{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:20:40Z","timestamp":1770538840474,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T00:00:00Z","timestamp":1257897600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s10618-009-0148-z","type":"journal-article","created":{"date-parts":[[2009,11,10]],"date-time":"2009-11-10T10:37:50Z","timestamp":1257849470000},"page":"259-289","source":"Crossref","is-referenced-by-count":93,"title":["A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes"],"prefix":"10.1007","volume":"20","author":[{"given":"Anna","family":"Koufakou","sequence":"first","affiliation":[]},{"given":"Michael","family":"Georgiopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,11,11]]},"reference":[{"key":"148_CR1","unstructured":"Acuna E, Rodriguez C (2004) A meta analysis study of outlier detection methods in classification. Technical paper, Department of Mathematics, University of Puerto Rico at Mayaguez. Available at http:\/\/academic.uprm.edu~eacuna\/paperout.pdf"},{"issue":"2","key":"148_CR2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/376284.375668","volume":"30","author":"C Aggarwal","year":"2001","unstructured":"Aggarwal C, Yu P (2001) Outlier detection for high dimensional data. ACM SIGMOD Record 30(2): 37\u201346","journal-title":"ACM SIGMOD Record"},{"key":"148_CR3","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules in large databases. In: Proceedings of the international conference on very large data bases, pp 487\u2013499"},{"key":"148_CR4","unstructured":"Aha D, Bankert R (1994) Feature selection for case-based classification of cloud types: an empirical comparison. In: Proceedings of the 1994 AAAI workshop on case-based reasoning, pp 106\u2013112"},{"issue":"2","key":"148_CR5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TKDE.2005.31","volume":"17","author":"F Angiulli","year":"2005","unstructured":"Angiulli F, Pizzuti C (2005) Outlier mining in large high-dimensional data sets. IEEE Transac Knowl Data Engin 17(2): 203\u2013215","journal-title":"IEEE Transac Knowl Data Engin"},{"key":"148_CR6","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1978","unstructured":"Barnett V, Lewis T (1978) Outliers in statistical data. Wiley, NY"},{"key":"148_CR7","doi-asserted-by":"crossref","unstructured":"Bay S, Schwabacher M (2003) Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, pp 29\u201338","DOI":"10.1145\/956750.956758"},{"key":"148_CR8","doi-asserted-by":"crossref","unstructured":"Beyer K, Goldstein J, Ramakrishnan R, Shaft U (1999) When is \u201cnearest neighbor\u201d meaningful? In: Proceedings of the 7th international conference on database theory, pp 217\u2013235","DOI":"10.1007\/3-540-49257-7_15"},{"key":"148_CR9","unstructured":"Biba M, Esposito F, Ferilli S, Di Mauro N, Basile T (2007) Unsupervised discretization using kernel density estimation. In: Proceedings of the 20-th international conferece on artificial intelligence, pp 696\u2013701"},{"key":"148_CR10","unstructured":"Blake C, Merz C (1998) UCI repository of machine learning databases. http:\/\/archive.ics.uci.edu . Accessed Sept 2008"},{"issue":"3","key":"148_CR11","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"R Bolton","year":"2002","unstructured":"Bolton R, Hand D (2002) Statistical fraud detection: a review. Stat Sci 17(3): 235\u2013255","journal-title":"Stat Sci"},{"key":"148_CR12","doi-asserted-by":"crossref","unstructured":"Branch J, Szymanski B, Giannella C, Wolff R, Kargupta H (2006) In-network outlier detection in wireless sensor networks. In: Proceedings 26th international conference on distributed computing systems","DOI":"10.1109\/ICDCS.2006.49"},{"issue":"2","key":"148_CR13","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"M Breunig","year":"2000","unstructured":"Breunig M, Kriegel H, Ng R, Sander J (2000) LOF: identifying density-based local outliers. ACM SIGMOD Record 29(2): 93\u2013104","journal-title":"ACM SIGMOD Record"},{"key":"148_CR14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/11615576_4","volume":"3848","author":"T Calders","year":"2004","unstructured":"Calders T, Rigotti C, Boulicaut J (2004) A survey on condensed representations for frequent sets. LNCS Constraint-Based Mining and Inductive Databases 3848: 64\u201380","journal-title":"LNCS