{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T06:29:26Z","timestamp":1776148166548,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T00:00:00Z","timestamp":1660262400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T00:00:00Z","timestamp":1660262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s10489-022-03258-0","type":"journal-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T08:08:25Z","timestamp":1660291705000},"page":"9897-9915","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A neighborhood weighted-based method for the detection of outliers"],"prefix":"10.1007","volume":"53","author":[{"given":"Zhong-Yang","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Hua","family":"Long","sequence":"additional","affiliation":[]},{"given":"Yu-Fang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiao-Xia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qin-Qin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Lin-Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,12]]},"reference":[{"key":"3258_CR1","doi-asserted-by":"crossref","unstructured":"Zhang W H (2017) An anomaly detection method for medicare fraud detection. 2017 IEEE International Conference on Big Knowledge (ICBK), pp 309\u2013314","DOI":"10.1109\/ICBK.2017.47"},{"key":"3258_CR2","doi-asserted-by":"publisher","first-page":"101941","DOI":"10.1016\/j.cose.2020.101941","volume":"97","author":"M Evangelou","year":"2020","unstructured":"Evangelou M, Adams NM (2020) An anomaly detection framework for cyber-security data. Comput Secur 97:101941","journal-title":"Comput Secur"},{"key":"3258_CR3","doi-asserted-by":"publisher","first-page":"100306","DOI":"10.1016\/j.cosrev.2020.100306","volume":"38","author":"A Smiti","year":"2020","unstructured":"Smiti A (2020) A critical overview of outlier detection methods. Comput Sci Rev 38:100306","journal-title":"Comput Sci Rev"},{"key":"3258_CR4","doi-asserted-by":"publisher","first-page":"106727","DOI":"10.1016\/j.asoc.2020.106727","volume":"97","author":"KAP da Costa","year":"2020","unstructured":"da Costa KAP, Papa JP, Passos LA, Colombo D, Del Ser J, Muhammad K, de Albuquerque VHC (2020) A critical literature survey and prospects on tampering and anomaly detection in image data. Appl Soft Comput 97:106727","journal-title":"Appl Soft Comput"},{"key":"3258_CR5","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.patcog.2017.09.037","volume":"74","author":"R Domingues","year":"2018","unstructured":"Domingues R, Filippone M, Michiardi P, Zouaoui J (2018) A comparative evaluation of outlier detection algorithms: experiments and analyses. Pattern Recogn 74:406\u2013421","journal-title":"Pattern Recogn"},{"key":"3258_CR6","doi-asserted-by":"crossref","unstructured":"Wangm X, Wang X, Wilkes M (2021) New developments in unsupervised outlier detection. Springer Singapore","DOI":"10.1007\/978-981-15-9519-6"},{"key":"3258_CR7","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1007\/s10462-018-9619-1","volume":"52","author":"F Meng","year":"2019","unstructured":"Meng F, Yuan G, Lv S, Wang Z, Xia S (2019) An overview on trajectory outlier detection. Artif Intell Rev 52:2347\u20132456","journal-title":"Artif Intell Rev"},{"key":"3258_CR8","doi-asserted-by":"crossref","unstructured":"Goldstein M, Uchida S (2016) A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data. PLoS One","DOI":"10.1371\/journal.pone.0152173"},{"key":"3258_CR9","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1007\/s10618-015-0444-8","volume":"30","author":"GO Campos","year":"2016","unstructured":"Campos GO, Zimek A (2016) On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min Knowl Discov 30:891\u2013927","journal-title":"Data Min Knowl Discov"},{"issue":"6","key":"3258_CR10","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/TSP.2015.2504345","volume":"64","author":"H Ozkan","year":"2016","unstructured":"Ozkan H, Ozkan F, Kozat SS (2016) Online anomaly detection under markov statistics with controllable type-i error. IEEE Trans Signal Process 64(6):1435\u20131445","journal-title":"IEEE Trans Signal Process"},{"key":"3258_CR11","doi-asserted-by":"crossref","unstructured":"Ding J, Wang J, Zhang Y, Li Y, Zheng N (2021) Correlation-based robust linear regression with iterative outlier removal. In: ICASSP 2021 - 2021 IEEE international