{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T01:09:11Z","timestamp":1760404151113,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319495859"},{"type":"electronic","value":"9783319495866"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49586-6_8","type":"book-chapter","created":{"date-parts":[[2016,11,12]],"date-time":"2016-11-12T03:49:37Z","timestamp":1478922577000},"page":"111-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Outlier Detection on Mixed-Type Data: An\u00a0Energy-Based Approach"],"prefix":"10.1007","author":[{"given":"Kien","family":"Do","sequence":"first","affiliation":[]},{"given":"Truyen","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Dinh","family":"Phung","sequence":"additional","affiliation":[]},{"given":"Svetha","family":"Venkatesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"8_CR1","series-title":"Data Mining","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8_8","volume-title":"Outlier Analysis","author":"CC Aggarwal","year":"2015","unstructured":"Aggarwal, C.C.: Outlier Analysis. Data Mining. Springer, Heidelberg (2015)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-45681-3_2","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"F Angiulli","year":"2002","unstructured":"Angiulli, F., Pizzuti, C.: Fast outlier detection in high dimensional spaces. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) PKDD 2002. LNCS, vol. 2431, pp. 15\u201327. Springer, Heidelberg (2002). doi:10.1007\/3-540-45681-3_2"},{"issue":"8","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio, Y., Courville, A., Vincent, P.: Representation learning: A review and new perspectives. IEEE Trans. Pattern Anal. Mach. Intell. 35(8), 1798\u20131828 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"22","key":"8_CR4","doi-asserted-by":"publisher","first-page":"8637","DOI":"10.1016\/j.eswa.2015.07.018","volume":"42","author":"M Bouguessa","year":"2015","unstructured":"Bouguessa, M.: A practical outlier detection approach for mixed-attribute data. Expert Syst. Appl. 42(22), 8637\u20138649 (2015)","journal-title":"Expert Syst. Appl."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: Lof: identifying density-based local outliers. In: ACM Sigmod Record, vol. 29, pp. 93\u2013104. ACM (2000)","DOI":"10.1145\/335191.335388"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"De Leon, A.R., Chough, K.C.: Analysis of Mixed Data: Methods & Applications. CRC Press (2013)","DOI":"10.1201\/b14571"},{"key":"8_CR8","unstructured":"Diehl, C.P., Hampshire, J.B.: Real-time object classification and novelty detection for collaborative video surveillance. In: Proceedings of the 2002 International Joint Conference on Neural Networks, 2002. IJCNN 2002, vol. 3, pp. 2620\u20132625. IEEE (2002)"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.neucom.2012.11.050","volume":"122","author":"U Fiore","year":"2013","unstructured":"Fiore, U., Palmieri, F., Castiglione, A., De Santis, A.: Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122, 13\u201323 (2013)","journal-title":"Neurocomputing"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ghoting, A., Otey, M.E., Parthasarathy, S.: Loaded: Link-based outlier and anomaly detection in evolving data sets. In: ICDM, pp. 387\u2013390 (2004)","DOI":"10.1109\/ICDM.2004.10011"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1162\/089976602760128018","volume":"14","author":"GE Hinton","year":"2002","unstructured":"Hinton, G.E.: Training products of experts by minimizing contrastive divergence. Neural Comput. 14, 1771\u20131800 (2002)","journal-title":"Neural Comput."},{"issue":"5786","key":"8_CR12","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (2006)","journal-title":"Science"},{"key":"8_CR13","unstructured":"Kingma, D., Ba, J., Adam: A method for stochastic optimization. arXiv preprint (2014). arXiv:1412.6980"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/978-3-642-23544-3_30","volume-title":"Data Warehousing and Knowledge Discovery","author":"RM Konijn","year":"2011","unstructured":"Konijn, R.M., Kowalczyk, W.: Finding fraud in health insurance data with two-layer outlier detection approach. In: Cuzzocrea, A., Dayal, U. (eds.) DaWaK 2011. LNCS, vol. 6862, pp. 394\u2013405. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-23544-3_30"},{"key":"8_CR15","unstructured":"Koufakou, A., Georgiopoulos, M., Anagnostopoulos, G.C.: Detecting outliers in high-dimensional datasets with mixed attributes. In: DMIN, pp. 427\u2013433. Citeseer (2008)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 251\u2013261. ACM (2003)","DOI":"10.1145\/948109.948144"},{"issue":"7553","key":"8_CR17","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/TKDE.2015.2505284","volume":"28","author":"L Yen-Cheng","year":"2016","unstructured":"Yen-Cheng, L., Chen, F., Wang, Y., Chang-Tien, L.: Discovering anomalies on mixed-type data using a generalized student-t based approach. IEEE Trans. Knowl. Data Eng. 28, 858\u2013872 (2016). doi:10.1109\/TKDE.2016.2583429","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Lu, Y.