{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T07:14:09Z","timestamp":1765178049599,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10489-021-02399-y","type":"journal-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T07:02:42Z","timestamp":1628060562000},"page":"5100-5124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["ADD: a new average divergence difference-based outlier detection method with skewed distribution of data objects"],"prefix":"10.1007","volume":"52","author":[{"given":"Zhong-Yang","family":"Xiong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2626-6539","authenticated-orcid":false,"given":"Qin-Qin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yu-Fang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lin-Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,4]]},"reference":[{"issue":"11","key":"2399_CR1","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1109\/TPDS.2016.2528984","volume":"27","author":"F Angiulli","year":"2016","unstructured":"Angiulli F, Basta S, Lodi S, Sartori C (2016) Gpu strategies for distance-based outlier detection. IEEE Trans Parallel Distrib Syst 27(11):3256\u20133268","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"9","key":"2399_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1145\/361002.361007","volume":"18","author":"J Bentley","year":"1975","unstructured":"Bentley J (1975) Multidimensional binary search trees used for associated searching. Commun ACM 18(9):509\u2013517","journal-title":"Commun ACM"},{"key":"2399_CR3","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.ins.2016.02.023","volume":"348","author":"MH Bhuyan","year":"2016","unstructured":"Bhuyan MH, Bhattacharyya D, Kalita J (2016) A multi-step outlier-based anomaly detection approach to network-wide traffic. Inf Sci 348:243\u2013271","journal-title":"Inf Sci"},{"key":"2399_CR4","doi-asserted-by":"crossref","unstructured":"Breunig M, et al. (2000) Lof:identifying density-based local outliers. ACM Sigmod Record","DOI":"10.1145\/342009.335388"},{"key":"2399_CR5","unstructured":"Carcillo F, Le borgne Y.A, Caelen O, Kessaci Y, Obl\u00e9 F, Bontempi G (2019) Combining unsupervised and supervised learning in credit card fraud detection. Information Sciences"},{"key":"2399_CR6","doi-asserted-by":"crossref","unstructured":"Hawkins D (1980) Identification of outliers. Chapman and Hall","DOI":"10.1007\/978-94-015-3994-4"},{"key":"2399_CR7","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.patcog.2017.09.037","volume":"74","author":"R Domingues","year":"2018","unstructured":"Domingues R, Filippone M, Michiardi P, Zouaoui J (2018) A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern Recogn 74:406\u2013421","journal-title":"Pattern Recogn"},{"key":"2399_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10115-008-0145-3","volume":"19","author":"H Fan","year":"2009","unstructured":"Fan H, Zaiane O, Foss A, Wu J (2009) Resolution-based outlier factor:detecting the top-n most outlying data points in engineering data. Knowl Inf Syst 19:31\u201351","journal-title":"Knowl Inf Syst"},{"key":"2399_CR9","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.eswa.2017.05.026","volume":"85","author":"D Gubiani","year":"2017","unstructured":"Gubiani D, Fabbretti E, Cestnik B, Lavra\u010d N, Urban\u010di\u010d T (2017) Outlier based literature exploration for cross-domain linking of alzheimer\u2019s disease and gut microbiota. Expert Syst Appl 85:386\u2013396","journal-title":"Expert Syst Appl"},{"key":"2399_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.knosys.2017.01.013","volume":"121","author":"J Huang","year":"2017","unstructured":"Huang J, Zhu Q, Yang L, Cheng D, Wu Q (2017) A novel outlier cluster detection algorithm without top-n parameter. Knowl-Based Syst 121:32\u201340","journal-title":"Knowl-Based Syst"},{"key":"2399_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.knosys.2015.10.014","volume":"92","author":"J Huang","year":"2016","unstructured":"Huang J, Zhu Q, Yang L, Feng J (2016) A non-parameter outlier detection algorithm based on natural neighbor. Knowl-based Syst 92:71\u201377","journal-title":"Knowl-based Syst"},{"key":"2399_CR12","unstructured":"Knorr E, Ng R (1997) A unified notion of outliers. Properties and computation"},{"key":"2399_CR13","unstructured":"Knorr E, Ng R (1998) Algorithms for mining distance-based outliers in large datasets. Proceedings of the 24rd international conference on very large data bases, pp 392\u2013403"},{"key":"2399_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.is.2015.07.006","volume":"55","author":"M Kontaki","year":"2016","unstructured":"Kontaki M, Gounaris A, Papadopoulos AN, Tsichlas K, Manolopoulos Y (2016) Efficient and flexible algorithms for monitoring distance-based outliers over data streams. Inf Syst 55:37\u201353","journal-title":"Inf Syst"},{"key":"2399_CR15","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.neucom.2017.09.023","volume":"275","author":"X Li","year":"2018","unstructured":"Li X, Han Q, Qiu B (2018) A clustering algorithm using skewness-based boundary detection. Neurocomputing 275:618\u2013626","journal-title":"Neurocomputing"},{"key":"2399_CR16","unstructured":"Lichman M (2013) Uci machine learning repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"2399_CR17","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.future.2017.11.021","volume":"82","author":"N Nesa","year":"2018","unstructured":"Nesa N, Ghosh T, Banerjee