{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T04:59:33Z","timestamp":1777611573728,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10479-021-04364-x","type":"journal-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T08:03:42Z","timestamp":1636531422000},"page":"287-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-class Bayesian support vector data description with anomalies"],"prefix":"10.1007","volume":"317","author":[{"given":"Mehmet","family":"Turkoz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sangahn","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,11,10]]},"reference":[{"key":"4364_CR1","doi-asserted-by":"crossref","unstructured":"Aleskerov, E., Freisleben, B. & Rao, B. (1997). Cardwatch: A neural network-based database mining system for credit card fraud detection. In Proceedings of the IEEE\/IAFE 1997 IEEE computational intelligence for financial Engineering (CIFEr (pp. 220\u2013226).","DOI":"10.1109\/CIFER.1997.618940"},{"key":"4364_CR2","doi-asserted-by":"crossref","unstructured":"Amer, M., Goldstein, M. & Abdennadher, S., (2013). Enhancing one-class support vector machines for unsupervised anomaly detection. In Proceedings of the ACM SIGKDD workshop on outlier detection and description ACM (pp. 8\u201315).","DOI":"10.1145\/2500853.2500857"},{"key":"4364_CR3","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1111\/1467-9868.00194","volume":"61","author":"A Azzalini","year":"1999","unstructured":"Azzalini, A., & Capitanio, A. (1999). Statistical applications of the multivariate skew normal distribution. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 61, 579\u2013602.","journal-title":"Journal of the Royal Statistical Society: Series B (Statistical Methodology)"},{"key":"4364_CR4","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1093\/biomet\/83.4.715","volume":"83","author":"A Azzalini","year":"1996","unstructured":"Azzalini, A., & Dalla Valle, A. (1996). The multivariate skew-normal distribution. Biometrika, 83, 715\u2013726.","journal-title":"Biometrika"},{"key":"4364_CR5","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1016\/j.patrec.2009.07.002","volume":"31","author":"F Bovolo","year":"2010","unstructured":"Bovolo, F., Camps-Valls, G., & Bruzzone, L. (2010). A support vector domain method for change detection in multitemporal images. Pattern Recognition Letters, 31, 1148\u20131154.","journal-title":"Pattern Recognition Letters"},{"key":"4364_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41, 15.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"4364_CR7","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar, J. (2006). Statistical comparisons of classifiers over multiple data sets. The Journal of Machine Learning Research, 7, 1\u201330.","journal-title":"The Journal of Machine Learning Research"},{"key":"4364_CR8","first-page":"109","volume":"3","author":"R Duin","year":"2000","unstructured":"Duin, R., Juszczak, P., Paclik, P., Pekalska, E., De Ridder, D., Tax, D., & Verzakov, S. (2000). A matlab toolbox for pattern recognition. Prtools Version, 3, 109\u2013111.","journal-title":"Prtools Version"},{"key":"4364_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S. M., Rajasegarar, S., Karunasekera, S., & Leckie, C. (2016). High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition, 58, 121\u2013134.","journal-title":"Pattern Recognition"},{"key":"4364_CR10","unstructured":"Ghasemi, A., Rabiee, H. R., Manzuri, M. T. & Rohban, M. H. (2016). A bayesian approach to the data description problem. arXiv preprint arXiv:1602.07507"},{"issue":"1","key":"4364_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.patcog.2008.07.003","volume":"42","author":"SM Guo","year":"2009","unstructured":"Guo, S. M., Chen, L. C., & Tsai, J. S. H. (2009). A boundary method for outlier detection based on support vector domain description. Pattern Recognition, 42(1), 77\u201383.","journal-title":"Pattern Recognition"},{"key":"4364_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge, V., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial Intelligence Review, 22, 85\u2013126.","journal-title":"Artificial Intelligence