{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:24:51Z","timestamp":1771457091560,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T00:00:00Z","timestamp":1518393600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s10115-018-1168-z","type":"journal-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T11:02:57Z","timestamp":1518433377000},"page":"413-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Energy-based anomaly detection for mixed data"],"prefix":"10.1007","volume":"57","author":[{"given":"Kien","family":"Do","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6531-8907","authenticated-orcid":false,"given":"Truyen","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Svetha","family":"Venkatesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,12]]},"reference":[{"key":"1168_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Hinneburg A, Keim DA (2001) On the surprising behavior of distance metrics in high dimensional space. In: International conference on database theory, Springer, pp 420\u2013434","DOI":"10.1007\/3-540-44503-X_27"},{"issue":"1","key":"1168_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2830544.2830549","volume":"17","author":"CC Aggarwal","year":"2015","unstructured":"Aggarwal CC, Sathe S (2015) Theoretical foundations and algorithms for outlier ensembles. ACM SIGKDD Explor Newsl 17(1):24\u201347","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"1168_CR3","doi-asserted-by":"crossref","unstructured":"Akoglu L, Tong H, Vreeken J, Faloutsos C (2012) Fast and reliable anomaly detection in categorical data. In: Proceedings of the 21st ACM international conference on information and knowledge management, ACM, pp 415\u2013424","DOI":"10.1145\/2396761.2396816"},{"key":"1168_CR4","doi-asserted-by":"crossref","unstructured":"Angiulli, F, Pizzuti C (2002) Fast outlier detection in high dimensional spaces. In: European conference on principles of data mining and knowledge discovery, Springer, pp 15\u201327","DOI":"10.1007\/3-540-45681-3_2"},{"key":"1168_CR5","doi-asserted-by":"crossref","unstructured":"Becker J, Havens TC, Pinar A, Schulz TJ (2015) Deep belief networks for false alarm rejection in forward-looking ground-penetrating radar. In: SPIE defense+ security, International Society for Optics and Photonics, pp 94540W\u201394540W","DOI":"10.1117\/12.2176855"},{"issue":"8","key":"1168_CR6","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio Y, Courville A, Vincent P (2013) Representation learning: a review and new perspectives. IEEE Trans Pattern Anal Mach Intell 35(8):1798\u20131828","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1168_CR7","doi-asserted-by":"crossref","unstructured":"Bontemps L, McDermott J, Le-Khac NA et\u00a0al (2016) Collective anomaly detection based on long short-term memory recurrent neural networks. In: International conference on future data and security engineering, Springer, pp 141\u2013152","DOI":"10.1007\/978-3-319-48057-2_9"},{"issue":"22","key":"1168_CR8","doi-asserted-by":"publisher","first-page":"8637","DOI":"10.1016\/j.eswa.2015.07.018","volume":"42","author":"M Bouguessa","year":"2015","unstructured":"Bouguessa M (2015) A practical outlier detection approach for mixed-attribute data. Expert Syst Appl 42(22):8637\u20138649","journal-title":"Expert Syst Appl"},{"key":"1168_CR9","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. In: ACM sigmod record, vol\u00a029. ACM, pp 93\u2013104","DOI":"10.1145\/342009.335388"},{"issue":"4","key":"1168_CR10","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1007\/s10618-015-0444-8","volume":"30","author":"GO Campos","year":"2015","unstructured":"Campos GO, Zimek A, Sander J, Campello RJGB, Micenkov\u00e1 B, Schubert E, Assent I, Houle ME (2015) On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min Knowl Discov 30(4):891\u2013927","journal-title":"Data Min Knowl Discov"},{"issue":"3","key":"1168_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1168_CR12","doi-asserted-by":"crossref","unstructured":"Chauhan S, Vig L (2015) Anomaly detection in ECG time signals via deep long short-term memory networks. In: IEEE international conference on data science and advanced analytics (DSAA), 2015. 36678 2015, IEEE, pp 1\u20137","DOI":"10.1109\/DSAA.2015.7344872"},{"key":"1168_CR13","doi-asserted-by":"crossref","unstructured":"Cheng M, Xu Q, Lv J, Liu W, Li Q, Wang J (2016) MS-LSTM: a multi-scale LSTM model for BGP anomaly detection. In: IEEE 24th international conference on network protocols (ICNP), 2016, IEEE, pp 1\u20136","DOI":"10.1109\/ICNP.2016.7785326"},{"key":"1168_CR14","doi-asserted-by":"crossref","unstructured":"Das K, Schneider J, Neill DB (2008) Anomaly pattern detection in categorical datasets. