{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:07:54Z","timestamp":1771373274050,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T00:00:00Z","timestamp":1479340800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s10618-016-0486-6","type":"journal-article","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T06:38:44Z","timestamp":1479364724000},"page":"548-572","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Outlier detection using binary decision diagrams"],"prefix":"10.1007","volume":"31","author":[{"given":"Takuro","family":"Kutsuna","sequence":"first","affiliation":[]},{"given":"Akihiro","family":"Yamamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,17]]},"reference":[{"key":"486_CR1","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1007\/978-3-319-06605-9_42","volume-title":"Advances in knowledge discovery and data mining. Lecture notes in computer science","author":"S Aryal","year":"2014","unstructured":"Aryal S, Ting KM, Wells JR, Washio T (2014) Improving iforest with relative mass. In: Tseng VS, Ho TB, Zhou ZH, Chen AL, Kao HY (eds) Advances in knowledge discovery and data mining. Lecture notes in computer science. Springer, New York, pp 510\u2013521"},{"key":"486_CR2","unstructured":"Bache K, Lichman M (2013) UCI machine learning repository. \n                        http:\/\/archive.ics.uci.edu\/ml\n                        \n                    . Accessed 24 June 2014"},{"key":"486_CR3","unstructured":"Bay SD (2003) Orca: a program for mining distance-based outliers. \n                        http:\/\/www.stephenbay.net\/orca\n                        \n                    . Accessed 6 Jul 2015"},{"key":"486_CR4","doi-asserted-by":"crossref","unstructured":"Bay SD, Schwabacher M (2003) Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201903), ACM, New York, pp 29\u201338","DOI":"10.1145\/956750.956758"},{"issue":"2","key":"486_CR5","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/93605.98741","volume":"19","author":"N Beckmann","year":"1990","unstructured":"Beckmann N, Kriegel H, Schneider R, Seeger B (1990) The R*-tree: an efficient and robust access method for points and rectangles. SIGMOD Rec 19(2):322\u2013331","journal-title":"SIGMOD Rec"},{"issue":"3","key":"486_CR6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/S0168-1699(99)00046-0","volume":"24","author":"JA Blackard","year":"1999","unstructured":"Blackard JA, Dean DJ (1999) Comparative accuracies of artificial neural networks and discriminant analysis in predicting forest cover types from cartographic variables. Comput Electron Agric 24(3):131\u2013151","journal-title":"Comput Electron Agric"},{"key":"486_CR7","doi-asserted-by":"crossref","unstructured":"Brace K, Rudell R, Bryant R (1990) Efficient implementation of a BDD package. In: The 27th ACM\/IEEE design automation conference, pp 40\u201345","DOI":"10.1145\/123186.123222"},{"key":"486_CR8","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD international conference on management of data (SIGMOD \u201900), ACM, New York, pp 93\u2013104","DOI":"10.1145\/342009.335388"},{"issue":"8","key":"486_CR9","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"R Bryant","year":"1986","unstructured":"Bryant R (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans Comput 35(8):677\u2013691","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"486_CR10","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15:1\u201315:58","journal-title":"ACM Comput Surv"},{"issue":"8","key":"486_CR11","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861\u2013874","journal-title":"Pattern Recognit Lett"},{"issue":"3","key":"486_CR12","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10618-008-0093-2","volume":"16","author":"A Ghoting","year":"2008","unstructured":"Ghoting A, Parthasarathy S, Otey ME (2008) Fast mining of distance-based outliers in high-dimensional datasets. Data Min Knowl Discov 16(3):349\u2013364","journal-title":"Data Min Knowl Discov"},{"issue":"9","key":"486_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v011.i09","volume":"11","author":"A Karatzoglou","year":"2004","unstructured":"Karatzoglou A, Smola A, Hornik K, Zeileis A (2004) kernlab-an S4 package for kernel methods in R. J Stat Softw 11(9):1\u201320","journal-title":"J Stat Softw"},{"key":"486_CR14","doi-asserted-by":"crossref","unstructured":"Kutsuna T (2010) A binary decision diagram-based one-class classifier. In: Proceedings of the 10th IEEE international conference on data mining (ICDM \u201910), pp 