{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T03:30:41Z","timestamp":1676431841555},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,11,10]],"date-time":"2010-11-10T00:00:00Z","timestamp":1289347200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s10115-010-0347-3","type":"journal-article","created":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T08:05:28Z","timestamp":1289289928000},"page":"565-596","source":"Crossref","is-referenced-by-count":6,"title":["Class separation through variance: a new application of outlier detection"],"prefix":"10.1007","volume":"29","author":[{"given":"Andrew","family":"Foss","sequence":"first","affiliation":[]},{"given":"Osmar R.","family":"Za\u00efane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,10]]},"reference":[{"key":"347_CR1","unstructured":"ACM (1999) ACM KDD cup \u201999 results. http:\/\/www.sigkdd.org\/kddcup\/"},{"key":"347_CR2","unstructured":"Aggarwal CC, Yu PS (2001) Outlier detection for high dimensional data. In: Proceedings of ACM SIGMOD international conference on management of data, pp 37\u201346"},{"issue":"2","key":"347_CR3","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s00778-004-0125-5","volume":"14","author":"CC Aggarwal","year":"2005","unstructured":"Aggarwal CC, Yu PS (2005) An efficient and effective algorithm for high-dimensional outlier detection. VLDB J 14(2): 211\u2013221","journal-title":"VLDB J"},{"key":"347_CR4","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/11766247_40","volume":"4013","author":"ML Ali","year":"2006","unstructured":"Ali ML, Rueda L, Herrera M (2006) On the performance of chernoff-distance-based linear dimensionality reduction techniques. Adv Artif Intell 4013: 467\u2013478","journal-title":"Adv Artif Intell"},{"key":"347_CR5","doi-asserted-by":"crossref","unstructured":"Bay SD, Schwabacher M (2003) Mining distance-based outliers in near linear time randomization and a simple pruning rule. In: Proceedings of SIGKDD","DOI":"10.1145\/956755.956758"},{"key":"347_CR6","doi-asserted-by":"crossref","DOI":"10.1515\/9781400874668","volume-title":"Adaptive control processes: a guided tour","author":"R Bellman","year":"1961","unstructured":"Bellman R (1961) Adaptive control processes: a guided tour. Princeton University Press, Princeton"},{"key":"347_CR7","doi-asserted-by":"crossref","unstructured":"Beyer K, Goldstein J, Ramakrishnan R, Shaft U (1999) When is nearest neighbor meaningful. In: International conference on database theory, pp 217\u2013235","DOI":"10.1007\/3-540-49257-7_15"},{"key":"347_CR8","unstructured":"Blake CL, Merz CJ (1998) UCI repository of machine learning databases. http:\/\/archive.ics.uci.edu\/ml\/"},{"key":"347_CR9","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: Identifying density-based local outliers. In: Proceedings of SIGMOD conference, pp 93\u2013104","DOI":"10.1145\/335191.335388"},{"key":"347_CR10","doi-asserted-by":"crossref","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3)","DOI":"10.1145\/1541880.1541882"},{"key":"347_CR11","unstructured":"Donoho D (2000) High-dimensional data analysis: the curses and blessings of dimensionality. In: Proceedings of the American Mathematical Society conference on mathematical challenges of the 21st century"},{"key":"347_CR12","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511581274","volume-title":"Concentration of measure for the analysis of randomised algorithms","author":"DP Dubhashi","year":"2009","unstructured":"Dubhashi DP, Panconesi A (2009) Concentration of measure for the analysis of randomised algorithms. Cambridge University Press, Cambridge"},{"key":"347_CR13","doi-asserted-by":"crossref","unstructured":"Eggermont J, Kok JN, Kosters WA (2004) Genetic programming for data classification: partitioning the search space. In: Proceedings of the 2004 symposium on applied computing (ACM SAC64). ACM, pp 1001\u20131005","DOI":"10.1145\/967900.968104"},{"issue":"1","key":"347_CR14","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10115-008-0145-3","volume":"19","author":"H Fan","year":"2009","unstructured":"Fan H, Zaiane OR, Foss A, Wu J (2009) Resolution-based outlier factor: detecting the top-n most outlying data points in engineering data. Knowl Inf Syst 19(1): 31\u201351","journal-title":"Knowl Inf Syst"},{"key":"347_CR15","doi-asserted-by":"crossref","unstructured":"Foss A, Za\u00efane OR (2002) A parameterless method for efficiently discovering clusters of arbitrary shape in large datasets. In: Proceedings of the IEEE international conference on data mining (ICDM\u201902), pp 179\u2013186","DOI":"10.1109\/ICDM.2002.1183901"},{"key":"347_CR16","doi-asserted-by":"crossref","unstructured":"Foss A, Za\u00efane OR, Zilles S (2009) Unsupervised class separation of multivariate data through cumulative variance-based ranking. In: Proceedings of the IEEE international conference on data mining (ICDM\u201909), pp 139\u2013148","DOI":"10.1109\/ICDM.2009.17"},{"key":"347_CR17","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1016\/j.neucom.2005.05.015","volume":"69","author":"S Harmeling","year":"2006","unstructured":"Harmeling S, Dornhege G, Tax D, Meinecke F, M\u00fcller K-R (2006) From outliers to prototypes: ordering data. Neurocomputing 69: 1608\u20131618","journal-title":"Neurocomputing"},{"key":"347_CR18","unstructured":"He Z, Xu X, Deng S (2005) A unified subspace outlier ensemble framework for