{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T05:48:22Z","timestamp":1747374502593,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811951930"},{"type":"electronic","value":"9789811951947"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-5194-7_23","type":"book-chapter","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T23:03:17Z","timestamp":1660086197000},"page":"310-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CIRS: A Confidence Interval Radius Slope Method for Time Series Points Based on\u00a0Unsupervised Learning"],"prefix":"10.1007","author":[{"given":"Shuya","family":"Lei","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weiwei","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xudong","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaogang","family":"Gong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianping","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yidan","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiansong","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Helin","family":"Jin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shengjian","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,8,10]]},"reference":[{"issue":"12","key":"23_CR1","doi-asserted-by":"publisher","first-page":"1900","DOI":"10.14778\/2824032.2824096","volume":"8","author":"M Bergman","year":"2015","unstructured":"Bergman, M., Milo, T., Novgorodov, S., Tan, W.-C.: QOCO: a query oriented data cleaning system with oracles. Proc. VLDB Endow. 8(12), 1900\u20131903 (2015)","journal-title":"Proc. VLDB Endow."},{"key":"23_CR2","unstructured":"Budalakoti, S., Srivastava, A.N., Akella, R., Turkov, E.: Anomaly detection in large sets of high-dimensional symbol sequences (2006)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Cai, R., Zhang, H., Liu, W., Gao, S., Hao, Z.: Appearance-motion memory consistency network for video anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 2, pp. 938\u2013946 (2021)","DOI":"10.1609\/aaai.v35i2.16177"},{"issue":"2","key":"23_CR4","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1145\/568518.568520","volume":"27","author":"K Chakrabarti","year":"2002","unstructured":"Chakrabarti, K., Keogh, E.J., Mehrotra, S., Pazzani, M.J.: Locally adaptive dimensionality reduction for indexing large time series databases. ACM Trans. Database Syst. 27(2), 188\u2013228 (2002)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"23_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-981-16-5940-9_8","volume-title":"Data Science","author":"X Chen","year":"2021","unstructured":"Chen, X., Wang, H.: Data-driven prediction of foodborne disease pathogens. In: Zeng, J., Qin, P., Jing, W., Song, X., Lu, Z. (eds.) ICPCSEE 2021, Part I. CCIS, vol. 1451, pp. 106\u2013116. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-5940-9_8"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Corain, M., Garza, P., Asudeh, A.: DBSCOUT: a density-based method for scalable outlier detection in very large datasets. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 37\u201348 (2021)","DOI":"10.1109\/ICDE51399.2021.00011"},{"key":"23_CR8","unstructured":"Gogacz, T., Torunczyk, S.: Entropy bounds for conjunctive queries with functional dependencies. In: Benedikt, M., Orsi, G. (eds.) 20th International Conference on Database Theory, ICDT 2017, 21\u201324 March 2017, Venice, Italy. LIPIcs, vol. 68, pp. 15:1\u201315:17. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2017)"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"107267","DOI":"10.1016\/j.knosys.2021.107267","volume":"228","author":"B Kumar","year":"2021","unstructured":"Kumar, B., Sinha, A., Chakrabarti, S., Vyas, O.P.: A fast learning algorithm for one-class slab support vector machines. Knowl. Based Syst. 228, 107267 (2021)","journal-title":"Knowl. Based Syst."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Lee, D., Shin, K.: Robust factorization of real-world tensor streams with patterns, missing values, and outliers. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 840\u2013851 (2021)","DOI":"10.1109\/ICDE51399.2021.00078"},{"key":"23_CR11","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-981-13-2206-8_25","volume-title":"Data Science","author":"D Li","year":"2018","unstructured":"Li, D., Shi, S., Zhang, Y., Wang, H., Luo, J.: an anomaly detection method based on learning of \u201cscores sequence\u2019\u2019. In: Zhou, Q., Miao, Q., Wang, H., Xie, W., Wang, Y., Lu, Z. (eds.) ICPCSEE 2018. CCIS, vol. 902, pp. 296\u2013311. