{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:10:13Z","timestamp":1775560213745,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T00:00:00Z","timestamp":1463529600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"University of Applied Sciences Ravensburg-Weingarten"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10994-016-5567-7","type":"journal-article","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T18:43:24Z","timestamp":1463597004000},"page":"305-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Expected similarity estimation for large-scale batch and streaming anomaly detection"],"prefix":"10.1007","volume":"105","author":[{"given":"Markus","family":"Schneider","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Ertel","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Ramos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,18]]},"reference":[{"key":"5567_CR1","doi-asserted-by":"publisher","unstructured":"Aleskerov, E., Freisleben, B., & Rao, B. (1997). Cardwatch: A neural network based database mining system for credit card fraud detection. In Computational intelligence for financial engineering. doi: 10.1109\/cifer.1997.618940","DOI":"10.1109\/cifer.1997.618940"},{"key":"5567_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-29587-9","volume-title":"Infinite dimensional analysis: A hitchhiker\u2019s guide","author":"CD Aliprantis","year":"2006","unstructured":"Aliprantis, C. D., & Border, K. (2006). Infinite dimensional analysis: A hitchhiker\u2019s guide. Berlin: Springer Science & Business Media. doi: 10.1007\/3-540-29587-9 ."},{"key":"5567_CR3","doi-asserted-by":"publisher","unstructured":"Angiulli, F., & Fassetti, F. (2007). Detecting distance-based outliers in streams of data. In Proceedings of the sixteenth ACM conference on conference on information and knowledge management (pp. 811\u2013820). New York: ACM. doi: 10.1145\/1321440.1321552 .","DOI":"10.1145\/1321440.1321552"},{"issue":"2","key":"5567_CR4","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/s10618-009-0159-9","volume":"20","author":"F Angiulli","year":"2010","unstructured":"Angiulli, F., & Fassetti, F. (2010). Distance-based outlier queries in data streams: The novel task and algorithms. Data Mining and Knowledge Discovery, 20(2), 290\u2013324. doi: 10.1007\/s10618-009-0159-9 .","journal-title":"Data Mining and Knowledge Discovery"},{"key":"5567_CR5","doi-asserted-by":"publisher","unstructured":"Angiulli, F., & Pizzuti, C. (2002). Fast outlier detection in high dimensional spaces. In PKDD, Vol. 2 (pp. 15\u201326). Berlin: Springer. doi: 10.1007\/3-540-45681-3_2 .","DOI":"10.1007\/3-540-45681-3_2"},{"key":"5567_CR6","doi-asserted-by":"publisher","unstructured":"Bifet, A., Holmes, G., Pfahringer, B., Kirkby, R., & Gavald\u00e0, R. (2009). New ensemble methods for evolving data streams. In Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 139\u2013148). ACM. doi: 10.1145\/1557019.1557041 .","DOI":"10.1145\/1557019.1557041"},{"key":"5567_CR7","doi-asserted-by":"publisher","unstructured":"Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000). LOF: Identifying density-based local outliers. In ACM sigmod record, Vol. 29 (pp. 93\u2013104). ACM. doi: 10.1145\/335191.335388 .","DOI":"10.1145\/335191.335388"},{"issue":"3","key":"5567_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1\u201358.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"5567_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C. C., & Lin, C. J. (2011). LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2(3), 1\u201327.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"5567_CR10","doi-asserted-by":"publisher","unstructured":"Dawid, A. P. (1984). Present position and potential developments: Some personal views: Statistical theory: The prequential approach. Journal of the Royal Statistical Society Series A (General) 278\u2013292. doi: 10.2307\/2981683 .","DOI":"10.2307\/2981683"},{"issue":"1","key":"5567_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., & Ghemawat, S. (2008). MapReduce: Simplified data processing on large clusters. Communications of the ACM, 51(1), 107\u2013113. doi: 10.1145\/1327452.1327492 .","journal-title":"Communications of the ACM"},{"key":"5567_CR12","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar, J. (2006). Statistical comparisons of classifiers over multiple data sets. The Journal of Machine Learning Research, 7, 1\u201330.","journal-title":"The Journal of Machine Learning Research"},{"key":"5567_CR13","doi-asserted-by":"publisher","unstructured":"Domingos, P., & Hulten, G. (2000). Mining high-speed data streams. In Proceedings of the sixth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 71\u201380). ACM. doi: 10.1145\/347090.347107 .","DOI":"10.1145\/347090.347107"},{"key":"5567_CR14","unstructured":"Domingos, P., & Hulten, G. (2001). Catching up with the data: Research issues in mining data streams. In DMKD."