outlier detection in high dimensional spaces. In: Proceedings of the 6th international conference, WAIM 2005, pp 632\u2013637"},{"key":"347_CR19","doi-asserted-by":"crossref","unstructured":"Hido S, Tsuboi Y, Kashima H, Sugiyama M, Kanamori T (2009) Statistical outlier detection using direct density ratio estimation. Knowl Inf Syst (online first)","DOI":"10.1109\/ICDM.2008.49"},{"issue":"2","key":"347_CR20","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10115-008-0137-3","volume":"18","author":"X Jiang","year":"2009","unstructured":"Jiang X, Zhu X (2009) vEye: behavioral footprinting for self-propagating worm detection and profiling. Knowl Inf Syst 18(2): 231\u2013262","journal-title":"Knowl Inf Syst"},{"key":"347_CR21","doi-asserted-by":"crossref","unstructured":"Jiang Y, Zhou Z-H (2004) Editing training data for kNN classifiers with neural network ensemble. In: Lecture Notes in Computer Science, vol 3173","DOI":"10.1007\/978-3-540-28647-9_60"},{"key":"347_CR22","doi-asserted-by":"crossref","unstructured":"Kim H, Park SH (2004) Data Reduction in support vector machines by a kernelized ionic interaction model. In: Proceedings of SDM","DOI":"10.1137\/1.9781611972740.56"},{"key":"347_CR23","unstructured":"Knorr EM, Ng RT (1999) Finding intensional knowledge of distance-based outliers. In: Proceedings of VLDB conference, pp 211\u2013222"},{"key":"347_CR24","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/S0933-3657(01)00082-3","volume":"23","author":"LA Kurgan","year":"2001","unstructured":"Kurgan LA, Cios KJ, Tadeusiewicz R, Ogiela MR, Goodenday LS (2001) Knowledge discovery approach to automated cardiac SPECT diagnosis. Artif Intell Med 23: 149","journal-title":"Artif Intell Med"},{"key":"347_CR25","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Kumar V (2005) Feature bagging for outlier detection. In: Proceedings of ACM SIGKDD, pp 157\u2013166","DOI":"10.1145\/1081870.1081891"},{"key":"347_CR26","unstructured":"Ledoux M (2001) The concentration of measure phenomenon, vol 89 of Mathematical Surveys and Monographs. AMS"},{"issue":"4","key":"347_CR27","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1007\/s10115-005-0195-8","volume":"8","author":"X Li","year":"2005","unstructured":"Li X, Ye N (2005) A supervised clustering algorithm for computer intrusion detection. Knowl Inf Syst 8(4): 498\u2013509","journal-title":"Knowl Inf Syst"},{"key":"347_CR28","first-page":"273","volume":"157","author":"V Milman","year":"1988","unstructured":"Milman V (1988) The heritage of P levy in geometrical functional-analysis. Asterisque 157: 273\u2013301","journal-title":"Asterisque"},{"issue":"4","key":"347_CR29","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1023\/A:1024974810270","volume":"29","author":"MI Petrovskiy","year":"2003","unstructured":"Petrovskiy MI (2003) Outlier detection algorithms in data mining systems. Program Comput Softw 29(4): 228\u2013237","journal-title":"Program Comput Softw"},{"key":"347_CR30","volume-title":"Multimedia data mining and knowledge discovery","year":"2007","unstructured":"Petrushin, VA, Khan, L (eds) (2007) Multimedia data mining and knowledge discovery. Springer, Berlin"},{"issue":"3","key":"347_CR31","doi-asserted-by":"crossref","first-page":"212","DOI":"10.2307\/1270566","volume":"41","author":"PJ Rousseeuw","year":"1999","unstructured":"Rousseeuw PJ, Van Driessen K (1999) A fast algorithm for the minimum covariance determinant estimator. Technometrics 41(3): 212\u2013223","journal-title":"Technometrics"},{"issue":"6","key":"347_CR32","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/TPAMI.2006.126","volume":"28","author":"H Wang","year":"2006","unstructured":"Wang H (2006) Nearest neighbors by neighborhood counting. IEEE Trans Pattern Anal Mach Intell 28(6): 942\u2013953","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"347_CR33","doi-asserted-by":"crossref","unstructured":"Zadrozny B, Elkan C (2002) Transforming classifier scores into accurate multiclass probability estimates. In: Proceedings of KDD 02","DOI":"10.1145\/775047.775151"},{"key":"347_CR34","doi-asserted-by":"crossref","unstructured":"Zafra A, Ventura S (2007) Multi-objective genetic programming for multiple instance learning. In: Lecture Notes in Computer Science, Machine Learning: ECML\u201907","DOI":"10.1007\/978-3-540-74958-5_81"},{"issue":"3","key":"347_CR35","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s10115-006-0020-z","volume":"10","author":"J Zhang","year":"2006","unstructured":"Zhang J, Wang H (2006) Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance. Knowl Inf Syst 10(3): 333\u2013355","journal-title":"Knowl Inf Syst"},{"key":"347_CR36","doi-asserted-by":"crossref","unstructured":"Zhou Z-H, Li M (2009) Semi-supervised learning by disagreement. Knowl Inf Syst (online first)","DOI":"10.1109\/GRC.2008.4664785"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-010-0347-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-010-0347-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-010-0347-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T00:32:53Z","timestamp":1559781173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-010-0347-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,10]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["347"],"URL":"https:\/\/doi.org\/10.1007\/s10115-010-0347-3","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,10]]}}}