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, pp 169\u2013176","DOI":"10.1145\/1401890.1401915"},{"key":"1168_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/b14571","volume-title":"Analysis of mixed data: methods & applications","author":"AR De Leon","year":"2013","unstructured":"De Leon AR, Chough KC (2013) Analysis of mixed data: methods & applications. CRC Press, Boca Raton"},{"key":"1168_CR16","doi-asserted-by":"crossref","unstructured":"Do K, Tran T, Phung D, Venkatesh S (2016) Outlier detection on mixed-type data: an energy-based approach. In: International conference on advanced data mining and applications (ADMA 2016)","DOI":"10.1007\/978-3-319-49586-6_8"},{"key":"1168_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.neucom.2012.11.050","volume":"122","author":"U Fiore","year":"2013","unstructured":"Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13\u201323","journal-title":"Neurocomputing"},{"key":"1168_CR18","doi-asserted-by":"crossref","unstructured":"Gao N, Gao L, Gao Q, Wang H (2014) An intrusion detection model based on deep belief networks. In: Second international conference on advanced cloud and big data (CBD), 2014, IEEE, pp 247\u2013252","DOI":"10.1109\/CBD.2014.41"},{"key":"1168_CR19","doi-asserted-by":"crossref","unstructured":"Ghoting A, Otey ME, Parthasarathy S (2004) Loaded: link-based outlier and anomaly detection in evolving data sets. In: ICDM, pp 387\u2013390","DOI":"10.1109\/ICDM.2004.10011"},{"key":"1168_CR20","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1162\/089976602760128018","volume":"14","author":"GE Hinton","year":"2002","unstructured":"Hinton GE (2002) Training products of experts by minimizing contrastive divergence. Neural Comput 14:1771\u20131800","journal-title":"Neural Comput"},{"issue":"5786","key":"1168_CR21","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504\u2013507","journal-title":"Science"},{"issue":"5","key":"1168_CR22","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1109\/TNNLS.2016.2526063","volume":"28","author":"D Ienco","year":"2016","unstructured":"Ienco D, Pensa RG, Meo R (2016) A semisupervised approach to the detection and characterization of outliers in categorical data. IEEE Trans Neural Netw Learn Syst 28(5):1017\u20131029","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"6","key":"1168_CR23","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1109\/TPAMI.2014.2362140","volume":"37","author":"H Kamyshanska","year":"2015","unstructured":"Kamyshanska H, Memisevic R (2015) The potential energy of an autoencoder. IEEE Trans Pattern Anal Mach Intell 37(6):1261\u20131273","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1168_CR24","unstructured":"Kingma D, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"issue":"2","key":"1168_CR25","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10618-009-0148-z","volume":"20","author":"A Koufakou","year":"2010","unstructured":"Koufakou A, Georgiopoulos M (2010) A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes. Data Min Knowl Discov 20(2):259\u2013289","journal-title":"Data Min Knowl Discov"},{"key":"1168_CR26","unstructured":"Koufakou A, Georgiopoulos M, Anagnostopoulos GC (2008) Detecting outliers in high-dimensional datasets with mixed attributes. In: DMIN, Citeseer, pp 427\u2013433"},{"issue":"7553","key":"1168_CR27","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"1168_CR28","doi-asserted-by":"publisher","unstructured":"Lu YC, Feng C, Yating W, Lu CT (2016) Discovering anomalies on mixed-type data using a generalized student-t based approach. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/TKDE.2016.2583429","DOI":"10.1109\/TKDE.2016.2583429"},{"key":"1168_CR29","unstructured":"Malhotra P, Vig L, Shroff G, Agarwal P (2015) Long short term memory networks for anomaly detection in time series. In: Proceedings of ESANN, Presses universitaires de Louvain, pp 89\u201394"},{"key":"1168_CR30","unstructured":"Mehta P, Schwab DJ (2014) An exact mapping between the variational renormalization group and deep learning. arXiv preprint arXiv:1410.3831"},{"key":"1168_CR31","doi-asserted-by":"crossref","unstructured":"Nguyen TD, Tran T, Phung D, Venkatesh S (2013) Latent patient profile modelling and applications with mixed-variaterestricted Boltzmann machine. In: Proceedings of Pacific-Asia conference on knowledge discovery and datamining (PAKDD), Gold Coast, Queensland, Australia","DOI":"10.1007\/978-3-642-37453-1_11"},{"key":"1168_CR32","unstructured":"Nguyen TD, Tran T, Phung D, Venkatesh S (2013) Learning sparse latent representation and distance metric for image retrieval. In: Proceedings of IEEE international conference on multimedia & expo, California, USA, July 15\u201319"},{"key":"1168_CR33","unstructured":"Otey ME, Parthasarathy S, Ghoting A (2005) Fast lightweight outlier detection in mixed-attribute data. Techincal report, OSU\u2013CISRC\u20136\/05\u2013TR43"},{"key":"1168_CR34","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.dss.2014.08.006","volume":"67","author":"HT Pai","year":"2014","unstructured":"Pai HT, Wu F, Hsueh PYSS (2014) A relative patterns discovery for enhancing outlier detection in categorical data. Dec Support Syst 67:90\u201399","journal-title":"Dec Support Syst"},{"key":"1168_CR35","doi-asserted-by":"crossref","unstructured":"Papadimitriou S, Kitagawa H, Gibbons PB, Faloutsos C (2003) Loci: fast outlier detection using the local correlation integral. In: Proceedings. 