-C., Chen, F., Wang, Y., Lu, C.-T.: Discovering anomalies on mixed-type data using a generalized student-t based approach (2016)","DOI":"10.1109\/TKDE.2016.2583429"},{"key":"8_CR20","first-page":"139","volume":"2","author":"LM Manevitz","year":"2001","unstructured":"Manevitz, L.M., Yousef, M.: One-class SVMs for document classification. J. Mach. Learn. Res. 2, 139\u2013154 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"8_CR21","unstructured":"McLachlan, G.J., Basford, K.E.: Mixture models. inference, applications to clustering. Statistics: Textbooks and Monographs, New York: Dekker, 1988, 1 (1988)"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-37453-1_11","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"TD Nguyen","year":"2013","unstructured":"Nguyen, T.D., Tran, T., Phung, D., Venkatesh, S.: Latent patient profile modelling and applications with mixed-variate restricted boltzmann machine. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS (LNAI), vol. 7818, pp. 123\u2013135. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-37453-1_11"},{"key":"8_CR23","unstructured":"Nguyen, T.D., Tran, T., Phung, D., Venkatesh, S.: Learning sparse latent representation and distance metric for image retrieval. In: Proceedings of IEEE International Conference on Multimedia & Expo, California, USA, July 15\u201319 2013"},{"key":"8_CR24","unstructured":"Otey, M.E.: Srinivasan Parthasarathy, and Amol Ghoting. Fast lightweight outlier detection in mixed-attribute data. Techincal Report, OSU-CISRC-6\/05-TR43 (2005)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Papadimitriou, S., Kitagawa, H., Gibbons, P.B., Faloutsos, C.: Loci: Fast outlier detection using the local correlation integral. In: 19th International Conference on Data Engineering, Proceedings, pp. 315\u2013326. IEEE (2003)","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"8_CR26","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001. Citeseer (2001)"},{"issue":"7","key":"8_CR27","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1016\/j.ijar.2008.11.006","volume":"50","author":"R Salakhutdinov","year":"2009","unstructured":"Salakhutdinov, R., Hinton, G.: Semantic hashing. Int. J. Approximate Reasoning 50(7), 969\u2013978 (2009)","journal-title":"Int. J. Approximate Reasoning"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.stamet.2013.08.004","volume":"20","author":"R Serfling","year":"2014","unstructured":"Serfling, R., Wang, S.: General foundations for studying masking and swamping robustness of outlier identifiers. Stat. Methodol. 20, 79\u201390 (2014)","journal-title":"Stat. Methodol."},{"issue":"3","key":"8_CR29","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1111\/1467-9868.00196","volume":"61","author":"ME Tipping","year":"1999","unstructured":"Tipping, M.E., Bishop, C.M.: Probabilistic principal component analysis. J. Royal Stat. Soc. Ser. B 61(3), 611\u2013622 (1999)","journal-title":"J. Royal Stat. Soc. Ser. B"},{"key":"8_CR30","unstructured":"Tran, T., Phung, D., Venkatesh, S., Machines, T.B.: Learning from Multiple Inequalities. In: International Conference on Machine Learning (ICML), Atlanta, USA, June 16\u201321 2013"},{"key":"8_CR31","unstructured":"Tran, T., Phung, D.Q., Venkatesh, S.: Mixed-variate restricted Boltzmann machines. In: Proceedings of 3rd Asian Conference on Machine Learning (ACML), Taoyuan, Taiwan (2011)"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Tran, T., Phung, D., Luo, W., Harvey, R., Berk, M., Venkatesh, S.: An integrated framework for suicide risk prediction. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1410\u20131418. ACM (2013)","DOI":"10.1145\/2487575.2488196"},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-17432-2_13","volume-title":"AI 2010: Advances in Artificial Intelligence","author":"K Zhang","year":"2010","unstructured":"Zhang, K., Jin, H.: An effective pattern based outlier detection approach for mixed attribute data. In: Li, J. (ed.) AI 2010. LNCS (LNAI), vol. 6464, pp. 122\u2013131. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-17432-2_13"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49586-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T12:01:01Z","timestamp":1749729661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-49586-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319495859","9783319495866"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49586-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"13 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cs.adelaide.edu.au\/~adma2016\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}