{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T16:00:51Z","timestamp":1774281651257,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,2,9]],"date-time":"2016-02-09T00:00:00Z","timestamp":1454976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,2,9]],"date-time":"2016-02-09T00:00:00Z","timestamp":1454976000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001782","name":"University of Melbourne","doi-asserted-by":"publisher","award":["ECR15"],"award-info":[{"award-number":["ECR15"]}],"id":[{"id":"10.13039\/501100001782","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["FT110100112"],"award-info":[{"award-number":["FT110100112"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP140101969"],"award-info":[{"award-number":["DP140101969"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10618-016-0453-2","type":"journal-article","created":{"date-parts":[[2016,2,9]],"date-time":"2016-02-09T07:22:15Z","timestamp":1455002535000},"page":"1520-1555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Discovering outlying aspects in large datasets"],"prefix":"10.1007","volume":"30","author":[{"given":"Nguyen Xuan","family":"Vinh","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Romano","sequence":"additional","affiliation":[]},{"given":"James","family":"Bailey","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[]},{"given":"Kotagiri","family":"Ramamohanarao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,9]]},"reference":[{"key":"453_CR1","unstructured":"Aggarwal CC, Yu PS (2001) Outlier detection for high dimensional data. In Proceedings of the 2001 ACM SIGMOD international conference on management of data, SIGMOD \u201901, ACM, New York, pp 37\u201346"},{"key":"453_CR2","volume-title":"UCI machine learning repository","author":"K Bache","year":"2013","unstructured":"Bache K, Lichman M (2013) UCI machine learning repository. University of California, Irvine"},{"issue":"2","key":"453_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. SIGMOD Rec 29(2):93\u2013104","journal-title":"SIGMOD Rec"},{"key":"453_CR4","volume-title":"Introduction to algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to algorithms, 3rd edn. The MIT Press, Cambridge","edition":"3"},{"key":"453_CR5","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-40994-3_20","volume-title":"Machine learning and knowledge discovery in databases","author":"X Dang","year":"2013","unstructured":"Dang X, Micenkova B, Assent I, Ng R (2013) Local outlier detection with interpretation. In: Blockeel H, Kersting K, Nijssen S, Elezn F (eds) Machine learning and knowledge discovery in databases, vol 8190., Lecture notes in computer scienceSpringer, Berlin, pp 304\u2013320"},{"key":"453_CR6","unstructured":"Dang XH, Assent I, Ng RT, Zimek A, Schubert E (2014) Discriminative features for identifying and interpreting outliers. In Proceedings of the IEEE 30th international conference on data engineering (ICDE), pp 88\u201399"},{"key":"453_CR7","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-319-06608-0_21","volume-title":"Advances in knowledge discovery and data mining","author":"L Duan","year":"2014","unstructured":"Duan L, Tang G, Pei J, Bailey J, Dong G, Campbell A, Tang C (2014) Mining contrast subspaces. In: Tseng V, Ho T, Zhou Z-H, Chen A, Kao H-Y (eds) Advances in knowledge discovery and data mining, vol 8443., Lecture notes in computer scienceSpringer International Publishing, Berlin, pp 249\u2013260"},{"issue":"5","key":"453_CR8","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1007\/s10618-014-0398-2","volume":"29","author":"L Duan","year":"2015","unstructured":"Duan L, Tang G, Pei J, Bailey J, Campbell A, Tang C (2015) Mining outlying aspects on numeric data. Data Min Knowl Discov 29(5):1116\u20131151","journal-title":"Data Min Knowl Discov"},{"key":"453_CR9","volume-title":"Practical unix & internet security","author":"S Garfinkel","year":"2003","unstructured":"Garfinkel S, Spafford G, Schwartz A (2003) Practical unix & internet security, 3rd edn. O\u2019Reilly Media Inc, California","edition":"3"},{"issue":"1","key":"453_CR10","doi-asserted-by":"publisher","first-page":"103","DOI":"10.2298\/CSIS0501103H","volume":"2","author":"Z He","year":"2005","unstructured":"He Z, Xu X, Huang ZJ, Deng S (2005) Fp-outlier: frequent pattern based outlier detection. Comput Sci Inform Syst 2(1):103\u2013118","journal-title":"Comput Sci Inform Syst"},{"key":"453_CR11","doi-asserted-by":"crossref","unstructured":"Keller F, Muller E, Bohm K (2012) HiCS: high contrast subspaces for density-based outlier ranking. In Proceedings of the 2012 IEEE 28th international conference on data engineering, ICDE \u201912, IEEE Computer Society, Washington, pp 1037\u20131048","DOI":"10.1109\/ICDE.2012.88"},{"key":"453_CR12","unstructured":"Kriegel H-P, Schubert M, Zimek A (2008) Angle-based outlier detection in high-dimensional data. In Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201908, ACM, New York, pp 444\u2013452"},{"key":"453_CR13","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/978-3-642-01307-2_86","volume-title":"Advances in knowledge discovery and data mining","author":"H-P