{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T17:10:54Z","timestamp":1758474654482},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,6,12]],"date-time":"2012-06-12T00:00:00Z","timestamp":1339459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s10115-012-0509-6","type":"journal-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T11:22:49Z","timestamp":1339413769000},"page":"33-59","source":"Crossref","is-referenced-by-count":4,"title":["Detection of cross-channel anomalies"],"prefix":"10.1007","volume":"35","author":[{"given":"Duc-Son","family":"Pham","sequence":"first","affiliation":[]},{"given":"Budhaditya","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Dinh Q.","family":"Phung","sequence":"additional","affiliation":[]},{"given":"Svetha","family":"Venkatesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,12]]},"reference":[{"key":"509_CR1","doi-asserted-by":"crossref","unstructured":"Adams B, Phung D, Venkatesh S (2009) Social reader: following social networks in the wilds of the blogosphere. In: Proceedings of the first SIGMM workshop on Social media, pp 73\u201380","DOI":"10.1145\/1631144.1631159"},{"issue":"1","key":"509_CR2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10115-006-0036-4","volume":"11","author":"D Agarwal","year":"2007","unstructured":"Agarwal D (2007) Detecting anomalies in cross-classified streams: a bayesian approach. Knowl Inf Syst 11(1): 29\u201344","journal-title":"Knowl Inf Syst"},{"key":"509_CR3","volume-title":"Topic detection and tracking: event-based information organization","year":"2002","unstructured":"Allan, J (eds) (2002) Topic detection and tracking: event-based information organization. Kluwer, Boston"},{"key":"509_CR4","doi-asserted-by":"crossref","unstructured":"Allan J, Papka R, Lavrenko V (1998) On-line new event detection and tracking. In: Proceedings of the 21st ACM SIGIR, pp 37\u201345","DOI":"10.1145\/290941.290954"},{"key":"509_CR5","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MY (2003) Latent Dirichlet\u00a0allocation. J Mach Learn Res 3: 993\u20131022","journal-title":"J Mach Learn Res"},{"key":"509_CR6","doi-asserted-by":"crossref","unstructured":"Brants T, Chen F, Farahat A (2003) A system for new event detection. In: Proceedings of the 26th ACM SIGIR, pp 330\u2013337","DOI":"10.1145\/860435.860495"},{"key":"509_CR7","doi-asserted-by":"crossref","unstructured":"Budhaditya S, Pham DS, Lazarescu M, Venkatesh S (2009) Effective anomaly detection in sensor networks data streams. In: IEEE Proceedings of the ICDM, pp 722\u2013727","DOI":"10.1109\/ICDM.2009.110"},{"issue":"3","key":"509_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3): 1\u201358","journal-title":"ACM Comput Surv"},{"key":"509_CR9","doi-asserted-by":"crossref","unstructured":"Chandola V, Mithal V, Kumar V (2008) Comparative evaluation of anomaly detection techniques for sequence data. In: IEEE Proceedings of the ICDM, pp 743\u2013748","DOI":"10.1109\/ICDM.2008.151"},{"issue":"8","key":"509_CR10","doi-asserted-by":"crossref","first-page":"1016","DOI":"10.1109\/TKDE.2007.1040","volume":"19","author":"K-Y Chen","year":"2007","unstructured":"Chen K-Y, Luesukprasert L, Chou ST (2007) Hot topic extraction based on timeline analysis and multidimensional sentence modeling. IEEE Trans Knowl Data Eng 19(8): 1016\u20131025","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"509_CR11","doi-asserted-by":"crossref","unstructured":"de Vries T, Chawla S, Houle ME (2011) Density-preserving projections for large-scale local anomaly detection. Knowl Inf Syst 1\u201328. doi: 10.1007\/s10115-011-0430-4","DOI":"10.1007\/s10115-011-0430-4"},{"issue":"6","key":"509_CR12","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6): 391\u2013407","journal-title":"J Am Soc Inf Sci"},{"key":"509_CR13","unstructured":"Dereszynski EW, Dietterich TG (2007) Probabilistic models for anomaly detection in remote sensor data streams. In: 23rd Conference on UAI. Citeseer"},{"key":"509_CR14","unstructured":"Eisenhardt M, Muller W, Henrich A (2003) Classifying documents by distributed p2p clustering. In: Informatik 2003: innovative information technology