},{"key":"5567_CR15","doi-asserted-by":"publisher","unstructured":"Faria, E.R., Gama, J., & Carvalho, A.C. (2013). Novelty detection algorithm for data streams multi-class problems. In Proceedings of the 28th annual ACM symposium on applied computing (pp. 795\u2013800). ACM. doi: 10.1145\/2480362.2480515 .","DOI":"10.1145\/2480362.2480515"},{"issue":"200","key":"5567_CR16","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","volume":"32","author":"M Friedman","year":"1937","unstructured":"Friedman, M. (1937). The use of ranks to avoid the assumption of normality implicit in the analysis of variance. Journal of the American Statistical Association, 32(200), 675\u2013701. doi: 10.1080\/01621459.1937.10503522 .","journal-title":"Journal of the American Statistical Association"},{"key":"5567_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/ebk1439826119-c1","volume-title":"Knowledge discovery from data streams","author":"J Gama","year":"2010","unstructured":"Gama, J. (2010). Knowledge discovery from data streams. Boca Raton: CRC Press. doi: 10.1201\/ebk1439826119-c1 ."},{"issue":"4","key":"5567_CR18","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama, J., \u017dliobaite, I., Bifet, A., Pechenizkiy, M., & Bouchachia, A. (2014). A survey on concept drift adaptation. ACM Computing Surveys (CSUR), 46(4), 44. doi: 10.1145\/2523813 .","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"5567_CR19","doi-asserted-by":"crossref","DOI":"10.1201\/9781420035315","volume-title":"Handbook of discrete and computational geometry","author":"JE Goodman","year":"2004","unstructured":"Goodman, J. E., & O\u2019Rourke, J. (2004). Handbook of discrete and computational geometry (Vol. 2). Boca Raton: CRC Press."},{"key":"5567_CR20","doi-asserted-by":"publisher","unstructured":"Gretton, A., & Desobry, F. (2003). On-line one-class support vector machines. An application to signal segmentation. In Acoustics, speech, and signal processing, 2003. Proceedings (ICASSP\u201903). 2003 IEEE international conference on, IEEE, vol. 2, pp. 2\u2013709. doi: 10.1109\/icassp.2003.1202465 .","DOI":"10.1109\/icassp.2003.1202465"},{"issue":"1","key":"5567_CR21","first-page":"723","volume":"13","author":"A Gretton","year":"2012","unstructured":"Gretton, A., Borgwardt, K. M., Rasch, M. J., Sch\u00f6lkopf, B., & Smola, A. (2012). A kernel two-sample test. The Journal of Machine Learning Research, 13(1), 723\u2013773.","journal-title":"The Journal of Machine Learning Research"},{"issue":"9","key":"5567_CR22","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/tkde.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta, M., Gao, J., & Aggarwal, C. C. (2014). Outlier detection for temporal data: A survey. Knowledge and Data Engineering, IEEE Transactions on, 26(9), 2250\u20132267. doi: 10.1109\/tkde.2013.184 .","journal-title":"Knowledge and Data Engineering, IEEE Transactions on"},{"key":"5567_CR23","doi-asserted-by":"publisher","unstructured":"Ho, S. S. (2005). A martingale framework for concept change detection in time-varying data streams. In Proceedings of the 22nd international conference on machine learning (pp. 321\u2013327). ACM. doi: 10.1145\/1102351.1102392 .","DOI":"10.1145\/1102351.1102392"},{"issue":"2","key":"5567_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/b:aire.0000045502.10941.a9","volume":"22","author":"VJ Hodge","year":"2004","unstructured":"Hodge, V. J., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial Intelligence Review, 22(2), 85\u2013126. doi: 10.1023\/b:aire.0000045502.10941.a9 .","journal-title":"Artificial Intelligence Review"},{"issue":"6","key":"5567_CR25","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1080\/03610928008827904","volume":"9","author":"RL Iman","year":"1980","unstructured":"Iman, R. L., & Davenport, J. M. (1980). Approximations of the critical region of the Friedman statistic. Communications in Statistics-Theory and Methods, 9(6), 571\u2013595.","journal-title":"Communications in Statistics-Theory and Methods"},{"key":"5567_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/b98838","volume-title":"Foundations of modern probability","author":"O Kallenberg","year":"2006","unstructured":"Kallenberg, O. (2006). Foundations of modern probability. Berlin: Springer Science & Business Media. doi: 10.1007\/b98838 ."