: Abnormal activity recognition based on hdp-hmm models. In: IJCAI, pp. 1715\u20131720 (2009)"},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.cviu.2010.10.008","volume":"115","author":"F Jiang","year":"2011","unstructured":"Jiang, F., Yuan, J., Tsaftaris, S.A., Katsaggelos, A.K.: Anomalous video event detection using spatiotemporal context. Computer Vision and Image Understanding 115(3), 323\u2013333 (2011)","journal-title":"Computer Vision and Image Understanding"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Kim, H., Lee, S., Ma, X., Wang, C.: Higher-order PCA for anomaly detection in large-scale networks. In: 3rd IEEE Int. Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), pp. 85\u201388 (2009)","DOI":"10.1109\/CAMSAP.2009.5413230"},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"T Kolda","year":"2009","unstructured":"Kolda, T., Bader, B.: Tensor decompositions and applications. SIAM Review 51(3), 455\u2013500 (2009)","journal-title":"SIAM Review"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-73499-4_6","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"LJ Latecki","year":"2007","unstructured":"Latecki, L.J., Lazarevic, A., Pokrajac, D.: Outlier detection with kernel density functions. In: Perner, P. (ed.) MLDM 2007. LNCS (LNAI), vol. 4571, pp. 61\u201375. Springer, Heidelberg (2007)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Li, C., Han, Z., Ye, Q., Jiao, J.: Abnormal behavior detection via sparse reconstruction analysis of trajectory. In: 6th IEEE Int. Conf. on Image and Graphics (ICIG), pp. 807\u2013810 (2011)","DOI":"10.1109\/ICIG.2011.104"},{"issue":"1","key":"13_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s10107-012-0629-5","volume":"140","author":"Y Nesterov","year":"2013","unstructured":"Nesterov, Y.: Gradient methods for minimizing composite functions. Mathematical Programming 140(1), 125\u2013161 (2013)","journal-title":"Mathematical Programming"},{"issue":"11","key":"13_CR16","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/TCSVT.2008.2005599","volume":"18","author":"C Piciarelli","year":"2008","unstructured":"Piciarelli, C., Micheloni, C., Foresti, G.L.: Trajectory-based anomalous event detection. Circuits and Systems for Video Technology 18(11), 1544\u20131554 (2008)","journal-title":"Circuits and Systems for Video Technology"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Rendle, S., Gantner, Z., Freudenthaler, C., Schmidt-Thieme, L.: Fast context-aware recommendations with factorization machines. In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 635\u2013644. ACM (2011)","DOI":"10.1145\/2009916.2010002"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Sillito, R.R., Fisher, R.B.: Semi-supervised learning for anomalous trajectory detection. In: BMVC, pp. 1\u201310 (2008)","DOI":"10.5244\/C.22.103"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Sun, J., Tao, D., Faloutsos, C.: Beyond streams and graphs: dynamic tensor analysis. In: 12th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 374\u2013383 (2006)","DOI":"10.1145\/1150402.1150445"},{"key":"13_CR20","unstructured":"Tork, H.F., Oliveira, M., Gama, J., Malinowski, S., Morla, R.: Event and anomaly detection using tucker3 decomposition. In: Workshop on Ubiquitous Data Mining, p. 8 (2012)"},{"issue":"12","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1016\/S0167-8655(01)00070-8","volume":"22","author":"M Welling","year":"2001","unstructured":"Welling, M., Weber, M.: Positive tensor factorization. Pattern Recognition Letters 22(12), 1255\u20131261 (2001)","journal-title":"Pattern Recognition Letters"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Yuan, J., Zheng, Y., Xie, X., Sun, G.: Driving with knowledge from the physical world. In: 17th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 316\u2013324 (2011)","DOI":"10.1145\/2020408.2020462"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18032-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T21:15:55Z","timestamp":1748380555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18032-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319180311","9783319180328"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18032-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}