284\u2013293","DOI":"10.1109\/ICDM.2010.84"},{"key":"486_CR15","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/978-3-319-06605-9_40","volume-title":"Advances in knowledge discovery and data mining. Lecture notes in computer science","author":"T Kutsuna","year":"2014","unstructured":"Kutsuna T, Yamamoto A (2014a) Outlier detection based on leave-one-out density using binary decision diagrams. In: Tseng V, Ho T, Zhou ZH, Chen A, Kao HY (eds) Advances in knowledge discovery and data mining. Lecture notes in computer science. Springer, New York, pp 486\u2013497"},{"issue":"5","key":"486_CR16","doi-asserted-by":"crossref","first-page":"889","DOI":"10.3233\/IDA-140674","volume":"18","author":"T Kutsuna","year":"2014","unstructured":"Kutsuna T, Yamamoto A (2014b) A parameter-free approach for one-class classification using binary decision diagrams. Intell Data Anal 18(5):889\u2013910","journal-title":"Intell Data Anal"},{"key":"486_CR17","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Kumar V (2005) Feature bagging for outlier detection. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining (KDD \u201905), ACM, New York, pp 157\u2013166","DOI":"10.1145\/1081870.1081891"},{"key":"486_CR18","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM conference on data mining","DOI":"10.1137\/1.9781611972733.3"},{"key":"486_CR19","unstructured":"Liu FT (2009) Isolationforest: Isolation forest. \n                        http:\/\/sourceforge.net\/projects\/iforest\n                        \n                    . Accessed 11 November 2014. R package version 0.0-25"},{"key":"486_CR20","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: Proceedings of the 8th IEEE international conference on data mining (ICDM \u201908), pp 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"key":"486_CR21","first-page":"49","volume":"2","author":"P Mahalanobis","year":"1936","unstructured":"Mahalanobis P (1936) On the generalized distance in statistics. Proc Natl Inst Sci (Calcutta) 2:49\u201355","journal-title":"Proc Natl Inst Sci (Calcutta)"},{"key":"486_CR22","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.dss.2014.03.001","volume":"62","author":"S Moro","year":"2014","unstructured":"Moro S, Cortez P, Rita P (2014) A data-driven approach to predict the success of bank telemarketing. Decis Support Syst 62:22\u201331","journal-title":"Decis Support Syst"},{"key":"486_CR23","unstructured":"R Core Team (2014) R: a language and environment for statistical computing. R Foundation for Statistical Computing, Vienna. \n                        http:\/\/www.R-project.org\n                        \n                    . Accessed 20 Jan 2016"},{"issue":"7","key":"486_CR24","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf B, Platt J, Shawe-Taylor J, Smola A, Williamson R (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443\u20131471","journal-title":"Neural Comput"},{"key":"486_CR25","first-page":"303","volume-title":"Binary decision diagrams","author":"F Somenzi","year":"1999","unstructured":"Somenzi F (1999) Calculational system design. In: Broy M, Steninbruggen R (eds) Binary decision diagrams, vol 173. IOS Press, Amsterdam, pp 303\u2013366"},{"key":"486_CR26","unstructured":"Somenzi F (2012) CUDD: CU decision diagram package. \n                        http:\/\/vlsi.colorado.edu\/~fabio\/CUDD\n                        \n                    . Accessed 24 June 2014"},{"key":"486_CR27","doi-asserted-by":"crossref","DOI":"10.1201\/b10328","volume-title":"Data mining with R, learning with case studies","author":"L Torgo","year":"2010","unstructured":"Torgo L (2010) Data mining with R, learning with case studies. Chapman and Hall\/CRC, Boca Raton"},{"issue":"3","key":"486_CR28","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1023\/B:DAMI.0000023676.72185.7c","volume":"8","author":"K Yamanishi","year":"2004","unstructured":"Yamanishi K, Takeuchi JI, Williams G, Milne P (2004) On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Min Knowl Discov 8(3):275\u2013300","journal-title":"Data Min Knowl Discov"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-016-0486-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-016-0486-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-016-0486-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T03:51:48Z","timestamp":1543895508000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-016-0486-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,17]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["486"],"URL":"https:\/\/doi.org\/10.1007\/s10618-016-0486-6","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,17]]}}}