Kriegel","year":"2009","unstructured":"Kriegel H-P, Kruger P, Schubert E, Zimek A (2009) Outlier detectionin axis-parallel subspaces of high dimensional data. In: Theeramunkong T, Kijsirikul B, Cercone N, Ho T-B (eds) Advances in knowledge discovery and data mining, vol 5476., Lecture notes in computer scienceSpringer, Berlin, pp 831\u2013838"},{"key":"453_CR14","doi-asserted-by":"crossref","unstructured":"Liu F, Ting KM, Zhou Z-H (2008) Isolation forest. In Proceedings of the 8th IEEE international conference on data mining, ICDM \u201908., pp 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"453_CR15","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu FT, Ting KM, Zhou Z-H (2012) Isolation-based anomaly detection. ACM Trans Knowl Discov Data 6(1):3:1\u20133:39","journal-title":"ACM Trans Knowl Discov Data"},{"key":"453_CR16","doi-asserted-by":"crossref","unstructured":"Micenkova B, Dang X-H, Assent I, Ng R (2013) Explaining outliers by subspace separability. In Proceedings of the 2013 IEEE 13th international conference on data mining (ICDM), pp 518\u2013527","DOI":"10.1109\/ICDM.2013.132"},{"key":"453_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen HV, M\u00fcller E, Vreeken J, Keller F, B\u00f6hm K (2013) CMI: an information-theoretic contrast measure for enhancing subspace cluster and outlier detection. In Proceedings of the 2013 SIAM data mining conference (SDM), pp 198\u2013206","DOI":"10.1137\/1.9781611972832.22"},{"issue":"8","key":"453_CR18","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H Peng","year":"2005","unstructured":"Peng H, Long F, Ding C (2005) Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans Pattern Anal Mach Intell 27(8):1226\u20131238","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"453_CR19","unstructured":"Romano S, Bailey J, Vinh NX, Verspoor K (2014) Standardized mutual information for clustering comparisons: One step further in adjustment for chance. In T. Jebara and E. P. Xing (eds) Proceedings of the 31st international conference on machine learning (ICML-14), pp 1143\u20131151"},{"key":"453_CR20","volume-title":"Artificial intelligence: a modern approach","author":"SJ Russell","year":"2003","unstructured":"Russell SJ, Norvig P (2003) Artificial intelligence: a modern approach, 2nd edn. Pearson Education, London","edition":"2"},{"key":"453_CR21","unstructured":"Sabhnani M, Serpen G (2003) KDD feature set complaint heuristic rules for R2L attack detection. In Proceedings of the international conference on security and management, SAM \u201903, Vol 1, Las Vegas, 23\u201326 June 2003, pp 310\u2013316"},{"key":"453_CR22","doi-asserted-by":"crossref","unstructured":"Smets K, Vreeken J (2011) The odd one out: Identifying and characterising anomalies. In Proceedings of the 2011 SIAM international conference on data mining, chapter 69, pp 804\u2013815","DOI":"10.1137\/1.9781611972818.69"},{"key":"453_CR23","first-page":"2837","volume":"11","author":"NX Vinh","year":"2010","unstructured":"Vinh NX, Epps J, Bailey J (2010) Information theoretic measures for clusterings comparison: variants, properties, normalization and correction for chance. J Mach Learn Res 11:2837\u20132854","journal-title":"J Mach Learn Res"},{"key":"453_CR24","doi-asserted-by":"crossref","unstructured":"Vinh NX, Chan J, Romano S, Bailey J (2014a) Effective global approaches for mutual information based feature selection. In Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201914, ACM, New York, pp 512\u2013521","DOI":"10.1145\/2623330.2623611"},{"key":"453_CR25","unstructured":"Vinh NX, Chan J, Bailey J (2014b) Reconsidering mutual informationbased feature selection: a statistical significance view. In Proceedings of the twenty-eighth AAAI conference on artificialintelligence, Qu\u00e9bec City, 27 -31 July 2014, pp 2092\u20132098"},{"issue":"1","key":"453_CR26","doi-asserted-by":"publisher","first-page":"109","DOI":"10.14778\/1687627.1687641","volume":"2","author":"T Wu","year":"2009","unstructured":"Wu T, Xin D, Mei Q, Han J (2009) Promotion analysis in multi-dimensional space. Proc VLDB Endow 2(1):109\u2013120","journal-title":"Proc VLDB Endow"},{"key":"453_CR27","unstructured":"Zhang J, Lou M, Ling TW, Wang H (2004) Hos-miner: a system for detecting outlyting subspaces of high-dimensional data. In Proceedings of the thirtieth international conference on very large data bases , Vol 30, VLDB \u201904, VLDB Endowment, Brussels, pp 1265\u20131268"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-016-0453-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-016-0453-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-016-0453-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-016-0453-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T10:07:14Z","timestamp":1748772434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-016-0453-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,9]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["453"],"URL":"https:\/\/doi.org\/10.1007\/s10618-016-0453-2","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,9]]},"assertion":[{"value":"3 May 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}