{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:40:10Z","timestamp":1743097210387,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642302169"},{"type":"electronic","value":"9783642302176"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30217-6_35","type":"book-chapter","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T10:14:58Z","timestamp":1336558498000},"page":"418-430","source":"Crossref","is-referenced-by-count":4,"title":["Unsupervised Ensemble Learning for Mining Top-n Outliers"],"prefix":"10.1007","author":[{"given":"Jun","family":"Gao","sequence":"first","affiliation":[]},{"given":"Weiming","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhongfei(Mark)","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ou","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D. Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers. Chapman and Hall, London (1980)"},{"issue":"1","key":"35_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/biomet\/57.1.97","volume":"57","author":"W.K. Hastings","year":"1970","unstructured":"Hastings, W.K.: Monte Carlo sampling methods using Markov chains and their applications. Journal of Biometrika\u00a057(1), 97\u2013109 (1970)","journal-title":"Journal of Biometrika"},{"issue":"3-4","key":"35_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"E.M. Knorr","year":"2000","unstructured":"Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications. Journal of VLDB\u00a08(3-4), 237\u2013253 (2000)","journal-title":"Journal of VLDB"},{"issue":"3","key":"35_CR4","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. Journal of ACM Computing Surveys (CSUR)\u00a031(3), 264\u2013323 (1999)","journal-title":"Journal of ACM Computing Surveys (CSUR)"},{"key":"35_CR5","volume-title":"Outliers in Statistic Data","author":"V. Barnett","year":"1994","unstructured":"Barnett, V., Lewis, T.: Outliers in Statistic Data. John Wiley, New York (1994)"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: Lof: Identifying density-based local outliers. In: SIGMOD, pp. 93\u2013104 (2000)","DOI":"10.1145\/335191.335388"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Papadimitriou, S., Kitagawa, H., Gibbons, P.: Loci: Fast outlier detection using the local correlation integral. In: ICDE, pp. 315\u2013326 (2003)","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Yang, J., Zhong, N., Yao, Y., Wang, J.: Local peculiarity factor and its application in outlier detection. In: KDD, pp. 776\u2013784 (2008)","DOI":"10.1145\/1401890.1401983"},{"key":"35_CR9","series-title":"LNCS(LNAI)","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-20847-8_23","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J. Gao","year":"2011","unstructured":"Gao, J., Hu, W., Zhang, Z(M.), Zhang, X., Wu, O.: RKOF: Robust Kernel-Based Local Outlier Detection. In: Huang, J.Z., Cao, L., Srivastava, J. (eds.) PAKDD 2011, Part II. LNCS(LNAI), vol.\u00a06635, pp. 270\u2013283. Springer, Heidelberg (2011)"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Abe, N., Zadrozny, B., Langford, J.: Outlier detection by active learning. In: KDD, pp. 504\u2013509 (2006)","DOI":"10.1145\/1150402.1150459"},{"issue":"1","key":"35_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random Forests. J. Machine Learning\u00a045(1), 5\u201332 (2001)","journal-title":"J. Machine Learning"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Fox, E., Shaw, J.: Combination of multiple searches. In: The Second Text REtrieval Conference (TREC-2), pp. 243\u2013252 (1994)","DOI":"10.6028\/NIST.SP.500-225.vpi"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Kumar, V.: Feature bagging for outlier detection. In: KDD, pp. 157\u2013166 (2005)","DOI":"10.1145\/1081870.1081891"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Gao, J., Tan, P.N.: Converting output scores from outlier detection algorithms into probability estimates. In: ICDM, pp. 212\u2013221 (2006)","DOI":"10.1109\/ICDM.2006.43"},{"key":"35_CR15","first-page":"368","volume":"1","author":"H. Nguyen","year":"2010","unstructured":"Nguyen, H., Ang, H., Gopalkrishnan, V.: Mining outliers with ensemble of heterogeneous detectors on random subspaces. Journal of DASFAA\u00a01, 368\u2013383 (2010)","journal-title":"Journal of DASFAA"},{"issue":"1\/2","key":"35_CR16","doi-asserted-by":"publisher","first-page":"114","DOI":"10.2307\/2333244","volume":"44","author":"C. Mallows","year":"1957","unstructured":"Mallows, C.: Non-null ranking models. I. J. Biometrika\u00a044(1\/2), 114\u2013130 (1957)","journal-title":"I. J. Biometrika"},{"key":"35_CR17","unstructured":"Lebanon, G., Lafferty, J.: Cranking: Combining rankings using conditional probability models on permutations. In: ICML, pp. 363\u2013370 (2002)"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Klementiev, A., Roth, D., Small, K.: Unsupervised rank aggregation with distance-based models. In: ICML, pp. 472\u2013479 (2008)","DOI":"10.1145\/1390156.1390216"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30217-6_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:08:18Z","timestamp":1743095298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30217-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642302169","9783642302176"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30217-6_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}