Review"},{"key":"4364_CR13","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.patcog.2010.08.025","volume":"44","author":"G Huang","year":"2011","unstructured":"Huang, G., Chen, H., Zhou, Z., Yin, F., & Guo, K. (2011). Two-class support vector data description. Pattern Recognition, 44, 320\u2013329.","journal-title":"Pattern Recognition"},{"issue":"18","key":"4364_CR14","doi-asserted-by":"publisher","first-page":"5644","DOI":"10.1080\/00207543.2013.793427","volume":"51","author":"JH Kang","year":"2013","unstructured":"Kang, J. H., & Kim, S. B. (2013). A clustering algorithm-based control chart for inhomogeneously distributed TFT-LCD processes. International Journal of Production Research, 51(18), 5644\u20135657.","journal-title":"International Journal of Production Research"},{"key":"4364_CR15","doi-asserted-by":"publisher","first-page":"351","DOI":"10.3233\/IDA-2012-0528","volume":"16","author":"P Kang","year":"2012","unstructured":"Kang, P., & Cho, S. (2012). Support vector class description (SVCD): Classification in kernel space. Intelligent Data Analysis, 16, 351\u2013364.","journal-title":"Intelligent Data Analysis"},{"key":"4364_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDSO.2005.53","volume":"6","author":"V Kumar","year":"2005","unstructured":"Kumar, V. (2005). Parallel and distributed computing for cybersecurity. IEEE Distributed System Online, 6, 10.","journal-title":"IEEE Distributed System Online"},{"key":"4364_CR17","doi-asserted-by":"publisher","first-page":"1768","DOI":"10.1016\/j.patcog.2005.03.020","volume":"38","author":"K Lee","year":"2005","unstructured":"Lee, K., Kim, D.-W., Lee, D., & Lee, K. H. (2005). Improving support vector data description using local density degree. Pattern Recognition, 38, 1768\u20131771.","journal-title":"Pattern Recognition"},{"key":"4364_CR18","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TNN.2006.884673","volume":"18","author":"K Lee","year":"2007","unstructured":"Lee, K., Kim, D.-W., Lee, K. H., & Lee, D. (2007). Density-induced support vector data description. IEEE Transactions on Neural Networks, 18, 284\u2013289.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"4364_CR19","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.1016\/j.patcog.2006.04.033","volume":"39","author":"S-W Lee","year":"2006","unstructured":"Lee, S.-W., Park, J., & Lee, S.-W. (2006). Low resolution face recognition based on support vector data description. Pattern Recognition, 39, 1809\u20131812.","journal-title":"Pattern Recognition"},{"key":"4364_CR20","unstructured":"Li, K.-L., Huang, H.-K., Tian, S.-F. & Xu, W. (2003). Improving one-class SVM for anomaly detection. In 2003 International conference on machine learning and cybernetics. IEEE (pp. 3077\u20133081)."},{"key":"4364_CR21","unstructured":"Moya. M., Koch M. & Hostetler L. (1993). One-class classifier networks for target recognition applications. In Proceedings of the world congresson neural networks, Portland (pp. 797\u2013801)."},{"key":"4364_CR22","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TSMCB.2009.2013962","volume":"39","author":"T Mu","year":"2009","unstructured":"Mu, T., & Nandi, A. K. (2009). Multiclass classification based on extended support vector data description. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 39, 1206\u20131216.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"4364_CR23","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1080\/0740817X.2012.712237","volume":"45","author":"X Ning","year":"2013","unstructured":"Ning, X., & Tsung, F. (2013). Improved design of kernel distance-based charts using support vector methods. IIE Transactions, 45, 464\u2013476.","journal-title":"IIE Transactions"},{"issue":"6","key":"4364_CR24","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1002\/qre.1688","volume":"30","author":"P Phaladiganon","year":"2014","unstructured":"Phaladiganon, P., Kim, S. B., & Chen, V. C. (2014). A density-focused support vector data description method. Quality and Reliability Engineering International, 30(6), 879\u2013890.","journal-title":"Quality and Reliability Engineering