conference on acoustics, speech and signal processing (ICASSP)","DOI":"10.1109\/ICASSP39728.2021.9414849"},{"key":"3258_CR12","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1016\/j.cma.2016.10.004","volume":"313","author":"K-V Yuen","year":"2017","unstructured":"Yuen K-V, Ortiz GA (2017) Outlier detection and robust regression for correlated data. Comput Methods Appl Mech Eng 313:632\u2013646","journal-title":"Comput Methods Appl Mech Eng"},{"key":"3258_CR13","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.asoc.2018.12.029","volume":"76","author":"B Wang","year":"2019","unstructured":"Wang B, Mao Z (2019) Outlier detection based on Gaussian process with application to industrial processes. Appl Soft Comput 76:505\u2013516","journal-title":"Appl Soft Comput"},{"key":"3258_CR14","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.knosys.2017.01.013","volume":"121","author":"J Huang","year":"2017","unstructured":"Huang J, Zhu Q, Yang L, Cheng D, Wu Q (2017) A novel outlier cluster detection algorithm without top-n parameter. Knowl-based Syst 121:32\u201340","journal-title":"Knowl-based Syst"},{"key":"3258_CR15","doi-asserted-by":"publisher","first-page":"103397","DOI":"10.1016\/j.jbi.2020.103397","volume":"104","author":"PJ Jones","year":"2020","unstructured":"Jones PJ, James MK, Davies MJ, Khunti K, Catt M, Yates T, Rowlands AV, Mirkes EM (2020) FilterK: A new outlier detection method for k-means clustering of physical activity. J Biomed Inf 104:103397","journal-title":"J Biomed Inf"},{"key":"3258_CR16","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.patrec.2019.11.022","volume":"129","author":"B Tu","year":"2020","unstructured":"Tu B, Yang X, Li N, Zhou C, He D (2020) Hyperspectral anomaly detection via density peak clustering. Pattern Recogn Lett 129:144\u2013149","journal-title":"Pattern Recogn Lett"},{"key":"3258_CR17","unstructured":"Chen J, Sadeqi E, Zhang Q (2018) A practical algorithm for distributed clustering and outlier detection. arXiv preprint"},{"key":"3258_CR18","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2019.12.060","volume":"517","author":"J Gao","year":"2020","unstructured":"Gao J, Ji W, Zhang L, Li A, Wang Y, Zhang Z (2020) Cube-based incremental outlier detection for streaming computing. Inf Sci 517:361\u2013376","journal-title":"Inf Sci"},{"key":"3258_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.knosys.2014.03.001","volume":"63","author":"J Ha","year":"2014","unstructured":"Ha J, Seok S, Lee JS (2014) Robust outlier detection using the instability factor. Knowl-based Syst 63:15\u201323","journal-title":"Knowl-based Syst"},{"key":"3258_CR20","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/978-3-642-01307-2_84","volume":"5476","author":"K Zhang","year":"2009","unstructured":"Zhang K, Hutter M, Jin HD (2009) A new local distance-based outlier detection approach for scattered real-world data. Adv Knowl Discov Data Min 5476:813\u2013822","journal-title":"Adv Knowl Discov Data Min"},{"key":"3258_CR21","unstructured":"Knorr E M, Ng R T (1998) Algorithms for mining distance-based outliers in large datasets, pp 392\u2013403"},{"issue":"12","key":"3258_CR22","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.14778\/2994509.2994526","volume":"9","author":"LF Tran","year":"2016","unstructured":"Tran L F (2016) Distance-Based Outlier Detection in Data Streams. Proc VLDB Endow 9 (12):1089\u20131100","journal-title":"Proc VLDB Endow"},{"issue":"2","key":"3258_CR23","doi-asserted-by":"publisher","first-page":"141","DOI":"10.14778\/3425879.3425885","volume":"14","author":"LM Tran","year":"2020","unstructured":"Tran L M (2020) Real-Time Distance-Based Outlier Detection in Data Streams. Proc VLDB Endow 14(2):141\u2013153","journal-title":"Proc VLDB Endow"},{"issue":"2","key":"3258_CR24","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig M M, Kriegel H-P, Ng R T, Sander J (2000) Lof: Identifying density-based local outliers. SIGMOD Rec 29(2):93\u2013104","journal-title":"SIGMOD Rec"},{"key":"3258_CR25","doi-asserted-by":"crossref","unstructured":"Tang J, Chen Z, Fu A W-C, Cheung D W-L (2002) Enhancing effectiveness of outlier detections for low density patterns, pp 535\u2013548","DOI":"10.1007\/3-540-47887-6_53"},{"key":"3258_CR26","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2017.02.039","volume":"241","author":"B