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2206-8_25"},{"issue":"6","key":"23_CR12","doi-asserted-by":"publisher","first-page":"2626","DOI":"10.1109\/TKDE.2020.3014806","volume":"34","author":"F Liu","year":"2022","unstructured":"Liu, F., et al.: Anomaly detection in quasi-periodic time series based on automatic data segmentation and attentional LSTM-CNN. IEEE Trans. Knowl. Data Eng. 34(6), 2626\u20132640 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"12","key":"23_CR13","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1109\/TSMC.2017.2718220","volume":"48","author":"H Liu","year":"2017","unstructured":"Liu, H., Li, X., Li, J., Zhang, S.: Efficient outlier detection for high-dimensional data. IEEE Trans. Syst. Man Cybern.: Syst. 48(12), 2451\u20132461 (2017)","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Lopatenko, A., Bravo, L.: Efficient approximation algorithms for repairing inconsistent databases. In: Chirkova, R., Dogac, A., Tamer \u00d6zsu, M., Sellis, T.K. (eds.) Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, 15\u201320 April 2007, pp. 216\u2013225. IEEE Computer Society (2007)","DOI":"10.1109\/ICDE.2007.367867"},{"issue":"1","key":"23_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3233\/ICA-1999-6106","volume":"6","author":"A Nairac","year":"1999","unstructured":"Nairac, A., Townsend, N.W., Carr, R., King, S., Cowley, P., Tarassenko, L.: A system for the analysis of jet engine vibration data. Integr. Comput. Aided Eng. 6(1), 53\u201366 (1999)","journal-title":"Integr. Comput. Aided Eng."},{"issue":"6","key":"23_CR16","first-page":"2539","volume":"34","author":"Z Peng","year":"2022","unstructured":"Peng, Z., Luo, M., Li, J., Xue, L., Zheng, Q.: A deep multi-view framework for anomaly detection on attributed networks. IEEE Trans. Knowl. Data Eng. 34(6), 2539\u20132552 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Sequeira, K., Zaki, M.J.: ADMIT: anomaly based data mining for intrusions. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 23\u201326 July 2002, Edmonton, Alberta, Canada, pp. 386\u2013395. ACM (2002)","DOI":"10.1145\/775047.775103"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Song, S., Zhang, A., Wang, J., Yu, P.S.: SCREEN: stream data cleaning under speed constraints. In: Sellis, T.K., Davidson, S.B., Ives, Z.G. (eds.) Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, 31 May\u20134 June 2015, pp. 827\u2013841. ACM (2015)","DOI":"10.1145\/2723372.2723730"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Wang, S., Wu, L., Cui, L., Shen, Y.: Glancing at the patch: anomaly localization with global and local feature comparison. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 254\u2013263 (2021)","DOI":"10.1109\/CVPR46437.2021.00032"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Wang, X., Dong, X.L., Meliou, A.: Data X-ray: a diagnostic tool for data errors. In: Sellis, T.K., Davidson, S.B., Ives, Z.G. (eds.) Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, 31 May\u20134 June 2015, pp. 1231\u20131245. ACM (2015)","DOI":"10.1145\/2723372.2750549"},{"key":"23_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-981-15-7981-3_3","volume-title":"Data Science","author":"S Yin","year":"2020","unstructured":"Yin, S., Yi, Y., Wang, H.: Data cleaning about student information based on massive open online course system. In: Zeng, J., Jing, W., Song, X., Lu, Z. (eds.) ICPCSEE 2020, Part I. CCIS, vol. 1257, pp. 33\u201343. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-7981-3_3"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-319-91455-8_10","volume-title":"Database Systems for Advanced Applications","author":"W Yin","year":"2018","unstructured":"Yin, W., Yue, T., Wang, H., Huang, Y., Li, Y.: Time series cleaning under variance constraints. In: Liu, C., Zou, L., Li, J. (eds.) DASFAA 2018. LNCS, vol. 10829, pp. 108\u2013113. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91455-8_10"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, A., Song, S., Wang, J.: Sequential data cleaning: a statistical approach. In: \u00d6zcan, F., Koutrika, G., Madden, S. (eds.) Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, 26 June\u201301 July 2016, pp. 909\u2013924. ACM (2016)","DOI":"10.1145\/2882903.2915233"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/978-3-642-01307-2_84","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"K Zhang","year":"2009","unstructured":"Zhang, K., Hutter, M., Jin, H.: A new local distance-based outlier detection approach for scattered real-world data. In: Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) PAKDD 2009. LNCS (LNAI), vol. 5476, pp. 813\u2013822. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01307-2_84"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-5194-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:17:56Z","timestamp":1710256676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-5194-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811951930","9789811951947"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-5194-7_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"261","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}