International"},{"key":"4364_CR25","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J. C., Shawe-Taylor, J., Smola, A. J., & Williamson, R. C. (2001). Estimating the support of a high-dimensional distribution. Neural Computation, 13, 1443\u20131471.","journal-title":"Neural Computation"},{"key":"4364_CR26","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/TR.2010.2048740","volume":"59","author":"VA Sotiris","year":"2010","unstructured":"Sotiris, V. A., Peter, W. T., & Pecht, M. G. (2010). Anomaly detection through a bayesian support vector machine. IEEE Transactions on Reliability, 59, 277\u2013286.","journal-title":"IEEE Transactions on Reliability"},{"key":"4364_CR27","doi-asserted-by":"crossref","unstructured":"Spence, C., Parra, L., & Sajda, P. (2001). Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. In Proceedings of the IEEE workshop on mathematical methods in biomedical image analysis. IEEE Computer Society, 3.","DOI":"10.1109\/MMBIA.2001.991693"},{"key":"4364_CR28","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1016\/S0167-8655(99)00087-2","volume":"20","author":"DM Tax","year":"1999","unstructured":"Tax, D. M., & Duin, R. P. (1999). Support vector domain description. Pattern Recognition Letters, 20, 1191\u20131199.","journal-title":"Pattern Recognition Letters"},{"key":"4364_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DM Tax","year":"2004","unstructured":"Tax, D. M., & Duin, R. P. (2004). Support vector data description. Machine Learning, 54, 45\u201366.","journal-title":"Machine Learning"},{"key":"4364_CR30","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.jprocont.2007.07.006","volume":"18","author":"NF Thornhill","year":"2008","unstructured":"Thornhill, N. F., Patwardhan, S. C., & Shah, S. L. (2008). A continuous stirred tank heater simulation model with applications. Journal of Process Control, 18, 347\u2013360.","journal-title":"Journal of Process Control"},{"key":"4364_CR31","doi-asserted-by":"crossref","unstructured":"Turkoz, M., Kim, S., Son, Y., Jeong, M. K. & Elsayed, E. A. (2020). Generalized support vector data description for anomaly detection.\u00a0Pattern Recognition,\u00a0100, 107119.","DOI":"10.1016\/j.patcog.2019.107119"},{"issue":"8","key":"4364_CR32","doi-asserted-by":"publisher","first-page":"2701","DOI":"10.1002\/qre.2096","volume":"32","author":"M Turkoz","year":"2016","unstructured":"Turkoz, M., Kim, S., Jeong, Y. S., Al-Khalifa, K. N., & Hamouda, A. M. (2016). Distribution-free adaptive step-down procedure for fault identification. Quality and Reliability Engineering International, 32(8), 2701\u20132716.","journal-title":"Quality and Reliability Engineering International"},{"issue":"4","key":"4364_CR33","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1080\/00224065.2018.1507561","volume":"51","author":"M Turkoz","year":"2019","unstructured":"Turkoz, M., Kim, S., Jeong, Y. S., Jeong, M. K., Elsayed, A. E., Al-Khalifa, K. N., & Hamouda, A. M. (2019). Bayesian framework for fault variable identification. Journal of Quality Technology, 51(4), 375\u2013391.","journal-title":"Journal of Quality Technology"},{"key":"4364_CR34","doi-asserted-by":"crossref","unstructured":"Vapnik, V. (1995). The nature of statistical learning theory. Springer.","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"4364_CR35","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.patcog.2015.09.005","volume":"51","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Lu, H., Zhang, L., & Ruan, X. (2016). Combining motion and appearance cues for anomaly detection. Pattern Recognition, 51, 443\u2013452.","journal-title":"Pattern Recognition"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-021-04364-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10479-021-04364-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-021-04364-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T18:21:39Z","timestamp":1666117299000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10479-021-04364-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["4364"],"URL":"https:\/\/doi.org\/10.1007\/s10479-021-04364-x","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,10]]},"assertion":[{"value":"19 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}