I (2018) Non-parametric sequence-based learning approach for outlier detection in iot. Futur Gener Comput Syst 82:412\u2013421","journal-title":"Futur Gener Comput Syst"},{"key":"2399_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csda.2016.07.007","volume":"105","author":"R Serfling","year":"2017","unstructured":"Serfling R, Wijesuriya U (2017) Depth-based nonparametric description of functional data, with emphasis on use of spatial depth. Comput Stat Data Anal 105:24\u201345","journal-title":"Comput Stat Data Anal"},{"key":"2399_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2017.02.039","volume":"241","author":"B Tang","year":"2017","unstructured":"Tang B, He H (2017) A local density-based approach for outlier detection. Neurocomputing 241:171\u2013180","journal-title":"Neurocomputing"},{"key":"2399_CR20","doi-asserted-by":"crossref","unstructured":"Tang J, Chen Z, Fu A, Cheung D (2002) Enhancing effectiveness of outlier detections for low density patterns. knowledge discovery and data mining, pp 535\u2013548","DOI":"10.1007\/3-540-47887-6_53"},{"key":"2399_CR21","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.conengprac.2017.09.018","volume":"70","author":"SN Thennadil","year":"2018","unstructured":"Thennadil SN, Dewar M, Herdsman C, Nordon A, Becker E (2018) Automated weighted outlier detection technique for multivariate data. Control Eng Pract 70:40\u201349","journal-title":"Control Eng Pract"},{"key":"2399_CR22","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.asoc.2018.12.029","volume":"76","author":"B Wang","year":"2019","unstructured":"Wang B, Mao Z (2019) Outlier detection based on gaussian process with application to industrial processes. Appl Soft Comput 76:505\u2013516","journal-title":"Appl Soft Comput"},{"key":"2399_CR23","first-page":"185","volume":"104907","author":"C Wang","year":"2019","unstructured":"Wang C, Liu Z, Gao H, Fu Y (2019) Vos: a new outlier detection model using virtual graph. Knowl-Based Syst 104907:185","journal-title":"Knowl-Based Syst"},{"key":"2399_CR24","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.scs.2018.11.031","volume":"45","author":"YF Wang","year":"2019","unstructured":"Wang YF, Jiong Y, Su GP, Qian YR (2019) A new outlier detection method based on optics. Sustain Cities Soc 45:197\u2013212","journal-title":"Sustain Cities Soc"},{"key":"2399_CR25","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.knosys.2017.11.025","volume":"142","author":"J Xie","year":"2018","unstructured":"Xie J, Xiong ZY, Zhang Y, Feng Y, Ma J (2018) Density core-based clustering algorithm with dynamic scanning radius. Knowl-Based Syst 142:58\u201370","journal-title":"Knowl-Based Syst"},{"key":"2399_CR26","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.neucom.2016.12.040","volume":"230","author":"L Yang","year":"2017","unstructured":"Yang L, Zhu Q, Huang J, Cheng D (2017) Adaptive edited natural neighbor algorithm. Neurocomputing 230:427\u2013433","journal-title":"Neurocomputing"},{"key":"2399_CR27","doi-asserted-by":"crossref","unstructured":"Zhang K, Hutter M, Jin H (2009) A new local distance-based outlier detection approach for scattered real-world data. In: Advances in knowledge discovery and data mining. Springer, pp. 813\u2013822","DOI":"10.1007\/978-3-642-01307-2_84"},{"key":"2399_CR28","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.knosys.2017.10.009","volume":"139","author":"L Zhang","year":"2018","unstructured":"Zhang L, Lin J, Karim R (2018) Adaptive kernel density-based anomaly detection for nonlinear systems. Knowl-Based Syst 139:50\u201363","journal-title":"Knowl-Based Syst"},{"key":"2399_CR29","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.ijleo.2017.09.116","volume":"54","author":"S Zhang","year":"2018","unstructured":"Zhang S, Wan J (2018) Weight-based method for inside outlier detection. Optik 54:145\u2013156","journal-title":"Optik"},{"key":"2399_CR30","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.patcog.2018.08.003","volume":"85","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Cao G, Wang B, Li X (2019) A novel ensemble method for k-nearest neighbor. Pattern Recogn 85:13\u201325","journal-title":"Pattern Recogn"},{"key":"2399_CR31","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1016\/j.neucom.2014.07.002","volume":"148","author":"H Zhao","year":"2015","unstructured":"Zhao H, Jiang B, Tang J, Luo B (2015) Image matching using a local distribution based outlier detection technique. Neurocomputing 148:611\u2013618","journal-title":"Neurocomputing"},{"key":"2399_CR32","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.patrec.2016.05.007","volume":"80","author":"Q Zhu","year":"2016","unstructured":"Zhu Q, Feng J, Huang J (2016) Natural neighbor: a self-adaptive neighborhood method without parameter k. Pattern Recogn Lett 80:30\u201336","journal-title":"Pattern Recogn Lett"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02399-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02399-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02399-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T05:15:51Z","timestamp":1646457351000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02399-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["2399"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02399-y","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2021,8,4]]},"assertion":[{"value":"30 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}