Tang","year":"2017","unstructured":"Tang B, He H (2017) A local density-based approach for outlier detection. Neurocomputing 241:171\u2013180","journal-title":"Neurocomputing"},{"key":"3258_CR27","doi-asserted-by":"crossref","unstructured":"Uttarkabat S, Sunkara N D, Patra B K (2020) Rsod: Efficient technique for outlier detection using reverse nearest neighbors statistics. In: 2020 4th international conference on computational intelligence and networks (CINE), pp 1\u20136","DOI":"10.1109\/CINE48825.2020.234401"},{"key":"3258_CR28","doi-asserted-by":"crossref","unstructured":"Xie J, Xiong ZY, Dai QZ, Wang XX, Zhang YF (2020) A local-gravitation-based method for the detection of outliers and boundary points. Knowl-based Syst 192","DOI":"10.1016\/j.knosys.2019.105331"},{"key":"3258_CR29","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.patrec.2016.05.007","volume":"80","author":"QS Zhu","year":"2016","unstructured":"Zhu QS, Feng J, Huang JL (2016) Natural neighbor: A self-adaptive neighborhood method without parameter k. Pattern Recogn Lett 80:30\u201336","journal-title":"Pattern Recogn Lett"},{"key":"3258_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.knosys.2015.10.014","volume":"92","author":"JL Huang","year":"2016","unstructured":"Huang JL, Zhu QS, Feng J (2016) A non-parameter outlier detection algorithm based on natural neighbor. Knowl-based Syst 92:71\u201377","journal-title":"Knowl-based Syst"},{"key":"3258_CR31","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.neucom.2016.12.040","volume":"230","author":"LJ Yang","year":"2017","unstructured":"Yang LJ, Zhu QS, JL.Huang, Cheng DD (2017) Adaptive edited natural neighbor algorithm. Neurocomputing 230:427\u2013 433","journal-title":"Neurocomputing"},{"key":"3258_CR32","doi-asserted-by":"publisher","first-page":"2107","DOI":"10.1007\/s00521-020-05068-2","volume":"33","author":"A Wahid","year":"2021","unstructured":"Wahid A, Sekhara C, Annavarapu R (2021) NaNOD: A natural neighbour-based outlier detection algorithm. Neural Comput Appl 33:2107\u20132123","journal-title":"Neural Comput Appl"},{"issue":"9","key":"3258_CR33","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1145\/361002.361007","volume":"18","author":"JL Bentley","year":"1975","unstructured":"Bentley J L (1975) Multidimensional binary search trees used for associative searching. Assoc Comput Machinery 18(9):509\u2013 517","journal-title":"Assoc Comput Machinery"},{"key":"3258_CR34","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.smhl.2018.07.001","volume":"9-10","author":"R Sadeghi","year":"2018","unstructured":"Sadeghi R, Banerjee T, Romine W (2018) Early hospital mortality prediction using vital signals. Smart Health 9-10:265\u2013274","journal-title":"Smart Health"},{"key":"3258_CR35","doi-asserted-by":"publisher","first-page":"101504","DOI":"10.1016\/j.is.2020.101504","volume":"91","author":"L-T Li","year":"2020","unstructured":"Li L-T, Xiong Z-Y, Dai Q-Z, Zha Y-F, Zhang Y-F, Dan J-P (2020) A novel graph-based clustering method using noise cutting. Inf Syst 91:101504","journal-title":"Inf Syst"},{"key":"3258_CR36","unstructured":"Papadimitriou C, Steiglitz K (1998) Combinatorial optimization:algorithms and complexity. Courier Dover Publications"},{"key":"3258_CR37","doi-asserted-by":"crossref","unstructured":"Wang C, Liu Z, Gao H, Fu Y (2019) Vos: A new outlier detection model using virtual graph. Knowl-based Syst 185","DOI":"10.1016\/j.knosys.2019.104907"},{"key":"3258_CR38","unstructured":"Lichman M Uci machine learning repository. http:\/\/archive.ics.uci.edu\/ml"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03258-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03258-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03258-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T11:34:35Z","timestamp":1684496075000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03258-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,12]]},"references-count":38,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["3258"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03258-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,12]]},"assertion":[{"value":"17 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interest Statement"}}]}}