Constraint-Based Mining and Inductive Databases"},{"key":"148_CR15","unstructured":"Catlett J (1991) Megainduction: machine learning on very large databases, PhD thesis, Basser Department of Computer Science, University of Sydney, Australia"},{"key":"148_CR16","unstructured":"Dean J, Ghemawat S (2004) MapReduce: simplified data processing on large clusters. In: USENIX symposium on operating systems design and implementation OSDI"},{"key":"148_CR17","unstructured":"Dokas P, Ertoz L, Kumar V, Lazarevic A, Srivastava J, Tan P (2002) Data mining for network intrusion detection. In: Proceedings NSF workshop on next generation data mining, pp 21\u201330"},{"key":"148_CR18","doi-asserted-by":"crossref","unstructured":"Ertoz L, Steinbach M, Kumar V (2003) Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data. In: SIAM international conference on data mining, pp 47\u201358","DOI":"10.1137\/1.9781611972733.5"},{"issue":"2","key":"148_CR19","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/1071610.1071611","volume":"30","author":"F Geerts","year":"2005","unstructured":"Geerts F, Goethals B, Van den Bussche J (2005) Tight upper bounds on the number of candidate patterns. ACM Transac Database System (TODS) 30(2): 333\u2013363","journal-title":"ACM Transac Database System (TODS)"},{"key":"148_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of outliers","author":"D Hawkins","year":"1980","unstructured":"Hawkins D (1980) Identification of outliers. Chapman and Hall, London"},{"key":"148_CR21","doi-asserted-by":"crossref","unstructured":"Hawkins S, He H, Williams G, Baxter R (2002) Outlier detection using replicator neural networks. In: Proceedings of the 4th international conference on data warehousing and knowledge discovery, pp 170\u2013180","DOI":"10.1007\/3-540-46145-0_17"},{"key":"148_CR22","unstructured":"Hays C (2004) What Wal-Mart knows about customers habits. The New York Times, November 14"},{"key":"148_CR23","doi-asserted-by":"crossref","unstructured":"He Z, Xu X, Deng S, Calvanese D, De Giacomo G, Lenzerini M (2006) A fast greedy algorithm for outlier mining. In: Proceedings of 10th Pacific-Asia conference on knowledge and data discovery, pp 567\u2013576","DOI":"10.1007\/11731139_67"},{"key":"148_CR24","unstructured":"Hettich S, Bay S (1999) The UCI KDD archive. http:\/\/kdd.ics.uci.edu"},{"issue":"2","key":"148_CR25","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22(2): 85\u2013126","journal-title":"Artif Intell Rev"},{"key":"148_CR26","unstructured":"Knorr E, Ng R (1998) Algorithms for mining distance-based outliers in large datasets. In: Proceedings of the 24th international conference on very large data bases, pp 392\u2013403"},{"issue":"3","key":"148_CR27","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"E Knorr","year":"2000","unstructured":"Knorr E, Ng R, Tucakov V (2000) Distance-based outliers: algorithms and applications. Int J Very Large Data Bases VLDB 8(3): 237\u2013253","journal-title":"Int J Very Large Data Bases VLDB"},{"key":"148_CR28","volume-title":"The art of computer programming, vol 1","author":"D Knuth","year":"1968","unstructured":"Knuth D (1968) The art of computer programming, vol 1. Addison-Wesley, Reading, MA"},{"key":"148_CR29","unstructured":"Koufakou A, Georgiopoulos M, Anagnostopoulos G (2008b) Detecting outliers in high-dimensional datasets with mixed attributes. In: International conference on data mining DMIN, pp 427\u2013433"},{"key":"148_CR30","doi-asserted-by":"crossref","unstructured":"Koufakou A, Ortiz E, Georgiopoulos M, Anagnostopoulos G, Reynolds K (2007) A scalable and efficient outlier detection strategy for categorical data. In: IEEE international conference on tools with artificial intelligence ICTAI, pp 210\u2013217","DOI":"10.1109\/ICTAI.2007.125"},{"key":"148_CR31","doi-asserted-by":"crossref","unstructured":"Koufakou A, Secretan J, Reeder J, Cardona K, Georgiopoulos M (2008a) Fast parallel outlier detection for categorical datasets using MapReduce. In: IEEE world congress on computational intelligence international joint conference on neural networks IJCNN, pp 3298\u20133304","DOI":"10.1109\/IJCNN.2008.4634266"},{"key":"148_CR32","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-540-73499-4_6","volume":"4571","author":"L