},{"key":"5567_CR27","unstructured":"Kar, P., & Karnick, H. (2012). Random feature maps for dot product kernels. In International conference on artificial intelligence and statistics, pp. 583\u2013591."},{"key":"5567_CR28","unstructured":"Knorr, E. M., & Ng, R. T. (1998). Algorithms for mining distance-based outliers in large datasets. In Proceedings of the international conference on very large data bases, citeseer (pp. 392\u2013403)."},{"issue":"3\u20134","key":"5567_CR29","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"EM Knorr","year":"2000","unstructured":"Knorr, E. M., Ng, R. T., & Tucakov, V. (2000). Distance-based outliers: Slgorithms and applications. The VLDB Journal the International Journal on Very Large Data Bases, 8(3\u20134), 237\u2013253. doi: 10.1007\/s007780050006 .","journal-title":"The VLDB Journal the International Journal on Very Large Data Bases"},{"key":"5567_CR30","doi-asserted-by":"publisher","unstructured":"Kontaki, M., Gounaris, A., Papadopoulos, A. N., Tsichlas, K., & Manolopoulos, Y. (2011). Continuous monitoring of distance-based outliers over data streams. In Data engineering (ICDE), 2011 IEEE 27th international conference on, IEEE, pp. 135\u2013146. doi: 10.1109\/icde.2011.5767923 .","DOI":"10.1109\/icde.2011.5767923"},{"key":"5567_CR31","doi-asserted-by":"publisher","unstructured":"Kriegel, H. P., & Zimek, A. (2008). Angle-based outlier detection in high-dimensional data. In Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 444\u2013452). ACM. doi: 10.1145\/1401890.1401946 .","DOI":"10.1145\/1401890.1401946"},{"issue":"10","key":"5567_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/mdso.2005.53","volume":"6","author":"V Kumar","year":"2005","unstructured":"Kumar, V. (2005). Parallel and distributed computing for cybersecurity. IEEE Distributed Systems Online, 6(10), 1. doi: 10.1109\/mdso.2005.53 .","journal-title":"IEEE Distributed Systems Online"},{"issue":"1","key":"5567_CR33","doi-asserted-by":"crossref","first-page":"29","DOI":"10.3233\/IDA-2004-8103","volume":"8","author":"MM Lazarescu","year":"2004","unstructured":"Lazarescu, M. M., Venkatesh, S., & Bui, H. H. (2004). Using multiple windows to track concept drift. Intelligent Data Analysis, 8(1), 29\u201359.","journal-title":"Intelligent Data Analysis"},{"key":"5567_CR34","unstructured":"Le, Q., Sarl\u00f3s, T., & Smola, A. J. (2013). Fastfood: Approximating kernel expansions in loglinear time. In Proceedings of the international conference on machine learning."},{"key":"5567_CR35","doi-asserted-by":"publisher","unstructured":"Li, F., Ionescu, C., & Sminchisescu, C. (2010). Random Fourier approximations for skewed multiplicative histogram kernels. In Pattern recognition Accessed 1 Jan 2016. Berlin: Springer. doi: 10.1007\/978-3-642-15986-2_27 .","DOI":"10.1007\/978-3-642-15986-2_27"},{"key":"5567_CR36","unstructured":"Lichman, M. (2013). UCI machine learning repository. Irvine: University of California, School of Information and Computer Sciences. http:\/\/archive.ics.uci.edu\/ml . Accessed 1 Jan 2016."},{"issue":"1","key":"5567_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F. T., Ting, K. M., & Zhou, Z. H. (2012). Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data, 6(1), 3. doi: 10.1145\/2133360.2133363 .","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"5567_CR38","unstructured":"Nemenyi, P. (1963). Distribution-free multiple comparisons. Ph.D. thesis, Princeton University."},{"key":"5567_CR39","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., & Ng, A. (2011). Reading digits in natural images with unsupervised feature learning. In NIPS workshop on deep learning and unsupervised feature learning, p. 4."},{"key":"5567_CR40","unstructured":"Ott, L., Pang, L., Ramos, F. T., & Chawla, S. (2014). On integrated clustering and outlier detection. In Advances in neural information processing systems (pp. 1359\u20131367)."},{"key":"5567_CR41","doi-asserted-by":"publisher","unstructured":"Pokrajac, D. (2007). Incremental local outlier detection for data streams. IEEE symposium on computational intelligence and data mining (pp. 504\u2013515). doi: 10.1109\/cidm.2007.368917 .","DOI":"10.1109\/cidm.2007.368917"},{"key":"5567_CR42","unstructured":"Rahimi, A., & Recht, B. (2007). Random features for large-scale kernel machines. In Advances in neural information processing systems (pp. 1177\u20131184)."