{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:41:06Z","timestamp":1725860466386},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319419190"},{"type":"electronic","value":"9783319419206"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41920-6_2","type":"book-chapter","created":{"date-parts":[[2016,6,27]],"date-time":"2016-06-27T01:11:43Z","timestamp":1466989903000},"page":"15-27","source":"Crossref","is-referenced-by-count":8,"title":["A Spectral Clustering Based Outlier Detection Technique"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaochun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xia Li","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers, Monographs on Applied Probability and Statistics","author":"DM Hawkins","year":"1980","unstructured":"Hawkins, D.M.: Identification of Outliers, Monographs on Applied Probability and Statistics. Chapman and Hall, London (1980)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Data Mining for Security Applications (2002)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"issue":"3","key":"2_CR3","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security 2(3), 295\u2013331 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Sheng, B., Li, Q., Mao, W., Jin, W.: Outlier detection in sensor networks. In: Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 219\u2013228 (2007)","DOI":"10.1145\/1288107.1288137"},{"key":"2_CR5","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"VJ Hodge","year":"2004","unstructured":"Hodge, V.J., Austin, J.: A Survey of Outlier Detection Methodologies. Artificial Intelligence Review 22, 85\u2013126 (2004)","journal-title":"Artificial Intelligence Review"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly Detection: A Survey. ACM Computing Surveys 41(3), Article 15 (2009)","DOI":"10.1145\/1541880.1541882"},{"key":"2_CR7","unstructured":"Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In: Proceedings of the 24th VLDB Conference, New York, USA, pp. 392\u2013403 (1998)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Breuning, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"2_CR9","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/S0167-8655(00)00131-8","volume":"22","author":"MF Jiang","year":"2001","unstructured":"Jiang, M.F., Tseng, S.S., Su, C.M.: Two-Phase Clustering Process for Outliers Detection. Pattern Recognition Letters 22, 691\u2013700 (2001)","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"2_CR10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/A:1011174803800","volume":"43","author":"J Malik","year":"2001","unstructured":"Malik, J., Belongie, S., Leung, T., et al.: Contour and texture analysis for image segmentation. International Journal of Computer Vision 43(1), 7\u201327 (2001)","journal-title":"International Journal of Computer Vision"},{"key":"2_CR11","unstructured":"Bach, F.R., Jordan, M.I.: Blind one-microphone speech separation: a spectral learning approach. In: Proceedings of NIPS 2004, Vancouver, BC, pp. 65\u201372 (2004)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Weiss, Y.: Segmentation using eigenvectors: a unified view. In: International Conference on Computer Vision, Corfu, pp. 975\u2013982 (1999)","DOI":"10.1109\/ICCV.1999.790354"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Ding, C., He, X., Zha, H., et al.: A min-max cut algorithm for graph partitioning and data clustering. In: Proceedings of International Conference on Data Mining, California, pp. 107\u2013114 (2001)","DOI":"10.1109\/ICDM.2001.989507"},{"issue":"8","key":"2_CR14","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/34.868688","volume":"22","author":"J Shi","year":"2000","unstructured":"Shi, J., Malik, J.: Normalized Cuts and Image Segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(8), 888\u2013905 (2000)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"2_CR15","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1145\/263867.263872","volume":"44","author":"M Stoer","year":"1997","unstructured":"Stoer, M., Wagner, F.: A simple min-cut algorithm. Journal of the ACM 44(4), 585\u2013591 (1997)","journal-title":"Journal of the ACM"},{"issue":"9","key":"2_CR16","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1109\/43.159993","volume":"11","author":"L Hagen","year":"1992","unstructured":"Hagen, L., Kahng, A.: New spectral methods for ratio cut partitioning and clustering. IEEE Trans. Computer-Aided Design 11(9), 1074\u20131085 (1992)","journal-title":"IEEE Trans. Computer-Aided Design"},{"key":"2_CR17","unstructured":"Zelnik-Manor, L., Perona, P.: Self-tuning spectral clustering. In: Proceedings of NIPS 2004, Vancouver, BC, pp. 1601\u20131608 (2004)"},{"issue":"3\u20134","key":"2_CR18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"EM Knorr","year":"2000","unstructured":"Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications. VLDB Journal: Very Large Databases 8(3\u20134), 237\u2013253 (2000)","journal-title":"VLDB Journal: Very Large Databases"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the ACM SIGMOD Conference, pp. 427\u2013438 (2000)","DOI":"10.1145\/342009.335437"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-45681-3_2","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"F Angiulli","year":"2002","unstructured":"Angiulli, F., Pizzuti, C.: Fast outlier detection in high dimensional spaces. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) PKDD 2002. LNCS (LNAI), vol. 2431, pp. 15\u201326. Springer, Heidelberg (2002)"},{"key":"2_CR21","unstructured":"UCI: The UCI KDD Archive. University of California, Irvine, CA. http:\/\/kdd.ics.uci.edu\/"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Yu, P.: Outlier detection for high-dimensional data. In: Proceedings of SIGMOD 2001, Santa Barbara, CA, USA, pp. 37\u201346 (2001)","DOI":"10.1145\/375663.375668"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Data Mining in Pattern Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41920-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T06:58:18Z","timestamp":1568098698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41920-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319419190","9783319419206"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41920-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}