Latecki","year":"2007","unstructured":"Latecki L, Lazarevic A, Pokrajac D (2007) Outlier detection with kernel density functions. Lecture Notes in Computer Science 4571: 61","journal-title":"Lecture Notes in Computer Science"},{"key":"148_CR33","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 3rd SIAM international conference on data mining, p 25","DOI":"10.1137\/1.9781611972733.3"},{"issue":"9","key":"148_CR34","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1109\/TKDE.2005.153","volume":"17","author":"S Mehta","year":"2005","unstructured":"Mehta S, Parthasarathy S, Yang H (2005) Toward unsupervised correlation preserving discretization. IEEE Transac Knowl Data Engin 17(9): 1174\u20131185","journal-title":"IEEE Transac Knowl Data Engin"},{"issue":"2","key":"148_CR35","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10618-005-0014-6","volume":"12","author":"M Otey","year":"2006","unstructured":"Otey M, Ghoting A, Parthasarathy S (2006) Fast distributed outlier detection in mixed-attribute data sets. Data Mining Knowl Discov 12(2): 203\u2013228","journal-title":"Data Mining Knowl Discov"},{"key":"148_CR36","doi-asserted-by":"crossref","unstructured":"Papadimitriou S, Kitagawa H, Gibbons P, Faloutsos C, (2003) LOCI: fast outlier detection using the local correlation integral. In: Proceedings 19th international conference on data engineering, pp 315\u2013326","DOI":"10.1109\/ICDE.2003.1260802"},{"issue":"3","key":"148_CR37","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1111\/1467-9884.00279","volume":"50","author":"K Penny","year":"2001","unstructured":"Penny K, Jolliffe I (2001) A comparison of multivariate outlier detection methods for clinical laboratory safety data. The Statistician 50(3): 295\u2013308","journal-title":"The Statistician"},{"key":"148_CR38","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1098-6","volume-title":"Computational geometry: an introduction","author":"F Preparata","year":"1985","unstructured":"Preparata F, Shamos M (1985) Computational geometry: an introduction. Springer, Berlin"},{"issue":"2","key":"148_CR39","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1162\/neco.1994.6.2.270","volume":"6","author":"S Roberts","year":"1994","unstructured":"Roberts S, Tarassenko L (1994) A probabilistic resource allocating network for novelty detection. Neural Comput 6(2): 270\u2013284","journal-title":"Neural Comput"},{"key":"148_CR40","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-94-009-5438-0_20","volume":"8","author":"P Rousseeuw","year":"1985","unstructured":"Rousseeuw P (1985) Multivariate estimation with high breakdown point. Math Stat Appl 8: 283\u2013297","journal-title":"Math Stat Appl"},{"key":"148_CR41","doi-asserted-by":"crossref","DOI":"10.1002\/0471725382","volume-title":"Robust regression and outlier detection","author":"P Rousseeuw","year":"1987","unstructured":"Rousseeuw P, Leroy A (1987) Robust regression and outlier detection. Wiley, NY"},{"key":"148_CR42","volume-title":"Introduction to data mining","author":"P Tan","year":"2005","unstructured":"Tan P, Steinbach M, Kumar V (2005) Introduction to data mining. Pearson Addison Wesley, London"},{"issue":"1","key":"148_CR43","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"D Tax","year":"2004","unstructured":"Tax D, Duin R (2004) Support vector data description. Mach Learn 54(1): 45\u201366","journal-title":"Mach Learn"},{"issue":"3","key":"148_CR44","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10115-005-0197-6","volume":"9","author":"J Yu","year":"2006","unstructured":"Yu J, Qian W, Lu H, Zhou A (2006) Finding centric local outliers in categorical\/numerical spaces. Knowl Inform Syst 9(3): 309\u2013338","journal-title":"Knowl Inform Syst"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-009-0148-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-009-0148-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-009-0148-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T13:30:30Z","timestamp":1685194230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-009-0148-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,11]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["148"],"URL":"https:\/\/doi.org\/10.1007\/s10618-009-0148-z","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11,11]]}}}