},{"key":"5567_CR43","unstructured":"Rahimi, A., & Recht, B. (2008). Weighted sums of random kitchen sinks: Replacing minimization with randomization in learning. In Advances in neural information processing systems (pp. 1313\u20131320)."},{"key":"5567_CR44","doi-asserted-by":"publisher","unstructured":"Ramaswamy, S., Rastogi, R., & Shim, K. (2000). Efficient algorithms for mining outliers from large data sets. In ACM SIGMOD record, Vol. 29, pp. 427\u2013438. ACM. doi: 10.1145\/335191.335437 .","DOI":"10.1145\/335191.335437"},{"issue":"1","key":"5567_CR45","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2594473.2594479","volume":"15","author":"S Sadik","year":"2014","unstructured":"Sadik, S., & Gruenwald, L. (2014). Research issues in outlier detection for data streams. ACM SIGKDD Explorations Newsletter, 15(1), 33\u201340. doi: 10.1145\/2594473.2594479 .","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"5567_CR46","unstructured":"Schneider, M. (2016). Probability inequalities for kernel embeddings in sampling without replacement. In Proceedings of the nineteenth international conference on artificial intelligence and statistics."},{"key":"5567_CR47","doi-asserted-by":"publisher","unstructured":"Schneider, M., Ertel, W., & Palm, G. (2015). Expected similarity estimation for large scale anomaly detection. In International joint conference on neural networks, IEEE, pp. 1\u20138. doi: 10.1109\/ijcnn.2015.7280331 .","DOI":"10.1109\/ijcnn.2015.7280331"},{"issue":"7","key":"5567_CR48","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J. C., Shawe-Taylor, J., Smola, A. J., & Williamson, R. C. (2001). Estimating the support of a high-dimensional distribution. Neural Computation, 13(7), 1443\u20131471. doi: 10.1162\/089976601750264965 .","journal-title":"Neural Computation"},{"issue":"5","key":"5567_CR49","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.1214\/13-aos1140","volume":"41","author":"D Sejdinovic","year":"2013","unstructured":"Sejdinovic, D., Sriperumbudur, B., Gretton, A., & Fukumizu, K. (2013). Equivalence of distance-based and RKHS-based statistics in hypothesis testing. The Annals of Statistics, 41(5), 2263\u20132291. doi: 10.1214\/13-aos1140 .","journal-title":"The Annals of Statistics"},{"key":"5567_CR50","doi-asserted-by":"publisher","unstructured":"Smola, A. J., Gretton, A., Song, L., & Sch\u00f6lkopf, B. (2007). A Hilbert space embedding for distributions. In Algorithmic learning theory. Berlin: Springer. doi: 10.1007\/978-3-540-75488-6_5 .","DOI":"10.1007\/978-3-540-75488-6_5"},{"key":"5567_CR51","doi-asserted-by":"publisher","unstructured":"Spence, C., Parra, L., & Sajda, P. (2001). Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. In Mathematical methods in biomedical image analysis, 2001. MMBIA 2001. IEEE workshop on, IEEE, pp. 3\u201310. doi: 10.1109\/mmbia.2001.991693 .","DOI":"10.1109\/mmbia.2001.991693"},{"key":"5567_CR52","doi-asserted-by":"crossref","unstructured":"Spinosa, E. J., de Leon, F., de Carvalho, A. P., & Gama, J. (2007). OLINDDA: A cluster-based approach for detecting novelty and concept drift in data streams. In Proceedings of the 2007 ACM symposium on applied computing (pp. 448\u2013452). ACM.","DOI":"10.1145\/1244002.1244107"},{"key":"5567_CR53","first-page":"1071","volume":"4","author":"I Steinwart","year":"2003","unstructured":"Steinwart, I. (2003). Sparseness of support vector machines. The Journal of Machine Learning Research, 4, 1071\u20131105.","journal-title":"The Journal of Machine Learning Research"},{"key":"5567_CR54","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-77242-4","volume-title":"Support vector machines","author":"I Steinwart","year":"2008","unstructured":"Steinwart, I., & Christmann, A. (2008). Support vector machines. Berlin: Springer."},{"key":"5567_CR55","unstructured":"Tan, S. C., Ting, K. M., & Liu, T. F. (2011). Fast anomaly detection for streaming data. In IJCAI proceedings-international joint conference on artificial intelligence, Citeseer, Vol. 22, p. 1511."},{"key":"5567_CR56","unstructured":"Tax, D. M. J. (2001). One-class classification. Ph.D. thesis, Technische Universiteit Delft."