19th international conference on data engineering, 2003. IEEE, pp 315\u2013326","DOI":"10.1109\/ICDE.2003.1260802"},{"issue":"7","key":"1168_CR36","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1016\/j.ijar.2008.11.006","volume":"50","author":"R Salakhutdinov","year":"2009","unstructured":"Salakhutdinov R, Hinton G (2009) Semantic hashing. Int J Approx Reas 50(7):969\u2013978","journal-title":"Int J Approx Reas"},{"key":"1168_CR37","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.stamet.2013.08.004","volume":"20","author":"R Serfling","year":"2014","unstructured":"Serfling R, Wang S (2014) General foundations for studying masking and swamping robustness of outlier identifiers. Statis Methodol 20:79\u201390","journal-title":"Statis Methodol"},{"issue":"5","key":"1168_CR38","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1515\/teme-2014-1006","volume":"81","author":"J Sun","year":"2014","unstructured":"Sun J, Wyss R, Steinecker A, Glocker P (2014) Automated fault detection using deep belief networks for the quality inspection of electromotors. tm-Technisches Messen 81(5):255\u2013263","journal-title":"tm-Technisches Messen"},{"key":"1168_CR39","unstructured":"Tagawa T, Tadokoro Y, Yairi T (2014) Structured denoising autoencoder for fault detection and analysis. In: ACML"},{"issue":"5","key":"1168_CR40","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.3233\/IDA-150764","volume":"19","author":"G Tang","year":"2015","unstructured":"Tang G, Pei J, Bailey J, Dong G (2015) Mining multidimensional contextual outliers from categorical relational data. Intell Data Anal 19(5):1171\u20131192","journal-title":"Intell Data Anal"},{"key":"1168_CR41","doi-asserted-by":"crossref","unstructured":"Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: IEEE international conference on data science and advanced analytics (DSAA), 2016, IEEE, pp 130\u2013139","DOI":"10.1109\/DSAA.2016.20"},{"key":"1168_CR42","unstructured":"Tran N, Jin H (2012) Detecting network anomalies in mixed-attribute data sets. In: Third international conference on knowledge discovery and data mining, 2010. WKDD\u201910, IEEE, pp 383\u2013386"},{"key":"1168_CR43","unstructured":"Tran T, Phung D, Venkatesh S (2013) Thurstonian Boltzmann machines: learning from multiple inequalities. In: International conference on machine learning (ICML), Atlanta, USA, June 16\u201321"},{"key":"1168_CR44","unstructured":"Tran T, Phung DQ, Venkatesh S (2011) Mixed-variate restricted Boltzmann machines. In: Proceedings of 3rd Asian conference on machine learning (ACML), Taoyuan, Taiwan"},{"key":"1168_CR45","unstructured":"Tran T, Luo W, Phung D, Morris J, Rickard K, Venkatesh S (2016) Preterm birth prediction: deriving stable and interpretable rules from high dimensional data. In: Conference on machine learning in healthcare, LA, USA"},{"key":"1168_CR46","unstructured":"Tuor A, Kaplan S, Hutchinson B, Nichols N, Robinson S (2017) Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In: Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security, pp 224\u2013231"},{"key":"1168_CR47","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1002\/sec.1441","volume":"9","author":"Y Wang","year":"2016","unstructured":"Wang Y, Cai W, Wei P (2016) A deep learning approach for detecting malicious JavaScript code. Secur Commun Netw 9:1520\u20131534","journal-title":"Secur Commun Netw"},{"issue":"3","key":"1168_CR48","doi-asserted-by":"publisher","first-page":"7104","DOI":"10.1016\/j.eswa.2008.08.030","volume":"36","author":"M Ye","year":"2009","unstructured":"Ye M, Li X, Orlowska ME (2009) Projected outlier detection in high-dimensional mixed-attributes data set. Expert Syst Appl 36(3):7104\u20137113","journal-title":"Expert Syst Appl"},{"key":"1168_CR49","unstructured":"Zhai S, Cheng Y, Lu W, Zhang Z (2016) Deep structured energy based models for anomaly detection. arXiv preprint arXiv:1605.07717"},{"key":"1168_CR50","doi-asserted-by":"crossref","unstructured":"Zhang K, Jin H (2010) An effective pattern based outlier detection approach for mixed attribute data. In: Australasian joint conference on artificial intelligence, Springer, pp 122\u2013131","DOI":"10.1007\/978-3-642-17432-2_13"},{"issue":"5","key":"1168_CR51","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1002\/sam.11161","volume":"5","author":"A Zimek","year":"2012","unstructured":"Zimek A, Schubert E, Kriegel HP (2012) A survey on unsupervised outlier detection in high-dimensional numerical data. Statis Anal Data Mining 5(5):363\u2013387","journal-title":"Statis Anal Data Mining"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-018-1168-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1168-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1168-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T16:58:57Z","timestamp":1570726737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-018-1168-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,12]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["1168"],"URL":"https:\/\/doi.org\/10.1007\/s10115-018-1168-z","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,12]]},"assertion":[{"value":"28 February 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}