uses"},{"key":"509_CR15","doi-asserted-by":"crossref","unstructured":"Fu Q, Lou JG, Wang Y, Li J,(2009) Execution anomaly detection in distributed systems through unstructured log analysis. In: IEEE Proceedings of the ICDM, pp 149\u2013158","DOI":"10.1109\/ICDM.2009.60"},{"key":"509_CR16","doi-asserted-by":"crossref","unstructured":"Fu Y, Cao L, Guo G, Huang TS (2008) Multiple feature fusion by subspace learning. In: Proceedings of the international conference on content-based image and video retrieval, ACM, pp 127\u2013134","DOI":"10.1145\/1386352.1386373"},{"key":"509_CR17","doi-asserted-by":"crossref","unstructured":"Hammouda K, Kamel M (2006) Collaborative document clustering. In: Proceedings of the SDM, Citeseer, pp 453\u2013463","DOI":"10.1137\/1.9781611972764.40"},{"issue":"3","key":"509_CR18","doi-asserted-by":"crossref","first-page":"231","DOI":"10.2307\/2987989","volume":"31","author":"AG Hawkes","year":"1982","unstructured":"Hawkes AG (1982) Approximating the normal tail. The Statistican 31(3): 231\u2013236","journal-title":"The Statistican"},{"issue":"2","key":"509_CR19","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10115-010-0283-2","volume":"26","author":"S Hido","year":"2011","unstructured":"Hido S, Tsuboi Y, Kashima H, Sugiyama M, Kanamori T (2011) Statistical outlier detection using direct density ratio estimation. Knowl Inf Syst 26(2): 309\u2013336","journal-title":"Knowl Inf Syst"},{"key":"509_CR20","doi-asserted-by":"crossref","unstructured":"Hofmann T (1999) Probabilistic latent semantic indexing. In: Proceedings of the 22nd ACM SIGIR, pp 50\u201357","DOI":"10.1145\/312624.312649"},{"key":"509_CR21","first-page":"617","volume":"19","author":"L Huang","year":"2007","unstructured":"Huang L, Nguyen XL, Garofalakis M, Jordan MI, Joseph A, Taft N (2007) In-network PCA and anomaly detection. NIPS 19:617","journal-title":"NIPS"},{"issue":"2","key":"509_CR22","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1214\/aos\/1009210544","volume":"29","author":"IM Johnstone","year":"2001","unstructured":"Johnstone IM (2001) On the distribution of the largest eigenvalue in principal component analysis. Ann Stat 29(2): 295\u2013327","journal-title":"Ann Stat"},{"key":"509_CR23","doi-asserted-by":"crossref","first-page":"2315","DOI":"10.1016\/j.patcog.2009.12.018","volume":"43","author":"R Kashef","year":"2010","unstructured":"Kashef R, Kamel MS (2010) Cooperative clustering. Pattern Recogn 43: 2315\u20132329","journal-title":"Pattern Recogn"},{"key":"509_CR24","unstructured":"Keogh E, Lin J, Fu A (2005) Hot sax: efficiently finding the most unusual time series subsequence. In: IEEE Proceedings of the ICDM, 8\u00a0pp"},{"issue":"4","key":"509_CR25","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1023\/A:1024940629314","volume":"7","author":"J Kleinberg","year":"2003","unstructured":"Kleinberg J (2003) Bursty and hierarchical structure in streams. Data Min Knowl Discov 7(4): 373\u2013397","journal-title":"Data Min Knowl Discov"},{"issue":"4","key":"509_CR26","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/1030194.1015492","volume":"34","author":"A Lakhina","year":"2004","unstructured":"Lakhina A, Crovella M, Diot C (2004) Diagnosing network-wide traffic anomalies. ACM SIGCOMM 34(4): 219\u2013230","journal-title":"ACM SIGCOMM"},{"key":"509_CR27","doi-asserted-by":"crossref","unstructured":"Li Z, Wang W, Li M, Ma WY (2005) A probabilistic model for retrospective news event detection. In: Proceedings of the 28th ACM SIGIR, pp 106\u2013113","DOI":"10.1145\/1076034.1076055"},{"issue":"1","key":"509_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-009-0267-2","volume":"26","author":"H Liu","year":"2011","unstructured":"Liu H, Lin Y, Han J (2011) Methods for mining frequent items in data streams: an overview. Knowl Inf Syst 26(1): 1\u201330","journal-title":"Knowl Inf Syst"},{"key":"509_CR29","first-page":"139","volume":"2","author":"LM Manevitz","year":"2002","unstructured":"Manevitz LM, Yousef M (2002) One-class svms for document classification. J Mach Learn Res 2: 139\u2013154","journal-title":"J Mach Learn Res"},{"key":"509_CR30","doi-asserted-by":"crossref","unstructured":"Min K, Zhang Z, Wright J, Ma Y (2010) Decomposing background topics from keywords by principal component pursuit. In: Proceedings of the 19th ACM CIKM, pp 269\u2013278","DOI":"10.1145\/1871437.1871475"},{"key":"509_CR31","unstructured":"Moerchen F, Brinker K, Neubauer C (2007) Any-time clustering of high frequency news streams. In: DMCS Workshop, 13th ACM SIGKDD"},{"key":"509_CR32","doi-asserted-by":"crossref","unstructured":"Panov P, D\u017eeroski S (2007) Combining bagging and random subspaces to create better ensembles. In: Proceedings of the 7th international conference on intelligent data analysis. Springer, New York, pp 118\u2013129","DOI":"10.1007\/978-3-540-74825-0_11"},{"key":"509_CR33","unstructured":"Papadimitriou S, Sun J, Faloutsos C (2005) Streaming pattern discovery in multiple time-series. In: Proceedings of the 31st international conference on Very large data bases. VLDB Endowment, pp 697\u2013708"},{"key":"509_CR34","doi-asserted-by":"crossref","unstructured":"Pham D-S, Saha B, Phung D, Venkatesh S (2011) Detection of cross-channel anomalies from multiple data channels. In: IEEE Proceedings of the ICDM","DOI":"10.1109\/ICDM.2011.51"},{"key":"509_CR35","doi-asserted-by":"crossref","unstructured":"Srivastava AN, Zane-Ulman B (2005) Discovering recurring anomalies in text reports regarding complex space systems. In: Proceedings of the IEEE Aerospace Conference","DOI":"10.1109\/AERO.2005.1559692"},{"key":"509_CR36","doi-asserted-by":"crossref","unstructured":"Sun B, Mitra P, Giles CL, Yen J, Zha H (2007) Topic segmentation with shared topic detection and alignment of multiple documents. In: Proceedings of the 30th ACM SIGIR, pp 199\u2013206","DOI":"10.1145\/1277741.1277778"},{"key":"509_CR37","doi-asserted-by":"crossref","unstructured":"Sun J, Qu H, Chakrabarti D, Faloutsos C (2005) Neighborhood formation and anomaly detection in bipartite graphs. In: IEEE Proceedings of the ICDM, 8\u00a0pp","DOI":"10.1145\/1117454.1117461"},{"key":"509_CR38","unstructured":"Vershynin R (2010) Introduction to the non-asymptotic analysis of random matrices, Arxiv preprint arxiv:1011.3027, 2010 (available at http:\/\/arxiv.org\/abs\/1011.3027 )"},{"key":"509_CR39","doi-asserted-by":"crossref","unstructured":"Wang B, Tang J, Fan W, Chen S, Tan C, Yang Z (2012) Query-dependent cross-domain ranking in heterogeneous network. Knowl Inf Syst 1\u201337. doi: 10.1007\/s10115-011-0472-7","DOI":"10.1007\/s10115-011-0472-7"},{"key":"509_CR40","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang K, Jin X, Shen D (2009) Mining common topics from multiple asynchronous text streams. In: Proceedings of the 2nd WSDM, pp 192\u2013201","DOI":"10.1145\/1498759.1498826"},{"key":"509_CR41","doi-asserted-by":"crossref","unstructured":"Wang X, Zhai C, Hu X, Sproat R (2007) Mining correlated bursty topic patterns from coordinated text streams. In: Proceedings of the 13th ACM SIGKDD, pp 784\u2013793","DOI":"10.1145\/1281192.1281276"},{"key":"509_CR42","doi-asserted-by":"crossref","unstructured":"Yang Y, Pierce T, Carbonell J (1998) A study of retrospective and on-line event detection. In: Proceedings of the 21st ACM SIGIR, pp 28\u201336","DOI":"10.1145\/290941.290953"},{"key":"509_CR43","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19406-1","volume-title":"Kernel-based data fusion for machine learning: methods and applications in bioinformatics and text mining, vol 345","author":"S Yu","year":"2011","unstructured":"Yu S, Tranchevent LC, Moor B, Moreau Y (2011) Kernel-based data fusion for machine learning: methods and applications in bioinformatics and text mining, vol 345. Springer, Berlin"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-012-0509-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-012-0509-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-012-0509-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T08:54:29Z","timestamp":1642409669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-012-0509-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,12]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["509"],"URL":"https:\/\/doi.org\/10.1007\/s10115-012-0509-6","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,12]]}}}