},{"issue":"1","key":"5567_CR57","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DMJ Tax","year":"2004","unstructured":"Tax, D. M. J., & Duin, R. P. W. (2004). Support vector data description. Machine Learning, 54(1), 45\u201366.","journal-title":"Machine Learning"},{"issue":"1","key":"5567_CR58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1137\/S1052623493250780","volume":"7","author":"V Torczon","year":"1997","unstructured":"Torczon, V. (1997). On the convergence of pattern search algorithms. SIAM Journal on Optimization, 7(1), 1\u201325.","journal-title":"SIAM Journal on Optimization"},{"issue":"3","key":"5567_CR59","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/cvpr.2010.5539949","volume":"34","author":"A Vedaldi","year":"2012","unstructured":"Vedaldi, A., & Zisserman, A. (2012). Efficient additive kernels via explicit feature maps. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 34(3), 480\u2013492. doi: 10.1109\/cvpr.2010.5539949 .","journal-title":"Pattern Analysis and Machine Intelligence, IEEE Transactions on"},{"key":"5567_CR60","doi-asserted-by":"publisher","unstructured":"Vondrick, C., Khosla, A., Malisiewicz, T., & Torralba, A. (2013). Hoggles: Visualizing object detection features. In Computer vision (ICCV), 2013 IEEE international conference on, IEEE, pp. 1\u20138. doi: 10.1109\/iccv.2013.8 .","DOI":"10.1109\/iccv.2013.8"},{"issue":"2","key":"5567_CR61","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1023\/A:1007659514849","volume":"40","author":"GI Webb","year":"2000","unstructured":"Webb, G. I. (2000). Multiboosting: A technique for combining boosting and wagging. Machine Learning, 40(2), 159\u2013196.","journal-title":"Machine Learning"},{"issue":"1","key":"5567_CR62","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/bf00116900","volume":"23","author":"G Widmer","year":"1996","unstructured":"Widmer, G., & Kubat, M. (1996). Learning in the presence of concept drift and hidden contexts. Machine Learning, 23(1), 69\u2013101. doi: 10.1007\/bf00116900 .","journal-title":"Machine Learning"},{"key":"5567_CR63","unstructured":"Williams, C., & Seeger, M. (2001). Using the Nystr\u00f6m method to speed up kernel machines. In Proceedings of the 14th annual conference on neural information processing systems. MIT Press, EPFL-CONF-161322, pp. 682\u2013688."},{"key":"5567_CR64","doi-asserted-by":"publisher","unstructured":"Wu, K., Zhang, K., Fan, W., Edwards, A., & Yu, P. S. (2014). RS-forest: A rapid density estimator for streaming anomaly detection. In Data mining (ICDM), 2014 IEEE international conference on, IEEE, pp. 600\u2013609. doi: 10.1109\/icdm.2014.45 .","DOI":"10.1109\/icdm.2014.45"},{"key":"5567_CR65","unstructured":"Xiong, L., Poczos, B., Schneider, J., Connolly, A., & Vander Plas, J. (2011). Hierarchical probabilistic models for group anomaly detection. In AISTATS 2011."},{"issue":"3","key":"5567_CR66","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/347090.347160","volume":"8","author":"K Yamanishi","year":"2004","unstructured":"Yamanishi, K., Takeuchi, J. I., Williams, G., & Milne, P. (2004). On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Mining and Knowledge Discovery, 8(3), 275\u2013300. doi: 10.1145\/347090.347160 .","journal-title":"Data Mining and Knowledge Discovery"},{"key":"5567_CR67","doi-asserted-by":"publisher","unstructured":"Yu, H., Yang, J., & Han, J. (2003). Classifying large data sets using SVMs with hierarchical clusters. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 306\u2013315). ACM. doi: 10.1145\/956750.956786 .","DOI":"10.1145\/956750.956786"},{"issue":"5","key":"5567_CR68","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1109\/tie.2010.2058072","volume":"58","author":"B Zhang","year":"2011","unstructured":"Zhang, B., Sconyers, C., Byington, C., Patrick, R., Orchard, M. E., & Vachtsevanos, G. (2011). A probabilistic fault detection approach: Application to bearing fault detection. IEEE Transactions on Industrial Electronics, 58(5), 2011\u20132018. doi: 10.1109\/tie.2010.2058072 .","journal-title":"IEEE Transactions on Industrial Electronics"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-016-5567-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10994-016-5567-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-016-5567-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-016-5567-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T15:19:39Z","timestamp":1748963979000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10994-016-5567-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,18]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["5567"],"URL":"https:\/\/doi.org\/10.1007\/s10994-016-5567-7","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,18]]}}}